Cryptography allows us to execute secure matching while
providing data protections, without a third-party middleman.
Exchanging commonly hashed values leaks a lot of information. In order to prevent information leakage, each instance encrypts their private hashed list using commutative encryption and a secret key.