No, you really can’t. That’s a library for symmetric cryptography. The key distribution/exchange problem cannot be solved with symmetric cryptography alone - unless you are acting as a trusted party and conveying the symmetric key - in which case you are not implementing end-to-end cryptography.
The server does not have copies.