A protocol for exchanging hashed patient identifiers between two parties without requiring either party to share PII, depend on a shared vendor, or trust the other unilaterally.
THIIC is a protocol, not a platform. It composes four standard cryptographic primitives — SHA-256, HKDF, AES-256-GCM, ED25519 — in a bilateral salting configuration that lets two parties exchange hashed patient identifiers without either party possessing enough cryptographic context to act alone.
The protocol was designed for healthcare data partnerships. Bilateral exchanges between a data licensor and an activation partner, with audit and compliance as first-class concerns.
THIIC is not new cryptography. It is a configuration of proven primitives, optimized for a specific shape of partnership.
┌─────────────────┐ ┌──────────────┐ ┌─────────────────┐
│ SENDER │ ── │ WIRE │ ── │ RECIPIENT │
│ │ │ │ │ │
│ 1. HASH │ │ 3. TRANSMIT │ │ 4. DERIVE KEY │
│ 2. WRAP │ │ │ │ 5. UNWRAP │
└────────┬────────┘ └──────────────┘ └────────┬────────┘
│ │
│ BILATERAL KEY │
└──────────────────┬─────────────────────────┘
│
K_sender & S_recipient
Five operations, two environments, one transit. No PII crosses. No party acts alone.
A working demonstration of the protocol — real cryptography, synthetic patient data, full bilateral flow from hashing through activation simulation. Built for technical evaluation.
The full protocol specification, security model, and industry comparison. Three pages. Forwardable to technical teams.
The THIIC Technical Reference has been sent to your inbox. Check your email and download the PDF.
THIIC was developed by Summit Audience Segments as the bilateral data exchange protocol underlying every Summit data licensing agreement. The protocol is not separately licensed — it ships with every Summit license at no additional cost.
Summit operates a 20-year exclusive license on proprietary healthcare data covering 12.17M condition-confirmed patients. THIIC is how that data moves.
Learn about Summit Audience Segments →