If Alice and Bob must have a secure method to jointly compute K(A) ⊕ K(B), then why wouldn't then use that same method to just exchange the data?