BenchmarksStack Ranking
APIsPricingTokenDocsWhite PaperBlogAboutSecurity Demo
Log InGet API Key

HIPAA compliance you can prove mathematically, not just promise.

Every healthcare org signs a BAA and hopes for the best. H33-Health replaces hope with cryptographic proof — Kyber-encrypted PHI storage, zero-knowledge eligibility verification, and Dilithium-signed audit trails that are tamper-proof even against quantum computers.

Start Protecting PHI

EHR integrations check compliance boxes. Access controls log who opened a record. Encryption at rest protects a disk, not a query. None of it gives you a mathematical guarantee that PHI was never exposed — not to your staff, not to your vendors, not to an attacker who already has your database.

Not another EHR integration. Mathematical HIPAA compliance.

Here’s what happens when you store, verify, and compute on PHI with H33-Health.

Step 01 — Kyber-1024 Encrypted PHI Storage
Field-Level Post-Quantum Encryption
Patient records encrypted at the field level. SSN, allergies, labs — each field individually encrypted with Kyber-1024 key encapsulation. Even a full database breach reveals nothing. No plaintext PHI ever touches your servers, logs, or any intermediate cache. HIPAA §164.312(a)(2)(iv) encryption requirements satisfied by NIST post-quantum standards, not legacy AES that quantum computers will break.
Patient records encrypted at the field level. SSN, allergies, labs — each field individually encrypted with Kyber-1024 key encapsulation. Even a full database breach reveals nothing. No plaintext PHI ever touches your servers, logs, or any intermediate cache. HIPAA §164.312(a)(2)(iv) encryption requirements satisfied by NIST post-quantum standards, not legacy AES that quantum computers will break.
Step 02 — Zero-Knowledge Eligibility Verification
Prove Without Transmitting PHI
Prove a patient is insured, has a valid Rx, or meets clinical trial criteria without transmitting the underlying PHI. The verifier learns only true or false — nothing else. Insurance eligibility, prescription legitimacy, age thresholds, diagnostic criteria — all verified with zero-knowledge proofs. The data stays encrypted, the answer is mathematically guaranteed.
Prove a patient is insured, has a valid Rx, or meets clinical trial criteria without transmitting the underlying PHI. The verifier learns only true or false — nothing else. Insurance eligibility, prescription legitimacy, age thresholds, diagnostic criteria — all verified with zero-knowledge proofs. The data stays encrypted, the answer is mathematically guaranteed.
Step 03 — FHE Computation on Encrypted Records
Analytics Without Decryption
Run aggregate queries across encrypted patient data. Clinical trial matching, population health analytics, outcome tracking — all without decrypting a single record. Fully homomorphic encryption lets you compute on ciphertext and get the correct plaintext result. Researchers never see individual PHI. IRB-compliant by design, not by policy.
Run aggregate queries across encrypted patient data. Clinical trial matching, population health analytics, outcome tracking — all without decrypting a single record. Fully homomorphic encryption lets you compute on ciphertext and get the correct plaintext result. Researchers never see individual PHI. IRB-compliant by design, not by policy.
Step 04 — Dilithium-Signed Audit Trails
Tamper-Proof Compliance Proof
Every PHI access, verification, and computation produces a post-quantum tamper-proof audit entry signed with Dilithium-3 (FIPS 204). HIPAA §164.312(b) compliance is not a checkbox — it’s a mathematical guarantee. Auditors verify signatures, not trust. Generate compliance reports on demand with cryptographic proof of every access, every query, every result.
Every PHI access, verification, and computation produces a post-quantum tamper-proof audit entry signed with Dilithium-3 (FIPS 204). HIPAA §164.312(b) compliance is not a checkbox — it’s a mathematical guarantee. Auditors verify signatures, not trust. Generate compliance reports on demand with cryptographic proof of every access, every query, every result.
< 3 ms
full encrypt + verify + audit per PHI operation

Kyber-1024 field encryption + ZK eligibility proof + Dilithium audit signature — in a single API call under 3 milliseconds.

PHI protection pipeline — every operation, every proof, every audit entry.

ENCRYPT  Kyber-1024 field-level PHI encryption
VERIFY  ZK eligibility proof (true/false only)
COMPUTE  FHE query on encrypted records
AUDIT  Dilithium-signed tamper-proof log entry
Total: —
PHI Protection Pipeline

Every healthcare workflow touches PHI. None of them need to expose it.

Insurance Eligibility
Hospital proves patient has active coverage without sending SSN or policy details to the insurer. Zero-knowledge proof of eligibility — the insurer learns only true or false.
has_active_coverage(patient_id, procedure_code) → true/false
Prescription Verification
Pharmacy verifies Rx validity and prescriber credentials without accessing full medical history. Zero-knowledge proof of prescription legitimacy — no PHI transmitted.
verify_rx(rx_id, prescriber_npi) → valid/invalid
Clinical Trial Matching
Run FHE queries across thousands of encrypted patient records to find eligible candidates. Researchers never see individual PHI. IRB-compliant by design, not by policy.
fhe_match(criteria, encrypted_cohort) → [eligible_ids]
Lab Result Sharing
Encrypted results in Vault, ZK proof of “value within normal range” for insurance or employer wellness programs — without revealing the actual numbers.
in_normal_range(lab_result, reference) → true/false

The more you protect, the less each operation costs.

Health-0
3 units per operation
Kyber-encrypted PHI storage. Field-level encryption. Full audit log.
<25K units$0.18
25K–250K$0.12
250K–2.5M$0.075
2.5M–25M$0.036
25M+$0.018
Get Started
Health-1
8 units per operation
+ ZK eligibility verification. Prove coverage/Rx/criteria without transmitting PHI.
<25K units$0.48
25K–250K$0.32
250K–2.5M$0.20
2.5M–25M$0.096
25M+$0.048
Get Started
Health-2
15 units per operation
+ FHE computation on encrypted records. Aggregate analytics without decryption.
<25K units$0.90
25K–250K$0.60
250K–2.5M$0.375
2.5M–25M$0.18
25M+$0.09
Get Started
Health-3
25 units per operation
+ Dilithium-signed HIPAA compliance reports. BAA management. Consent-gated access with threshold (k-of-n).
<25K units$1.50
25K–250K$1.00
250K–2.5M$0.625
2.5M–25M$0.30
25M+$0.15
Get Started

Volume Unit Pricing

Monthly Volume $/Unit Health-0 (3u) Health-1 (8u) Health-2 (15u) Health-3 (25u)
<25K units $0.060 $0.18 $0.48 $0.90 $1.50
25K–250K $0.040 $0.12 $0.32 $0.60 $1.00
250K–2.5M $0.025 $0.075 $0.20 $0.375 $0.625
2.5M–25M $0.012 $0.036 $0.096 $0.18 $0.30
25M+ $0.006 $0.018 $0.048 $0.09 $0.15

How H33-Health compares

H33-Health Epic MyChart Cerner AWS HealthLake Azure Health Data
Post-quantum PHI encryption Kyber-1024 (NIST)
Field-level encryption Per-field Kyber KEM At rest only At rest only
Zero-knowledge verification ZK proofs (true/false)
FHE computation BFV on encrypted records
PQ-signed audit trail Dilithium-3 (FIPS 204) Access logs Access logs CloudTrail Activity logs
Compliance guarantee Mathematical proof Policy-based Policy-based Policy-based Policy-based

All units fungible — same balance as H33-Auth, H33-Vault, H33-Share, and H33-Shield.

HIPAA Technical Safeguards — Mapped to H33-Health

Every HIPAA §164.312 technical safeguard requirement mapped to a specific H33-Health cryptographic feature. Not policy-based — mathematically provable.

HIPAA Section Requirement H33-Health Feature Tier
§164.312(a)(2)(iv) Encryption & decryption Kyber-1024 field-level encryption Health-0+
§164.312(b) Audit controls Dilithium-signed tamper-proof logs Health-0+
§164.312(c)(1) Integrity controls Post-quantum signatures on all records Health-1+
§164.312(d) Person / entity authentication ZK eligibility verification Health-1+
§164.312(e)(1) Transmission security Kyber-1024 key encapsulation in transit Health-0+
§164.314(a) Business associate contracts Automated BAA management Health-3
§164.530(j) Record retention (6 years) Encrypted immutable audit archive Health-2+

Compliance is not a checkbox — every requirement above is enforced by post-quantum cryptographic primitives, not access control policies.

Frequently Asked Questions

How does H33-Health satisfy HIPAA technical safeguards?
H33-Health maps directly to HIPAA §164.312. Access control (§164.312(a)) is enforced via HMAC-SHA3 zero-knowledge authentication. Transmission security (§164.312(e)) uses Kyber-1024 encrypted channels. Integrity controls (§164.312(c)) are provided by SHA3-256 tamper-evident hashing. Audit controls (§164.312(b)) use Dilithium-signed immutable logs. Every requirement is addressed with post-quantum cryptography.
What does zero-knowledge eligibility verification mean for insurers?
A provider can verify that a patient is eligible for a specific procedure without learning the patient's full insurance details, and the insurer confirms eligibility without learning the patient's diagnosis. H33-Health uses ZK proofs to answer yes/no eligibility questions on encrypted data. Both sides get the answer they need. Neither side sees the other's private information.
How does FHE enable clinical trial matching?
Clinical trial criteria (age ranges, biomarker thresholds, diagnosis codes) are encoded as FHE computations. Patient records are encrypted with BFV and submitted for matching. The computation runs entirely on ciphertext, producing an encrypted yes/no result that only the patient's provider can decrypt. The trial sponsor never sees the patient's data. The provider never sees other patients' results.
What's the BAA process?
H33 executes Business Associate Agreements for all Health-tier customers. The BAA covers all PHI processed through H33-Health APIs, including FHE-encrypted data (which H33 cannot decrypt). BAA execution is handled during onboarding and typically completes within 48 hours. Custom BAA terms are available for enterprise accounts. The BAA is available for review before you sign up.
Does H33-Health integrate with Epic and Cerner?
Yes. H33-Health provides pre-built adapters for Epic (via FHIR R4 APIs and MyChart integration), Cerner (Oracle Health FHIR endpoints), and other major EHR systems. The adapter handles authentication with the EHR, encrypts PHI fields with Kyber-1024 on extraction, and returns encrypted records ready for FHE computation or secure storage. HL7 v2 ADT feeds are also supported.
Is H33-Health HL7 FHIR compatible?
Yes. H33-Health accepts and returns FHIR R4 resources (Patient, Observation, Condition, Coverage, Claim). PHI fields within FHIR resources are individually encrypted with Kyber-1024 while structural fields (resource type, identifiers) remain in cleartext for routing. This means your FHIR workflows continue to function while the sensitive content is post-quantum encrypted.
What happens during a HIPAA audit?
H33-Health generates audit-ready reports that map every API operation to the relevant HIPAA §164.312 control. Each entry in the audit trail is Dilithium-signed and independently verifiable. Reports include: who accessed what PHI (by role, not individual if de-identified), when, from where, and what operation was performed. Reports export as PDF or JSON for your compliance team or OCR auditors.
Does H33-Health support field-level encryption?
Yes. H33-Health encrypts at the field level, not the record level. A patient record can have the name, SSN, and diagnosis encrypted with different keys and different access policies, while the record ID and care team assignment remain in cleartext for routing. This enables fine-grained access control: a billing clerk can decrypt insurance fields but not clinical notes.
Can researchers query patient data without seeing PHI?
Yes. This is one of H33-Health's core use cases. Researchers submit queries as FHE computations (e.g., "count patients with diagnosis X and lab value above Y"). The computation runs on Kyber-encrypted records using BFV FHE arithmetic. The researcher receives an encrypted aggregate result that their institution decrypts. Individual patient records are never exposed at any point in the pipeline.
How does H33-Health handle consent management?
H33-Health includes a consent ledger where patient consent directives are stored as Dilithium-signed records. Each data access request is checked against the consent ledger before processing. Consent can be scoped by data category (clinical, billing, research), recipient, and time window. Patients can revoke consent via the API, and all subsequent access attempts are denied and logged.
How is de-identification handled?
H33-Health supports both HIPAA Safe Harbor (removal of 18 identifiers) and Expert Determination methods. With FHE, there's a third option: compute on encrypted data without de-identifying at all, because the compute engine never sees plaintext. For data exports, the de-identification pipeline strips or generalizes identifiers per your configured policy, with a Dilithium-signed attestation that the process was applied.
What are breach notification obligations when data is FHE-encrypted?
Under the HIPAA Breach Notification Rule, if PHI is encrypted to NIST standards and the encryption key was not compromised, it qualifies for the safe harbor exemption from notification. H33-Health's Kyber-1024 encryption exceeds NIST requirements. If encrypted data is exfiltrated but keys remain secure, you have a strong argument that no breach notification is required. H33 provides documentation to support this position.
How does multi-tenant PHI isolation work?
Each tenant (hospital, clinic, insurer) gets a dedicated Kyber-1024 key hierarchy. PHI from Tenant A is encrypted with keys that Tenant B's infrastructure cannot access. At the infrastructure level, tenant data is stored in isolated partitions with separate encryption contexts. Even if a storage-level breach occurred, cross-tenant decryption is cryptographically impossible without the other tenant's keys.
What's the BAA turnaround time and what does it cover?
Standard BAAs are executed within 48 hours of request. The BAA covers all PHI transmitted to, processed by, and stored within H33-Health infrastructure, including FHE-encrypted data that H33 cannot decrypt. It covers subcontractors (cloud infrastructure providers) and includes breach notification obligations, permitted uses, and termination provisions per 45 CFR §164.504(e).
How does H33-Health handle state-specific health privacy laws?
H33-Health's field-level encryption and consent ledger are configurable per jurisdiction. For California (CCPA/CMIA), consumer health data has additional access and deletion rights enforced at the API layer. For Washington (My Health My Data Act), sensitive health data categories receive elevated encryption and consent requirements automatically. Policy configurations for all 50 states are available and updated as legislation changes.

Start Protecting PHI

Free tier includes 1,000 units. No credit card required.