In solutions like this when implementing multiple device encryption, private keys are either migrated to all devices (a shared private key) or all of the public keys are published to a directory for discovery. For the discovery to be trustworthy it needs to be built on a tamper-evident log structure, for example, one like Google's Key Transparency.