The Public Key Scheme in itself is independent of the encryption methods selected. The only requirements are that one is a public key cryptosystem, and the other one is a single key cryptosystem, and that server and client agree on the cryptosystems used. See the discussion about possible encryption methods.
AL 12 December 1993