you should read up on cryptosystems for this kind of thing. it can be done, i think. it's about key derivation trees
Login to reply
Replies (1)
there is the other solution for this too, key registries. but this requires some kind of scheme for non-cryptographic identities. nip-05 might be a candidate for linking things together, i'm just spitballing