This allows distrustful parties, each has a set of items (e.g. IDs, phone numbers, credit card numbers, etc.) to reveal only intersection of the sets