Cryptography-savvy people: I am curious, is the following possible?
1) Company A gives employee B a (software and/or hardware) device that allows B to do something, e.g. sign certain transactions in the name of A.
2) B uses the device during his employment.
3) At the end of his employment, B sends A cryptographic proof that he has destroyed the device, i.e. that he is no longer able to sign transactions in the name of A.
Obviously, simply giving B a private key will not work for this, since that can always be written down on a paper napkin. But can a private key be wrapped in some layer of cryptography that still allows for it to be used, and provably destroyed at some point?
#asknostr