Alice and Bob use the Signal protocol to derive a key chain, sequentially using keys to encrypt/decrypt messages, and delete each key after use. Alice Bob k1 k1 k2 k2 k3 k3 k4 k4 k5 k5 k6 k6 k7 k7 k8 k8 k9 k9 k10 k10 k11 k11 ……. …… nostr:note1afkmm89qpje2dzyrfclq80np7enas2l3s2g4pl5suezstfxt9thqwcg3wc