According to the scheme that you just proposed, you cannot. The key is here (no pun intended), if the method used to validate the keys is compromised, you lose.
SSL , - ( ) , , . , ( ) , , , .
PGP ( GPG) , - , ( ). , , , . , N (/ M ).
, , , . , , -, ...
, - ... /// :)