Let me try to rephrase your question in a way for which I might have an answer:
Is there a way for Alice to give Bob a "limited signing key" (LSK) such that:
- Bob can freely generate up to $n$ keys (or other messages) and sign them using the LSK issued by Alice;
- anyone can verify that these keys/messages were signed by an LSK that was issued by Alice to Bob;
- as long the LSK is not used to sign more than $n$ keys/messages, it is not feasible for anyone who does not possess the LSK to forge a signature; and
- if Bob does use the same LSK more than $n$ times, others will be able to forge signatures that appear to have been signed with the same LSK?
Honestly, I'm not sure if these requirements in any way match what you really want. However, I'll go ahead and answer this rephrased question and let you decide if it's useful to you.
In particular, I believe that a scheme meeting the requirements above could be constructed based on Lamport one-time signatures. Lamport signatures have the property that, if the same key is used to sign more than one message, forging a signature becomes much easier. Usually this is considered a disadvantage, but in your case it might be exactly what you want.
Specifically, for $n = 1$, Alice can generate a Lamport public/private key pair, sign the public key with her own (reusable) signing key along with any relevant metadata (like the fact that this particular key pair has been issued to Bob), publish the signed public key and its signature and send the corresponding private key to Bob.
Bob can then use the private key to sign anything he wants (such as the public half of another asymmetric key), and anyone else can verify that this signature matches the public Lamport key signed and published by Alice. But if Bob signs more than one message with the same key, it becomes possible for anyone with access to both signatures to create forgeries much more easily than they could with just one signature.
One potential issue to keep in mind is that the loss of security if Lamport keys are reused is gradual. Whereas normally, given one valid signature, forging a $k$-element Lamport signature requires $2^k$ attempts on average, with access to two signatures the average number of attempts needed drops to just $2^{k/2}$. (All this assumes that messages are hashed before signing, as they usually would be.) The problem here is that, if we choose $k$ conservatively to be large enough that $2^k$ attempts is definitely far beyond even the most powerful attacker's reach, it's possible that $2^{k/2}$ attempts may not be an entirely trivial task either, at least not for less powerful attackers.
Fortunately, there are ways to modify Lamport's scheme to make the security drop more abrupt. This will typically somewhat increase the length of the (already rather long) keys and signatures, but not necessarily by an unreasonable factor.
As for $n > 1$, at the moment I cannot think of a better scheme than simply issuing $n$ separate single-use Lamport keys. For all I know, there might be some clever way to handle this case more efficiently, but if so, I'm not aware of it.