Check if keys are revoked when getting usable encryption keys. Only use keys which are not expired and not revoked.