Key exchanges Implemented key exchanges ECDE-1PU Examples Encrypted and Signed JWT with Authenticated Encryption can be used for privacy sensitive claims transportation between 2 authenticated parties;