There is DH key exchange, but it requires an exchange before participants get to the shared secret. If Bob has only published a verifying key VB, is there a scheme where the following can be achieved?
- Alice, from Bob's verification key VB and some nonce N, derives an ephemeral encryption key EB for Bob
- Bob, from EB, N and SB, reduces the decryption key DB
- Without knowledge of SB, Alice can not reduce DB from what they have