It depends on the actual application. But one trivial example that's super exciting, is that you can write a giftwrapped message signed by an ephemeral key, and still prove to the receiver that the receiver is in fact following the sender. This removes one of the biggest downsides of giftwrapps: spam.