> Signing and encrypting are different operations
Perhaps in the diagram you could include the premise that the user is operating in the two clients with a signer that cannot encrypt (FROST bunker); this would make it easier to understand why such a structure becomes necessary.
Even if there are probably other uses cases, like