...
Key Compromise
...
Strategies
Reusing Public Keys Across Machines
You can actually reuse public keys across machines. ..With this approach, you only need to keep track of one private key per user.
Resources
http://www.ibm.com/developerworks/library/l-keyc.html - pretty good article, I think I can improve it, shorter, clearly show when running on client or server.
...