Asymmetric key usage

RSA keys can be restricted for symmetric key distribution and authentication usage. ECC keys can be restricted for authentication and symmetric key derivation usage.