That would defeat the purpose.
You may apply whatever rules you wish about who gets to use the key, or a key, but such a solution would prevent this problem from happening again.