Lack of Public Key Anonymity
Because a key is a global ID for the keyholder, use of the public key when the key is transmitted in the clear by the protocol, gives the attacker the equivalent of an ID codebook puzzle to solve.
The televangelist problemÖ
Need multiple keys, one per function or function class