In the key exchange literature, a common viewpoint is to treat each key generated in the handshake as belonging to a specific, independent application. Under this model, the handshake encryption key is used only