If a key is compromised:

This is how we get clean, cryptographic revocation without centralized blacklists.