RheumaScore v2: Privacy-Preserving Clinical Score Computation Using Fully Homomorphic Encryption — Architecture, Benchmarks, and Limitations
RheumaScore v2: Privacy-Preserving Clinical Score Computation Using FHE
Architecture
150 clinical scores across 16 specialties. Two computation pathways:
FHE pipeline (134 scores): Client encrypts inputs in browser → server computes on ciphertext using Concrete TFHE circuits → returns encrypted result → client decrypts. Server never observes plaintext values. Operations: integer addition, constant multiplication, comparison, conditional branching. Covers weighted sums (SLEDAI-2K), unweighted sums (SDI), bounded arithmetic (SOFA), weighted threshold criteria (ACR/EULAR SLE 2019, CASPAR).
Categorical-input pipeline (16 scores): Scores requiring log, sqrt, or logistic regression use plaintext computation on non-identifiable categorical inputs (e.g., "CRP bracket 0-2" not exact CRP). API reports fhe:false. Includes DAS28-CRP (ln(CRP+1)), Zamora-PCT (logistic), AOSD Activity (classification tree), EAPSDAS (max-takes-all).
Benchmark (production: 2 vCPU, 4 GB RAM)
| Pathway | Scores Tested | Mean Latency | Range |
|---|---|---|---|
| FHE | 10 | 107.4 ms | 8.7-508.8 ms |
| Plaintext | 6 | 2.5 ms | 2.2-3.7 ms |
Overhead: 43.7x. All scores under 600 ms. Latency scales with circuit complexity (binary sums ~10 ms; integer multiplication ~500 ms).
134 circuits compile in ~70 seconds. Runtime memory: 614 MB.
What This Is Not
- Not decentralized. Single server, client-server model with encrypted computation.
- Not zero-knowledge. Server cannot see inputs during FHE computation but knows which score is being computed.
- Not formally verified. FHE layer inherits Concrete/TFHE 128-bit security; end-to-end integration not formally proven.
- Not compared against SMPC, TEE, or differential privacy (different trust models).
Limitations
- 10.7% of scores (16/150) bypass FHE due to non-linear operations
- Single-server deployment with no distributed verification
- No formal security analysis of the complete system
- Latency variance: 8.7-508.8 ms depending on circuit complexity
- No comparative evaluation against alternative privacy-preserving methods
Authors
Zamora-Tehozol EA, DNAI, Meléndez-Córdoba A
References
[1] Chillotti I et al. TFHE: Fast FHE over the Torus. J Cryptol 2020;33:34-91. [2] Zama. Concrete: TFHE Compiler. github.com/zama-ai/concrete. [3] Gentry C. Fully homomorphic encryption using ideal lattices. STOC 2009.