OBERISK: A Post-Quantum Privacy-Preserving Healthcare Protocol
Authenticated Encrypted Governance for Immutable Health Systems
Arushi Mallarapu
New York University
March 2026 · Preprint
Abstract
We propose OBERISK, a post-quantum healthcare protocol design that combines encrypted computation, transparent integrity proofs, anonymous credentials, and healthcare-scoped governance. OBERISK composes four cryptographic primitives — STARKs with FRI polynomial commitments, TFHE fully homomorphic encryption, lattice-based anonymous credentials, and a sovereign rollup over a modular data availability layer — into a unified architecture whose intended security reduces to standard lattice and hash-based hardness assumptions. We provide a formal threat model, outline the composition-soundness problem, present preliminary benchmark results from a working TFHE micro-demo (completed March 2026), define an implementation roadmap, and analyze the political economy of adoption by incumbents (Epic, UnitedHealth, pharma, insurers).
1. Problem Statement
1.1 The Crisis
In February 2024, the BlackCat (ALPHV) ransomware group breached UnitedHealth's Change Healthcare platform, exposing the protected health information of approximately 100 million Americans. The attack disrupted claims processing for weeks, delayed patient care nationwide, and triggered cascading identity theft and insurance fraud. UnitedHealth paid a $22 million ransom. This was not an anomaly; it exposed structural weaknesses in the current architecture.
The U.S. healthcare data ecosystem is built on a contradiction: it demands both universal accessibility (any authorized provider, insurer, or pharmacist must access records quickly) and absolute confidentiality (unauthorized disclosure violates HIPAA, causes material harm, and erodes human dignity). Current systems resolve this contradiction badly — they encrypt data at rest and in transit, then decrypt it completely the moment any authorized party needs access. The security boundary is a password, a session token, a VPN. Once inside, everything is plaintext.
1.2 Why Existing Solutions Fail
Approach
Failure Mode
Perimeter security (firewalls, MFA)
BlackCat entered via stolen credentials — perimeter was intact
Encryption at rest (AES-256)
Data must be decrypted for every query, creating plaintext windows
Access control lists
Staff share passwords routinely; healthcare consistently has the highest rate of insider-involved breaches of any industry (Verizon DBIR)
Audit logs
Detect breaches after they happen; do not prevent exfiltration
Blockchain (existing projects)
MedRec, Medicalchain, BurstIQ — none use post-quantum crypto, none compute on encrypted data, none provide anonymous credentials
1.3 The Core Insight
The problem is not who can access the data. The problem is that access requires decryption. If we can compute on encrypted data, verify integrity without trusted setup, and authenticate identity without revealing it — all under assumptions that survive quantum computers — then we eliminate the plaintext window entirely.
This is now technically feasible. The primitives matured between 2021 and 2025, and as of March 2026 we have a working TFHE micro-demo validating the narrower computation-on-ciphertext claim. We are not aware of a prior healthcare proposal that combines these elements in this exact way, but that prior-art claim should be treated as provisional pending deeper review.
2. Background & Related Work
2.1 STARKs and the FRI Protocol
Scalable Transparent Arguments of Knowledge (STARKs) were introduced by Ben-Sasson et al. (2018) and have undergone rapid maturation through ethSTARK (2021), eSTARK (2023), and Circle STARKs (2024).
Transparency: No trusted setup. The only assumption is collision-resistant hashing.
Post-quantum security: Security relies on hash functions (SHA-256, Poseidon, BLAKE3), not elliptic curves or pairings.
Scalability: Prover time is quasi-linear O(n log n); verifier time is polylogarithmic O(log² n).
FRI (Fast Reed-Solomon Interactive Oracle Proof): The polynomial commitment scheme underlying STARKs. Proves that a committed function is close to a low-degree polynomial via iterative folding.
Circle STARKs (2024): The latest advancement in the STARK family, introduced by StarkWare and collaborators. Circle STARKs operate over Mersenne-31 fields (p = 231 − 1), enabling efficient arithmetic via the circle group structure over this field. This yields 2-3x faster prover performance compared to prior STARK constructions while maintaining identical security properties.
Relevance to OBERISK: STARKs prove that state transitions on the health record ledger are correct — every update, access, and modification is verifiable without re-executing the computation. Quantum resistance is native, not bolted on.
2.2 TFHE: Fully Homomorphic Encryption
TFHE (Torus Fully Homomorphic Encryption) was advanced by Chillotti et al. (2021-2024) with programmable bootstrapping, enabling arbitrary computation on encrypted data.
Core operation: Programmable bootstrapping — evaluate any lookup table on an encrypted input in ~10ms (2024 benchmarks).
Security assumption: Learning With Errors (LWE) over the torus, reducible to worst-case lattice problems.
Post-quantum: Lattice-based; no known quantum speedup beyond Grover's (which is manageable with larger parameters).
Relevance to OBERISK: Patient records are encrypted under TFHE. When a doctor queries "does this patient have a penicillin allergy?", the query executes on ciphertext. The doctor receives the decrypted answer ("yes" or "no") but never sees the full record. The record is never in plaintext on any server, at any time. — validated experimentally in Section 5.
2.3 Lattice-Based Anonymous Credentials
Anonymous credential systems allow a holder to prove possession of attributes (age > 18, has_condition = diabetes) without revealing their identity or enabling cross-session linkability.
Classical schemes (BBS+, CL signatures) rely on pairings — broken by quantum computers.
Lattice-based constructions: Jeudy, Roux-Langlois et al. (2023) and Boschini et al. (2023) constructed the first practical anonymous credentials from Module-LWE and Module-SIS assumptions.
Status: Published 2023. No production deployments are known to us, and we are not aware of a healthcare-specific deployment. This is a potential differentiator for OBERISK, but the claim depends on deeper prior-art review.
Current limitation: Lattice-based credential proofs are approximately 100x larger than BBS+ proofs, making them challenging for bandwidth-constrained mobile scenarios.
Relevance to OBERISK: A patient presents a credential proving "I have been diagnosed with Type 2 diabetes and my A1C is above 7.0" to a pharmaceutical company's smart contract, without revealing their name, hospital, doctor, or any other medical history. The pharma company's Ozempic eligibility contract verifies the proof and approves the prescription. The patient's identity is never linked between presentations.
2.4 Sovereign Rollups and Modular Data Availability
Modular blockchain architecture separates three functions that monolithic chains bundle together:
Data Availability (DA): Guarantee that transaction data is published and retrievable. (Celestia, EigenDA — Al-Bassam et al., 2023)
Consensus/Ordering: Agree on transaction order.
Execution: Compute state transitions.
A sovereign rollup handles its own execution and consensus, posting data to a DA layer for availability guarantees. Unlike L2 rollups (which settle on an L1), sovereign rollups define their own fork-choice rules — they are not subject to the governance of an external chain.
Data Availability Sampling (DAS): Light nodes verify availability by sampling random chunks — O(√n) verification for n data.
Namespace Merkle Trees: Data is organized by namespace (e.g., "hospital-A", "patient-records"), enabling efficient filtering.
Relevance to OBERISK: Healthcare governance must be sovereign — upgrade decisions, validator admission, and privacy rules should be controlled by a healthcare consortium (hospitals, patient advocates, regulators), not Ethereum's validator set or Solana's foundation. The DA layer provides cryptographic availability guarantees without governance coupling.
ML-DSA (FIPS 204): Module-Lattice-Based Digital Signature Algorithm, derived from CRYSTALS-Dilithium. Provides post-quantum digital signatures.
SLH-DSA (FIPS 205): Stateless Hash-Based Digital Signature Algorithm, derived from SPHINCS+. Provides hash-based post-quantum signatures.
These standardizations validate the lattice and hash-based hardness assumptions on which OBERISK relies. The Module-LWE/SIS assumptions underlying our anonymous credential layer are the same assumption family that underpins ML-KEM and ML-DSA, now NIST-standardized. This significantly de-risks OBERISK's foundational cryptographic assumptions.
2.6 Alternative FHE Libraries and Compilers
Several FHE frameworks exist beyond Zama's Concrete/tfhe-rs. For context:
Microsoft SEAL: Implements BFV and CKKS schemes. Mature library, widely used in research. Focuses on arithmetic circuits over integers/reals. Does not natively support programmable bootstrapping (no gate-by-gate TFHE). Less suitable for OBERISK's boolean-circuit-style queries, but relevant for aggregate statistical computations on encrypted data.
OpenFHE (successor to PALISADE, HElib merger): Supports BGV, BFV, CKKS, and TFHE. Most comprehensive open-source FHE library. Could serve as an alternative backend for OBERISK's computation layer.
Zama Concrete (selected for OBERISK): Python/Rust compiler that takes high-level programs and automatically compiles them to optimized TFHE circuits. Unique advantage: developer-friendly abstraction that hides circuit-level complexity. Our micro-demo (Section 5) uses Concrete's Python frontend.
The choice of Concrete for OBERISK is driven by its compiler abstraction — healthcare developers should write eligibility logic in Python, not hand-craft FHE circuits. However, OpenFHE provides a viable alternative backend if Concrete's licensing or performance characteristics change.
DAS verification · Namespace Merkle Trees · Availability without governance coupling
3.2 Data Flow: Patient Record Update
Doctor authenticates via lattice-based credential → proves "board-certified cardiologist at Hospital X." The doctor's identity is verified and logged.
Patient grants consent — the doctor requests access to the patient's aggregated record. The patient approves via biometric, passphrase, or pre-authorized consent policy.
Full aggregated record accessible — the doctor can view the complete record, aggregated from all providers, labs, and specialists. X-rays, specialist notes, and lab results from different institutions appear in a single unified profile.
Every access is timestamped — the doctor's name, what they viewed, and the exact time are permanently logged on-chain. The patient can see the full audit trail at any time.
Doctor submits encrypted update — the new record entry (e.g., echocardiogram results) is encrypted under the patient's TFHE public key before leaving the doctor's device.
OBERISK chain validates — a STARK proof verifies that the state transition (old_record → new_record) follows the protocol rules (authorized updater, valid schema, correct timestamp).
Insurance query — insurer submits an encrypted query against the patient's encrypted record. TFHE computation returns "patient qualifies for coverage tier 2" without the insurer ever seeing the underlying diagnosis, test results, or treatment history.
3.3 Data Flow: Pharmaceutical Drug Eligibility (Smart Contract)
Pharma company deploys eligibility contract — "Patient must have: (a) diagnosis of Type 2 diabetes, (b) A1C > 7.0, (c) BMI > 30, (d) no contraindicated conditions."
Patient's credential issuer (their hospital) issues a lattice-based anonymous credential attesting to these attributes.
Patient presents selective disclosure proof — reveals only "meets criteria (a), (b), (c), (d) = true" without revealing actual A1C value, BMI, or any other data.
Smart contract verifies the ZK proof on-chain, marks the patient as eligible, and issues a prescription authorization token.
Pharmacy fills prescription — verifies the authorization token (also a credential presentation), dispenses medication.
At no point did the pharmaceutical company learn the patient's name, specific A1C level, BMI, hospital, or doctor.
4. Security Analysis
4.1 Threat Model
Adversary
Capability
OBERISK Defense
External attacker (BlackCat-class)
Compromises server, exfiltrates database
Data is TFHE-encrypted; exfiltrated ciphertext is computationally indistinguishable from random under LWE
Malicious insider (staff with credentials)
Authorized access, attempts to exfiltrate beyond scope
TFHE queries return only authorized function outputs; full record never decrypted
Colluding verifiers
Multiple parties attempt to correlate patient across interactions
Lattice-based credentials are unlinkable; presentations are rerandomized
State-level quantum adversary (2035+)
Runs Shor's algorithm on captured ciphertexts
All primitives (STARKs, TFHE, lattice credentials) are post-quantum; no elliptic curves in the stack
Malicious validator
Attempts to censor or reorder transactions
BFT consensus with f < n/3 tolerance; DA sampling ensures availability
Compromised key
Patient's TFHE secret key is stolen
Key rotation protocol: patient issues re-encryption request; old ciphertext is re-encrypted under new key via proxy re-encryption (lattice-based, Polyakov et al. 2022)
4.2 Composition Soundness
The critical research question: do these primitives compose securely, or does combining them introduce vulnerabilities absent from each individually?
Theorem (informal): If STARKs are sound (collision-resistant hash), TFHE is IND-CPA secure (LWE), and anonymous credentials are unforgeable + unlinkable (Module-LWE/SIS), then OBERISK provides:
Integrity: No computationally bounded adversary can forge a valid state transition proof (STARK soundness).
Confidentiality: No adversary learns anything about patient data beyond authorized function outputs (TFHE IND-CPA + circuit privacy).
Anonymity: No adversary can link two credential presentations by the same patient (credential unlinkability).
Post-quantum security: All guarantees hold against quantum adversaries with polynomial quantum resources.
Proof sketch: By hybrid argument. Assume adversary A breaks OBERISK. We construct adversary B that either:
Breaks STARK soundness (contradicts collision resistance of hash function), or
Breaks TFHE IND-CPA (contradicts LWE hardness), or
Since the primitives operate on independent inputs (STARK proves over commitments, TFHE encrypts data, credentials authenticate identity), their security games are separable. The composition does not introduce cross-primitive attack surfaces because:
STARKs verify state transitions over commitments to encrypted data — they never touch plaintext.
TFHE computes on ciphertext — it never touches identity credentials.
Credentials authenticate access requests — they never touch encrypted data directly.
Formal proof is the core research deliverable of this project.
4.3 Formal Security Definitions (Stubs)
The following formal definitions will be fully developed as part of the core research deliverable. We provide stubs here to clarify the precise security properties we aim to prove.
Note: Full formal treatment of these definitions and their composition is the core research deliverable.
4.3.1 IND-CPA Security Game for TFHE (in literature for individual primitive)
Game IND-CPA_TFHE(A, λ):
1. (pk, sk) ← TFHE.KeyGen(1^λ)
2. b ←$ {0,1}
3. (m₀, m₁, state) ← A₁(pk) // Adversary chooses two messages
4. c* ← TFHE.Encrypt(pk, m_b) // Challenger encrypts m_b
5. b' ← A₂(c*, state) // Adversary guesses b
6. Return (b = b')
Advantage: Adv^{IND-CPA}_{TFHE}(A) = |Pr[b' = b] - 1/2|
Security requirement: For all PPT adversaries A,
Adv^{IND-CPA}_{TFHE}(A) ≤ negl(λ)
Reduction: Adv^{IND-CPA}_{TFHE}(A) ≤ Adv^{LWE}_{n,q,χ}(B)
where B is a PPT adversary against the LWE problem with
dimension n, modulus q, and error distribution χ.
OBERISK extension: We must additionally show that TFHE circuit privacy holds — i.e., that the evaluated ciphertext TFHE.Eval(pk, C, c₁,...,cₖ) reveals nothing about the circuit C beyond its output. This is critical because healthcare queries (the circuit) may themselves be sensitive.
4.3.2 STARK Soundness Definition (in literature for individual primitive)
Definition (Computational Soundness of STARK):
A STARK system (P, V) for language L with relation R is
computationally sound if for all PPT adversaries A:
Pr[ V(x, π) = accept ∧ x ∉ L : (x, π) ← A(1^λ) ] ≤ negl(λ)
Equivalently, for the FRI-based instantiation:
Pr[ V accepts π for statement x :
∄ w such that R(x, w) = 1 ∧
(x, π) ← A(1^λ) ] ≤ negl(λ)
Soundness error: ε = O(1/|F|) per round, with ℓ rounds of
FRI folding giving total soundness error ε^ℓ + δ_hash
where δ_hash is the collision probability of the hash function.
OBERISK extension: We must prove that STARK soundness holds when the statement being proved involves commitments to TFHE ciphertexts — i.e., the STARK proves "this state transition on encrypted records was computed correctly" without the prover knowing the plaintext.
4.3.3 Credential Unlinkability Game (in literature for individual primitive)
Game Unlinkability(A, λ):
1. (ipp, isk) ← Issuer.Setup(1^λ)
2. (upk₀, usk₀) ← User.KeyGen(1^λ)
(upk₁, usk₁) ← User.KeyGen(1^λ)
3. cred₀ ← Issue(isk, upk₀, attrs₀)
cred₁ ← Issue(isk, upk₁, attrs₁)
// where attrs₀ = attrs₁ (same attributes, different users)
4. b ←$ {0,1}
5. π* ← Present(usk_b, cred_b, disclosure_policy)
6. b' ← A(ipp, π*, attrs₀)
7. Return (b = b')
Advantage: Adv^{Unlink}(A) = |Pr[b' = b] - 1/2|
Security requirement: For all PPT adversaries A,
Adv^{Unlink}(A) ≤ negl(λ)
Reduction: Adv^{Unlink}(A) ≤ Adv^{MLWE}_{n,q,χ}(B)
OBERISK extension: We must show that unlinkability holds even when the credential presentation is combined with a TFHE encrypted query — i.e., an adversary who sees both the credential proof and the TFHE query cannot link them across sessions.
4.4 Security Assumptions (Consolidated)
Assumption
Primitive
Quantum Status
NIST Status
Collision-resistant hashing (SHA-256/Poseidon)
STARKs/FRI
Secure (Grover gives √ speedup, mitigated by doubling output)
Standardized
Learning With Errors (LWE)
TFHE
Secure (best quantum algorithms are exponential)
NIST PQC Round 4 finalist basis
Module-LWE
Anonymous credentials
Secure (same family as CRYSTALS-Kyber/Dilithium)
NIST standardized (Kyber=ML-KEM FIPS 203, Dilithium=ML-DSA FIPS 204, finalized Aug 2024)
Module-SIS
Anonymous credentials
Secure (dual of Module-LWE)
Implicitly standardized via ML-DSA
The entire OBERISK stack reduces to two assumptions: hash collision resistance and lattice hardness (LWE/SIS family). This is a minimal and well-studied assumption set.
5. Preliminary Benchmarks: TFHE Micro-Demo
5.1 Overview
As of March 2026, we have completed a working micro-demo that supports a narrower claim: selected healthcare-style boolean queries can be executed on fully homomorphic encrypted data using Zama's Concrete library (Python frontend). The demo implements three representative computations of increasing complexity, all executing on TFHE-encrypted patient data.
All benchmarks were collected on a single-machine setup using concrete-python. Keygen is a one-time cost per circuit (amortized across all queries using that circuit). The execute time is the per-query cost — the time a server spends computing on encrypted data for each request.
5.2 Benchmark Results
Query
Description
Compile (s)
KeyGen (s)
Encrypt (s)
Execute (s)
Decrypt (s)
Total (s)
Allergy Lookup
Is patient allergic to penicillin? (boolean match)
0.530
0.881
0.005
0.873
0.002
2.291
Age Range Check
Is patient age between 18 and 65? (range comparison)
2.292
6.191
0.005
2.261
0.002
10.751
Ozempic Eligibility
A1C > 7 AND BMI > 30 AND has T2D diagnosis (compound boolean)
2.450
26.494
0.008
2.101
0.003
31.056
5.3 Analysis
All three queries returned correct results on real TFHE-encrypted data.
Key observations:
Encrypt/Decrypt are negligible (~2-8ms). The patient-side cost of encrypting data and decrypting results is effectively instant. This means the UX burden falls on the server (compute) side, not the patient side.
KeyGen scales with circuit complexity. The jump from 0.88s (simple boolean) to 26.5s (compound boolean with multiple comparisons) reflects the growth in bootstrapping key material. However, keygen is a one-time cost — once keys are generated for a circuit, they are reused for all queries against that circuit. In a production OBERISK deployment, keygen would occur during circuit deployment, not at query time.
Execute time is the critical metric. Per-query latency ranges from 0.87s (allergy lookup) to 2.26s (age range check). For non-emergency healthcare workflows (prior authorization, eligibility checking, claims processing), sub-3-second latency is operationally acceptable. For emergency lookups (e.g., allergy check in an ER), the 0.87s allergy lookup approaches feasibility.
Compile time is a one-time cost. The Concrete compiler translates Python to optimized TFHE circuits once; the compiled circuit is then reused. Compilation cost is irrelevant to runtime performance.
Gap to real-time requirements. Emergency medical lookups ideally require ~100ms latency. Our allergy lookup at 873ms is ~9x slower than this target. Hardware acceleration (GPU-based TFHE, e.g., Zama's forthcoming Concrete GPU backend) and circuit optimization are expected to close this gap.
5.4 Implications for OBERISK
These benchmarks support a narrower technical thesis: it is possible to compute selected healthcare-style boolean queries on TFHE-encrypted data today, with latency that may already be usable for some non-emergency workflows. They do not yet validate broader clinical workloads, multi-record queries, or emergency-room response targets.
The Ozempic eligibility query is particularly significant because it implements the exact compound boolean described in Section 3.3 (A1C > 7 AND BMI > 30 AND has Type 2 diabetes). This demonstrates that the eligibility logic itself is implementable at micro-demo scale under current TFHE tooling. It does not yet validate a production prior-authorization or smart-contract deployment.
6. Failure Modes and Limitations
6.1 Key Loss Scenarios
If a patient loses their TFHE secret key, all data encrypted under that key becomes permanently inaccessible. This is the most catastrophic failure mode in a patient-sovereign system.
Mitigations:
Threshold key management: Split the patient's secret key via Shamir's Secret Sharing (e.g., 3-of-5 threshold) across trusted parties: the patient's device, a hospital escrow, a patient-designated family member, a hardware security module, and a regulatory custodian.
Social recovery: Modeled after Ethereum's social recovery wallets — a set of guardians (chosen by the patient) can collectively reconstruct the key.
Time-locked recovery: A backup key is deposited in a time-locked smart contract; if the patient does not refresh the lock within a configurable period (e.g., 12 months), a designated recovery agent can retrieve the backup.
Residual risk: All mitigation strategies introduce additional trust assumptions. Threshold schemes require that fewer than the threshold number of custodians collude. Social recovery requires that guardians remain available and honest. These are fundamental tradeoffs in patient-sovereign systems.
6.2 TFHE Performance Degradation with Complex Queries
Our benchmarks (Section 5) show that keygen time grows from 0.88s to 26.5s (30x) as query complexity increases from a simple boolean match to a compound three-condition check. This trend will worsen for more complex queries.
Projected scaling concerns:
A query involving 10+ conditions (e.g., full medication interaction check across a patient's complete drug list) may require keygen times of minutes and execute times of 10+ seconds.
Full-record statistical analysis (e.g., "compute average blood pressure over 12 months of readings") is currently infeasible for real-time applications.
Circuit depth limitations in TFHE mean that deeply nested conditionals (if-then-else chains common in clinical decision trees) may hit bootstrapping noise ceilings.
Mitigations: Circuit optimization, batched bootstrapping (Zama's ongoing research), GPU acceleration, and limiting TFHE to targeted queries while using STARKs for aggregate computations.
6.3 Lattice Credential Proof Sizes
Current lattice-based anonymous credential constructions (Jeudy et al. 2023, Boschini et al. 2023) produce proofs approximately 100x larger than classical BBS+ signatures:
BBS+ selective disclosure proof: ~1-2 KB
Lattice-based credential proof: ~100-200 KB
For a mobile-first healthcare application where patients present credentials at pharmacies, clinics, or via smartphone, this is a significant practical limitation. A 200 KB proof transmitted over a cellular connection adds latency; repeated presentations (e.g., multiple credential checks during a hospital visit) compound the overhead.
Mitigations: Ongoing research into more compact lattice-based credentials, proof compression techniques, and the possibility of using hash-based accumulators for certain attribute proofs. This remains an active area of cryptographic research.
6.4 Cross-Primitive Leakage Points
While our composition soundness argument (Section 4.2) claims that the primitives operate on independent inputs, there are potential information flow points that require careful analysis:
Timing side channels: If TFHE execution time varies based on the encrypted data (e.g., branch-dependent computation), an observer of the compute server could infer information about the plaintext. TFHE's gate-by-gate evaluation is inherently constant-time for fixed circuits, but the Concrete compiler's optimizations may introduce data-dependent branches.
Ciphertext metadata: The size of a TFHE ciphertext may reveal information about the data schema (e.g., a patient with more medical history entries has a larger encrypted record).
Credential-query correlation: If a patient presents a credential and submits a TFHE query in the same session, network-level metadata (IP address, timing) could link the anonymous credential to the encrypted query, partially deanonymizing the patient.
STARK proof leakage: While STARKs are zero-knowledge, the statement being proved may itself reveal information (e.g., "a state transition occurred at timestamp T" reveals that someone updated their record at that time).
Mitigation: Traffic analysis protections (mix networks, batched submission), constant-size ciphertext padding, and formal analysis of the cross-primitive information flow. This is an open research question.
6.5 Validator Collusion Threshold
The sovereign rollup's BFT consensus tolerates at most f < n/3 Byzantine validators (where n is the total validator count). In a healthcare consortium context:
If the consortium has 30 validators (hospitals, insurers, patient advocates), collusion of 10+ validators can halt the chain or censor transactions.
Healthcare consortiums are small compared to public blockchains (30-100 validators vs. thousands). This makes the 1/3 threshold more practically concerning — 10 colluding hospitals is more plausible than 1,000 colluding Ethereum validators.
Validators in a healthcare consortium are not anonymous — they are known institutions. This enables regulatory and legal recourse against colluding validators but also means the collusion threshold is a function of institutional politics, not just cryptographic guarantees.
Mitigation: Diversify validator set across stakeholder types (hospitals, patient advocacy groups, academic medical centers, regulators, insurers). Require supermajority across categories, not just total count. Implement slashing conditions for detectably Byzantine behavior.
6.6 UX Challenges for Non-Technical Patients
Patient sovereignty requires patients to manage cryptographic keys, understand selective disclosure, and make informed decisions about data sharing. This creates significant UX challenges:
Key management: Non-technical patients cannot be expected to secure a 256-bit TFHE secret key. Wallet-style interfaces (modeled on cryptocurrency wallets) exist but have proven difficult for mass adoption — even in crypto-native contexts.
Consent comprehension: "Do you want to disclose attributes {A1C > 7, BMI > 30, has_T2D} to Eli Lilly's eligibility contract?" is meaningful to a cryptographer but opaque to most patients.
Revocation complexity: Revoking a credential or rotating a key requires understanding the implications (old data becomes inaccessible, new credentials must be re-issued).
Mitigation: Invest heavily in UX research. Design guardian/custodian models where a patient can delegate key management to a trusted party (family member, primary care physician) without surrendering sovereignty. Use plain-language consent interfaces with visual representations of what is and is not being disclosed.
7. Interoperability with Existing Systems
7.1 FHIR Compatibility
FHIR (Fast Healthcare Interoperability Resources) is the dominant standard for health data exchange, mandated by the 21st Century Cures Act (2016) and the ONC Interoperability Rule (2020).
OBERISK does not replace FHIR. It encrypts it.
FHIR resources (Patient, Observation, MedicationRequest, etc.) are serialized to their standard JSON representation.
The JSON payload is encrypted field-by-field under TFHE, producing an EncryptedFHIRResource.
FHIR search parameters map to TFHE-compatible query circuits — e.g., GET /Observation?code=blood-glucose&value-quantity=gt7.0 becomes a homomorphic comparison circuit.
Responses are standard FHIR bundles with encrypted fields replaced by decrypted query results (for authorized queries) or ZK proofs (for credential-based access).
This means OBERISK is a privacy layer on top of FHIR, not a replacement. Existing EHR systems (Epic, Cerner, Allscripts) that already support FHIR R4 can integrate OBERISK as middleware without rearchitecting their data models.
7.2 Regulatory Alignment
Regulation
OBERISK Compliance
HIPAA Privacy Rule
Patient controls all credential presentations; minimum necessary standard is mathematically enforced by TFHE (query returns only the function output, not the full record)
Interoperability: FHIR-native. Information blocking: patient holds decryption keys, not providers.
HITECH Act
Breach notification: moot — exfiltrated data is TFHE ciphertext, computationally useless without patient's key. Arguably, a TFHE-encrypted database theft is not a "breach" under HITECH's safe harbor provision.
EU GDPR (Art. 17, Right to Erasure)
Patient revokes credential + rotates TFHE key → old ciphertext is undecryptable. Functional erasure without modifying the immutable ledger.
FDA 21 CFR Part 11
Electronic signatures: lattice-based credentials provide non-repudiation. Audit trails: STARK-verified, immutable.
7.3 The Epic Question
Epic Systems holds ~38% of the U.S. acute care EHR market and a majority of U.S. patient records pass through Epic systems at some point. OBERISK does not require Epic's cooperation — but benefits enormously from it.
Three adoption vectors:
Compliance coercion: ONC's HTI-1 rule (2024) tightens interoperability requirements. If CMS or ONC mandates post-quantum encryption or patient-controlled access, Epic must comply. OBERISK provides a compliance pathway.
Middleware integration: OBERISK positions as a FHIR-compatible privacy layer. Epic's App Orchard marketplace already supports third-party FHIR apps. OBERISK could initially deploy as an Epic-compatible app that encrypts data flowing through FHIR APIs — no Epic source code changes required.
Bypass via patient sovereignty: Under the Cures Act, patients have the right to access their data via FHIR APIs. A patient-facing OBERISK app could pull records from Epic via existing APIs, encrypt them under the patient's TFHE key, and store them on the OBERISK chain. Epic becomes a data source, not a gatekeeper.
8. Stakeholder Incentive Analysis
8.1 Why Would Incumbents Allow This?
This is the hardest question. Technical elegance is irrelevant if no one adopts it. The honest answer is that incumbents will resist — unless the incentive structure makes resistance costlier than participation.
Insurance Companies
Current incentive: Information asymmetry benefits insurers. More data = better risk pricing = more profit. Why accept a "limited access view"?
OBERISK counterargument:
Fraud reduction: Healthcare fraud costs the U.S. $100B+ annually (NHCAA). TFHE-based computation lets insurers verify claims against encrypted records without human reviewers seeing (and potentially leaking) data. Fewer breach liabilities, lower compliance costs.
Regulatory pressure: The No Surprises Act (2022) and CMS transparency rules are already forcing insurers toward disclosure. OBERISK offers a framework where transparency (on-chain audit trails) coexists with privacy (encrypted data).
Game theory: In a market where one insurer adopts OBERISK and can provably demonstrate "we never see your data, we only verify your claims," consumer preference shifts. The first mover gains trust; holdouts look like they have something to hide.
Pharmaceutical Companies
Current incentive: Pharma wants maximum patient data for R&D, clinical trial recruitment, and targeted marketing.
OBERISK counterargument:
Smart contract eligibility eliminates the manual, fraud-prone prior authorization process. Faster approvals = faster revenue for blockbuster drugs (semaglutide products like Ozempic and Wegovy generated over $21 billion in 2023 revenue for Novo Nordisk).
ZK-verified clinical trial recruitment: Prove a patient meets all inclusion criteria without seeing their records. This solves the #1 bottleneck in clinical trials — 80% of trials fail to meet enrollment timelines (Tufts CSDD).
Who writes the smart contracts? This is a governance question. OBERISK proposes a multi-stakeholder model: the FDA defines eligibility criteria as formal specifications, pharma companies implement them as circuits, and an independent auditor verifies the circuit matches the specification. The patient's ZK proof is verified against the audited circuit, not the pharma company's claim.
Hospitals and Providers
Current incentive: Data lock-in = patient retention. If your records are trapped in Epic, you stay with Epic-using providers.
OBERISK counterargument:
Liability reduction: The average healthcare data breach costs $9.77M (IBM Cost of a Data Breach 2024), down from $10.93M the prior year — but still the highest of any industry for over a decade. If patient data is TFHE-encrypted, a server compromise doesn't expose PHI. Under HITECH's encryption safe harbor, this may not even qualify as a reportable breach.
Interoperability mandates: CMS and ONC are already imposing penalties for information blocking. OBERISK makes interoperability easy — FHIR-native, patient-controlled sharing — which reduces compliance burden.
9. Implementation Roadmap
Phase 1: Formal Foundations (Months 1-6)
Status: In progress (as of March 2026, TFHE micro-demo completed)
Deliverables:
Formal security model for composed system (STARKs + TFHE + lattice credentials)
Proof of composition soundness (hybrid argument, reduction to LWE/SIS + collision resistance)
Threat model specification (adversary classes, capabilities, OBERISK defenses)
Benchmark analysis: TFHE query latency for representative healthcare operations (allergy lookup, eligibility check, medication interaction)COMPLETED — see Section 5
Publication target: IEEE S&P or ACM CCS
Phase 2: Prototype Implementation (Months 6-12)
Deliverables:
STARK circuit for health record state transitions (using Winterfell or Miden VM)
Multi-node testnet with simulated hospital, insurer, and pharma nodes
FHIR middleware: intercepts FHIR API calls, encrypts under TFHE, routes through OBERISK
Smart contract framework for drug eligibility (Ozempic/Mounjaro as case studies)
Performance benchmarks: transactions per second, proof generation time, query latency
Partnership target: Academic medical center pilot (e.g., through CHIME or HIMSS contacts)
Phase 4: Governance & Adoption (Months 18-24)
Deliverables:
Governance framework: consortium model for validator admission, upgrade voting, dispute resolution
Regulatory analysis: formal mapping of OBERISK properties to HIPAA, Cures Act, GDPR requirements
Policy whitepaper for ONC/CMS: "Post-Quantum Healthcare Data Infrastructure"
Open-source release of all protocol components
Target: ONC Health IT Advisory Committee presentation
10. Current Differentiators and Claimed Contributions
Property
MedRec (MIT)
Medicalchain
BurstIQ
OBERISK
Patient data sovereignty
Partial
Partial
No
Design goal (patient holds TFHE key)
Data encrypted during computation
No
No
No
Micro-demo only (TFHE)
Post-quantum ZK proofs
No
No
No
Planned (STARKs)
Post-quantum encryption
No
No
No
Micro-demo only (TFHE/LWE)
Post-quantum identity
No
No
No
Planned (lattice credentials)
Anonymous, unlinkable access
No
No
No
Planned
FHIR-native interoperability
Partial
No
No
Planned
Sovereign governance
No
No
No
Planned
Formal composition proof
No
No
No
In progress
We are not aware of another healthcare proposal that aims to combine all of these properties in one design, but this differentiation claim should be treated as provisional until the related-work survey is expanded further.
11. Open Research Questions
TFHE performance at scale: Can programmable bootstrapping meet the latency requirements of emergency medical lookups (~100ms)? Our benchmarks (Section 5) show 873ms for a simple allergy lookup — ~9x the target. GPU acceleration and circuit optimization are expected to close this gap, but this remains unvalidated.
Lattice credential proof size: Current constructions produce proofs ~100x larger than BBS+. Can we reduce this to practical sizes for mobile-first healthcare apps? See Section 6.3 for detailed analysis. (size measurements); (reduction path)
Cross-primitive optimization: Can we share lattice parameters across TFHE and credential systems to reduce key material and improve efficiency?
Regulatory classification: Is TFHE-encrypted data legally "de-identified" under HIPAA's Safe Harbor? This has major implications for consent requirements.
Key management UX: How does a patient manage TFHE keys without creating a single point of failure? Threshold key management (Shamir secret sharing) is one approach, but the UX must be accessible to non-technical patients. See Section 6.6.
Validator economics: What is the incentive model for running an OBERISK validator? Healthcare consortiums have different economic models than PoS chains. Staking may be replaced by institutional commitment + regulatory mandate.
12. References
Ben-Sasson, E., et al. "Scalable, transparent, and post-quantum secure computational integrity." IACR Cryptology ePrint Archive (2018).
Chillotti, I., et al. "TFHE: Fast Fully Homomorphic Encryption over the Torus." Journal of Cryptology (2021).
Jeudy, C., Roux-Langlois, A., et al. "Lattice-Based Anonymous Credentials." IACR Cryptology ePrint Archive (2023).
Al-Bassam, M., et al. "LazyLedger: A Lazy Blockchain for Modular Data Availability." arXiv (2019).
Spiegelman, A., et al. "Bullshark: DAG BFT Protocols Made Practical." ACM CCS (2022).
Kothapalli, A., Setty, S., Parno, B. "Nova: Recursive Zero-Knowledge Arguments from Folding Schemes." CRYPTO (2022).
Gabizon, A., Williamson, Z., Ciobotaru, O. "PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge." IACR ePrint (2019).
Polyakov, Y., et al. "Lattice-Based Proxy Re-Encryption." IEEE Access (2022).
The author would like to thank Dr. Ravinder Mallarapu for guidance and mentorship on this work. Dr. Mallarapu brings 25 years of experience in financial research technologies, cybersecurity, and applied machine intelligence, including published work on cybersecurity data breach prevention systems.