Opaque Blockchain Encryption for Risk

Scroll

100 million Americans had their medical records exposed in a single breach.

In February 2024, the BlackCat ransomware group breached UnitedHealth's Change Healthcare platform — the largest healthcare data breach in U.S. history. Change Healthcare processes roughly 15 billion medical transactions per year, touching nearly every hospital, pharmacy, and insurer in the country. When the system went down, the entire pipeline of payments, prescriptions, and patient records froze overnight.

UnitedHealth paid a $22 million ransom to the attackers. They took the money and never returned the data — an exit scam. Social Security numbers, credit card details, and medical billing information were sold to the highest bidder. The breach rippled outward to families and caregivers who never used the platform themselves. UnitedHealth's CEO Andrew Witty testified before Congress in May 2024, disclosing that roughly 100 million people were affected. UnitedHealth later confirmed in breach notification filings that the final count reached 192.7 million individuals — nearly 60% of the entire U.S. population.

192.7M
individuals affected¹
$22M
ransom paid, data never returned²
15B
medical transactions/year on the platform²

"I mean literally, you're talking about $0 in your bank account, and you have seventy employees to pay."

Dr. Catherine Mazzola, pediatric neurosurgeon — treats low-income children with cerebral palsy and spina bifida in New Jersey. When the breach halted all reimbursements, her practice lost an estimated $1 million. She wasn't alone: an AMA survey found that 80% of physician practices lost revenue from unpaid claims during the outage.3

The breach creates three cascading threats that outlast the attack itself:

Insurance Exploitation
Insurers can acquire stolen medical records and use them to raise your premiums and copays — pricing you based on conditions you never disclosed. Your private diagnoses become a tool used against you.
Identity Fraud
Criminals use stolen health identities to file false insurance claims, max out your policy limits, destroy your credit, and obtain prescription drugs to resell — all under your name, often without you knowing for months.
Record Manipulation
Bad actors can alter medical records — adding diagnoses you don't have, prescriptions you never took, or procedures that never happened. In systems without tamper-proof logs, these changes are nearly impossible to detect.

These threats don't require sophisticated hacking. In a 2017 study by Thales, 73% of healthcare professionals reported using a colleague's login credentials to access medical records — a clear HIPAA violation. 46% share work-related passwords across accounts used by multiple coworkers.5 In systems like MyChart or Change Healthcare, there is no tamper-proof record of changes made to documents, making it easy for anyone with access to quietly edit records with little chance of being caught.

Today, every doctor, nurse, or insurer who needs to check your records must first unlock all of them — even if they only need a single answer. Your pharmacist can see every prescription you've ever had. Your entire medical history sits exposed every time someone asks a simple question. And every visit, you fill out the same forms — your information passing through the hands of office staff, nurses, and filing systems, none of them built with cybersecurity in mind. These people have good intentions, but protecting your data isn't their expertise — and it shouldn't have to be.

What if no one ever had to unlock your records to use them?

Every question gets an answer. No question gets your whole story.

How it works

That's what homomorphic encryption makes possible. Think of it like a locked suggestion box: someone can drop a question in, the box processes it, and spits out an answer — but nobody ever opens the box. Your records stay locked the entire time. Only you hold the key.

Why it matters

The solution to healthcare breaches isn't more firewalls or stronger passwords. It's a fundamentally different approach: make the data useless to anyone who steals it. A hacker could steal your entire record and it wouldn't matter — without your keys, all they have is scrambled noise. The hospital never had the unscrambled version in the first place.

You decide who sees what

Your record lives on-chain by default, fully encrypted. The level of access is up to you — it could be unlocked with biometrics, a passphrase, or any method you choose. Nothing gets shared without your active consent.

Emergency access

What if you're unconscious or incapacitated? You designate a secondary keyholder — like a power of attorney or emergency contact — who can authorize access on your behalf. Your data stays protected, even when you can't protect it yourself.

"Now imagine that using mind-meld technology, I read your innermost thoughts without your knowledge… Like a doctor who makes a decision to operate without consulting the patient, I'm diminishing your autonomy by undermining it. I'm making your decision to share or not to share information with me completely moot. I've already made that decision for you."

Michael P. Lynch, philosopher and director of the Humanities Institute at the University of Connecticut, on why reading someone's private information without consent diminishes their autonomy as a person. When 100 million medical records are stolen, it's not just a financial crisis — it's a violation of personhood on a national scale.6

Regulation

The regulatory landscape is shifting fast. As of January 2026, new federal rules require prior authorization decisions in 7 days instead of 14 — with electronic data sharing mandated by 2027.

Industry demand

Deloitte found that 80% of healthcare executives say regulatory changes will shape their 2026 strategy, and 70% plan alliances with technology companies.4 The industry is actively looking for solutions like OBERISK.

Healthcare records need protection for 50+ years. A child born today will still need their medical history protected in 2080. OBERISK uses blockchain (what's a blockchain?) not as a buzzword, but as the backbone for a system where every access is permanently logged, every record is encrypted, and every computation happens without exposing the underlying data.

01

You have full control over your records. Hospitals can query them without ever seeing the raw data — and nothing is shared without your active consent, whether that's a biometric scan, a passphrase, or a tap.

02

With patient consent, doctors access the full aggregated record from every provider in one place. Every access is permanently timestamped — who viewed what, and when. See how this works

03

Every change to every record is permanently logged and mathematically verified — no one can secretly edit your chart.

04

The encryption is designed to survive even future quantum computers, which could break today's standard security.

In 2024, the U.S. government finalized new encryption standards designed to resist quantum computers.

The largest security upgrade in history is already underway.
OBERISK is built on it from day one.

ZERO PLAINTEXT
POST-QUANTUM
LATTICE HARDNESS
HOMOMORPHIC ENCRYPTION
SOVEREIGN GOVERNANCE
UNLINKABLE IDENTITY
STARK PROOFS
HEALTHCARE FIRST
ZERO PLAINTEXT
POST-QUANTUM
LATTICE HARDNESS
HOMOMORPHIC ENCRYPTION
SOVEREIGN GOVERNANCE
UNLINKABLE IDENTITY
STARK PROOFS
HEALTHCARE FIRST
Stakeholder Protocols

How OBERISK works for everyone involved.

Every interaction is permanently logged on a tamper-proof ledger. No one can quietly view, edit, or delete records. Here's what each person experiences:

Patient

You own your records.

"Who looked at my records? When? Why?"
01Every time someone accesses your data, it's permanently logged with a mathematical proof — you can see the full audit trail
02Your records are encrypted with your personal key — only you can see the full picture
03Suspect something wrong? Rotate your key instantly and all future access requires your new approval
Doctor

One record, every provider, fully aggregated.

"How do I access a patient's full history without calling five offices?"
01With patient consent, access the complete aggregated record — pulled from every provider, lab, and specialist into one place
02Every access is permanently timestamped with your name, what you viewed, and when — the patient sees the full audit trail
03X-rays, lab results, and specialist notes are added directly to the patient's encrypted profile — no more faxes, fragmented charts, or duplicate paperwork
Pharma

Verified eligibility, zero data exposure.

"Does this patient qualify for our drug?"
01Eligibility criteria (e.g., FDA requirements for a medication) are encoded as a smart contract
02The patient proves "I meet criteria A, B, C, and D" mathematically — without revealing their diagnosis, age, or any other details
03If eligible, the contract issues a verified prescription token — no human ever sees the underlying medical data
Insurer

Verify claims without seeing charts.

"How do we confirm coverage without accessing everything?"
01Submit a question to the encrypted record: "Does this patient qualify for this procedure?"
02The system returns a simple "yes" or "no" — the insurer never sees diagnoses, test results, or history
03A mathematical proof is attached to every answer, so the insurer can verify it's correct without trusting anyone

Four technologies. One unified system.

The problem

Today's encryption is like a lock that works perfectly — until someone builds a better lockpick. Quantum computers, which are advancing rapidly, will eventually crack the encryption that protects most of the internet, including healthcare data. An analysis published in Nature showed that quantum machines could dramatically reduce the time needed to break current blockchain security.7

Our answer

OBERISK is designed for this future. It combines four distinct technologies — each one handling a different part of the problem — and all of them use math that quantum computers can't crack. The entire system's security rests on just two well-studied mathematical foundations, meaning there are fewer things that can go wrong.

🔒

TFHE

LWE-based

The core breakthrough: run calculations on encrypted data and get correct answers — without ever decrypting it. The hospital can check if you're allergic to penicillin without seeing your full medical history.

STARKs

Hash-based / FRI

Mathematically prove that a computation was done correctly — without showing the data used. Think of it as a receipt that proves the math was right, without revealing what was calculated.

👤

Lattice Credentials

Module-LWE / SIS

A doctor can prove "I'm a licensed cardiologist" without exposing credentials to hackers or third parties — while the system still tracks exactly who accessed what. Every login is verified and auditable.

Sovereign Rollup

BFT Consensus

Not Bitcoin. Not Ethereum. A private blockchain built specifically for healthcare, governed by hospitals and regulators — not cryptocurrency miners. Every change is permanently recorded and auditable.

System Architecture

Five layers. Your data never leaves its vault. Zero exposure.

OBERISK is built in five layers, each handling a different job — identity, encryption, verification, execution, and storage. All five use quantum-resistant math, so even future supercomputers can't break in.

01
Identity Layer
Lattice Credentials
Prove you're authorized without revealing who you are. Each login looks completely unique — no one can connect your visits together.
Module-LWE
02
Privacy Layer
TFHE Homomorphic Encryption
Queries on ciphertext. The server computes answers without ever seeing plaintext — only the patient can decrypt results.
LWE
03
Integrity Layer
STARK Proofs + FRI
Every computation generates a mathematical proof that it was done correctly. Anyone can verify the proof, but no one learns the underlying data.
Hash
04
Execution Layer
Sovereign Rollup
A private blockchain run by hospitals and regulators, not crypto miners. The rules are set by healthcare stakeholders, not speculators.
BFT
05
Data Availability
Modular DA Layer
Ensures all records are always retrievable and intact, without any single organization controlling the storage. Anyone can verify data exists without downloading all of it.
DAS
Empirical Results

Real benchmarks on real encrypted medical data.

We ran three real clinical queries on fully encrypted patient records. The server answered each question correctly — without ever seeing the actual data. Here's what that looks like:

Question Asked
"Is this patient allergic to penicillin?"
Encrypted Computation
0.873s
server never sees plaintext
Answer
YES — MATCH
Question Asked
"Is this patient between 18 and 65 years old?"
Encrypted Computation
2.261s
server never sees plaintext
Answer
YES — IN RANGE
Question Asked
"Does this patient qualify for Ozempic?"
Encrypted Computation
2.101s
server never sees plaintext
Answer
YES — ELIGIBLE

All queries executed on real encrypted data using TFHE. Times measured on a single machine. The server produces correct answers without ever decrypting the record.

Security Model

Why is this actually secure? It comes down to two math problems.

Most security systems rely on dozens of assumptions — any one of which could fail. OBERISK's entire security rests on just two math problems that no one has ever solved — not with supercomputers, not with nation-states, and not even with quantum computers.

FOUNDATION 1

Hashing

Think of hashing like a fingerprint machine for data. You feed it any piece of information and it produces a unique "fingerprint" — a short code. But here's the key: you can't reverse it. You can't take the fingerprint and reconstruct the original data. OBERISK uses this to verify that records haven't been tampered with, without ever exposing what's inside them.
Quantum-SafeU.S. Government Standardized
FOUNDATION 2

Lattice Math

Imagine a grid of points in hundreds of dimensions. Finding the closest point in that grid is so difficult that no computer — not even a quantum computer — can do it efficiently. OBERISK uses this problem to encrypt your data and to create anonymous credentials. It's the same math the U.S. government chose in 2024 as the new standard for post-quantum encryption.
Quantum-SafeNIST Post-Quantum Standard
Threat Model

Every type of attack has a built-in defense.

We designed OBERISK assuming the worst-case scenario: hackers with government-level resources, corrupt insiders, and even future quantum computers. Every defense is built into the math itself — it doesn't depend on people following rules or policies.

Hackers

They break in and copy everything.

"What if someone steals the entire database?"
All data is encrypted with the patient's personal key. Without that key, the stolen files are indistinguishable from random noise — completely useless.
Rogue Employees

A nurse or admin abuses their access.

"What if someone on staff snoops?"
Staff can only run pre-approved questions like "Is this patient allergic to penicillin?" They get a yes or no — never the full record. They physically cannot see more than the answer to their question.
Hospital Collusion

Multiple hospitals try to track a patient.

"What if hospitals share notes to identify me?"
Every time you log in, the system generates a completely fresh credential. Even if two hospitals compare records, they can't prove it was the same person — each visit looks like a different individual.
Quantum Computers

Future machines crack today's encryption.

"What about quantum computers in 10 years?"
Every layer of OBERISK uses math that quantum computers cannot solve. Most systems today rely on encryption that quantum machines will eventually break — OBERISK does not.
Stolen Keys

Someone gets a patient's personal key.

"What if my encryption key is compromised?"
You can rotate to a new key instantly. Your old data is automatically re-secured under the new key — no need to re-encrypt everything from scratch. The compromised key becomes worthless.

Read the Current Preprint

The full research paper explains our approach in detail, including threat models, benchmark data, and the math behind each layer. The UX demo shows what the experience could look like for patients, doctors, and insurers.

Sources

  1. 1."Change Healthcare Data Breach." The HIPAA Guide, 2024. Updated breach notification confirmed 192.7 million individuals affected.
  2. 2.Krebs, Brian. "Change Healthcare Breach Hits 100M Americans." Krebs on Security, October 2024.
  3. 3.Silva, Daniella. "Brain Surgeon's Clash with UnitedHealthcare Shows Its Hardball Tactics." NBC News, 2025.
  4. 4.Betts, Dave, et al. "2026 US Health Care Executive Outlook." Deloitte Insights, Deloitte Center for Health Solutions, December 11, 2025.
  5. 5."Healthcare Data Security in a Cloud-Driven World." Cloud Security Alliance, citing Thales 2017 Healthcare Data Threat Report.
  6. 6.Lynch, Michael P. "The Philosophy of Privacy: Why Surveillance Reduces Us to Objects." The Guardian, May 6, 2015.
  7. 7.Fedorov, Aleksey K., et al. "Quantum Computers Put Blockchain Security at Risk." Nature, vol. 563, 2018, pp. 465–467.