This is a special case, because for some reason the two set of keys are guaranteed to uniquely identify the data structures behind them ( they are alternative descriptions of the same data ). They are constructed in such a way, that there can be no overlap ( in fact this takes quite a bit of effort, but ultimately it is done in a foolproof way ). It depends on the circumstances which set of keys is more convenient to access the data elements.