Ah I see. Maybe you can do it with Bitcoin.

Company A sends Employee B some bitcoin C on-chain, where B controls the keys.

B can verify to others that they have control of that bitcoin as proof that A has given them authorization to sign certain data on their behalf, assuming the opposing party knows that the bitcoin was really issued by A.

When B wants to destroy their authorization, they send the bitcoin back to A.

Reply to this note

Please Login to reply.

Discussion

Interesting idea... However B could feed the device an old state of the blockchain, so it would require the device to incorporate (say) the block height into the signature, and every recipient of the signature would then need to know that they have to verify whether it corresponds to the blockchain's recent block height