Please note: Authentication can't trivially be provided.
Assume Alice is given the encrypted message $C=E_{K_B}(P)$, she wants to learn $P$ without revealing $P$ to Bob. Bob however is willing to serve as a decryption oracle for arbitrary messages.
If $E_K(P):=P_K\oplus P$ ($P_K$ being the pad generated by the cipher) then solving the above scenario is quite simple.
The message $C$ then becomes $C=E_{K_B}(P)=P_{K_B}\oplus P$. If Alice now performs $C'=E_{K_A}(C)=P_{K_A}\oplus E_{K_B}(P)=P_{K_A}\oplus P_{K_B}\oplus P$, she can send $C'$ to Bob, who will decrypt this resulting in $P'=P_{K_A}\oplus P$, which is trivially decryptable by Alice. Bob has no chance of learing $P$ at his decryption.
A specific instance of the above scheme is AES-CTR, other choices include Salsa20 and ChaCha20. Please note: The mentioned modes require an IV and usual convention is to prepend the IV to the ciphertext. This preprended IV must not be encrypted as part of the $E_K(P)$ operation. You must have two different IVs prepended to $C'$.
As a general rule:
You need commutative encryption, meaning schemes for which $E_{K_A}(E_{K_B}(P))=E_{K_B}(E_{K_A}(P))$ holds.
And please note:
Using the above procedure is only secure against passive eavesdroppers, if the $E_{K_B}(P)$ isn't transmitted alone at any point, as this would enable an eavesdropper to compute $P=C\oplus C' \oplus P'=P_{K_B}\oplus P \oplus P_{K_A}\oplus P_{K_B}\oplus P \oplus P_{K_A}\oplus P$ with $P'$ being the response from Bob to Alice.