As I can think you have to look at key consolidation protocols to get more info that may help you to build your protocol.
Modern key consolidation protocols contain additional amounts of information, which help to counteract the active attacks of the adversary.
Some of these quantities are:
-Timestamp. The time stamp consists of the date, time, minutes, seconds and in some cases tens or centimeters of a second and expresses the time when a protocol action is performed, which can be some (cryptographic) operation or transmission of information. The time stamp in practice requires a trusted time stamp server, which serves time stamp requests.
-Nonce. The unique number often replaces the time stamp and is a random number that does not appear in a future execution of the protocol and gives uniqueness to the messages that are exchanged. It is important that this number is not predictable by the opponent. The unique number is included in the cryptographic operations and thus binds cryptographically to the corresponding messages, resulting in reduced degrees of freedom of action of the opponent.
Some reasons for consolidating session keys are:
- Limiting the amount of encrypted material that can be used for cryptanalysis.
- Restriction of the consequences of disclosure or unauthorised access to cryptographic keys.
- The need to store many cryptographic keys for a long time.
- Independence between communication sessions and between web applications / services.