Note on a multiple-key multiple-lock security problem