TOPIC : Cybersecurity PPP: Cryptography
|Publication date:||14 October 2015|
|Types of action:||RIA Research and Innovation action|
|DeadlineModel: Opening date:||single-stage 08 December 2016||Deadline:||25 April 2017 17:00:00|
|Time Zone : (Brussels time)|
11 January 2017 17:47
As of 1st January 2017, Switzerland is associated to the entire H2020 programme. In consequence, it is now also associated to this topic. In a nutshell, this means that Swiss partners in a proposal are now on an equal footing with partners from EU Member States or other Associated Countries. For the details, please read this note.
Topic DescriptionSpecific Challenge:
In line with technological developments and emerging threats, the improvement of performance and efficiency of cryptographic solutions is a persistent need across ICT.Scope:
Proposals may address one or more of the areas/challenges described below but not necessarily all of them:
- Functional encryption solutions that offer more flexibility and make it feasible to process encrypted data held on the Internet. Research should aim for solutions beyond the current only partial homomorphic encryption algorithms under development.
Activities should also deal with measurement of information leaked when allowing for flexibility and preserving data formats. Additionally, means to reduce this leakage (e.g., anonymization or obfuscation) should be researched.
- For application areas such as the Internet of Things, implantable medical devices and sensor nodes that harvest energy from the environment there is a need for ultra-lightweight cryptology. Additional means to protect privacy in these applications (e.g. anonymity in communications) should be developed.
Even if Moore’s law would hold for the next 10-15 years, the progress in bandwidth and storage capacity grows faster than the computing power; and so this means that there is a need for ultra-high-speed cryptographic algorithms that are fully parallelizable and energy efficient as well as high speed encryption applied directly to the physical layer, for example using quantum cryptography. This challenge is related to the challenge of ultra-lightweight cryptology but the optimization target is very different and hence completely different designs are expected.
- Implementation (hardware or software) is often the weak point of the strongest cryptographic protocols: physical cryptanalysis, including tampering, side channel, faults injection attacks, has to be taken into account in the early phases of a development. A specific attention should be paid to the security of the implementation and its validation.
While development tools today include support for good software practices that avoid many common implementation errors, these tools insufficiently support good practices that can bring cyber-secure primitives and applications. Therefore, more progress is needed in the development of toolkits that integrate encryption seamless in their toolbox environment.
- Authenticated encrypted token research for mobile payment solutions and related applications. Most currently existing payment solutions emulate a credit or debit card payment scheme. Tokenized payment solutions can effectively reduce the risk of cyber-fraud and open options for alternative payment options to European citizens. The proposals should aim to create a real e-currency without compromising security or opening doors for criminals. Different projects may be envisaged, such as an e-€ wallet that can be held on a mobile and used to pay anywhere anytime combining convenience, flexibility and security without compromising the instrument with (inflated) transaction costs or possible criminal misuses.
- Innovative cryptographic primitives and complementary non-cryptographic privacy-preserving mechanisms to enforce privacy at various levels (e.g. pairing based cryptography).
- New techniques, such as quantum safe cryptography, which are secure from quantum computers and other advances in computing and cryptanalysis.
- Proposals on quantum key distribution addressing challenges such as improved performance (higher bit rates, increased loss and noise resilience), network integration (coexistence on existing infrastructure) and the development of new protocols beyond key distribution. Proposals on quantum key distribution should include experimentation and validation with end-users in realistic and relevant scenarios such as for mobile communication backhauling, optical access networks or data-centre to data-centre communication.
- Automated proof techniques for cryptographic protocols.
The Commission considers that proposals requesting a contribution from the EU between EUR 3 million and EUR 5 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.
The outcome of the proposals is expected to lead to development up to Technology Readiness Level (TRL) 3 to 5; please see part G of the General Annexes.Expected Impact:
- Increase the trustworthiness of European ICT services and products and the competitiveness of the European cryptography and smart card industry.
- Increased trust in ICT and online services.
- Protecting the European Fundamental Rights of Privacy and Data Protection.
- Communication networks with automatic interference detection.
- Improvement in performance and efficiency of cryptography beyond the state of the art.
- Protection against emerging threats such as quantum computation.
Topic conditions and documents
Please read carefully all provisions below before the preparation of your application.
- List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
Please also note that a number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects (follow the links to China, Japan, Republic of Korea, Mexico, Russia, Taiwan).
- Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
3.1 Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Submission and evaluation process: Guide to the submission and evaluation process
- Indicative timetable for evaluation and grant agreement:
Information on the outcome of the evaluation: maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
- Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Research and Innovation Action:
Specific provisions and funding rates
Standard proposal template
Standard evaluation form
H2020 General MGA -Multi-Beneficiary
Annotated Grant Agreement
- Additional provisions:
Horizon 2020 budget flexibility
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply.
- Open access must be granted to all scientific publications resulting from Horizon 2020 actions.
Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
Open access to research data
The Open Research Data Pilot has been extended to cover all Horizon 2020 topics for which the submission is opened on 26 July 2016 or later. Projects funded under this topic will therefore by default provide open access to the research data they generate, except if they decide to opt-out under the conditions described in annex L of the Work Programme. Projects can opt-out at any stage, that is both before and after the grant signature.
Note that the evaluation phase proposals will not be evaluated more favourably because they plan to open or share their data, and will not be penalised for opting out.
Open research data sharing applies to the data needed to validate the results presented in scientific publications. Additionally, projects can choose to make other data available open access and need to describe their approach in a Data Management Plan.
- Projects need to create a Data Management Plan (DMP), except if they opt-out of making their research data open access. A first version of the DMP must be provided as an early deliverable within six months of the project and should be updated during the project as appropriate. The Commission already provides guidance documents, including a template for DMPs.
- Eligibility of costs: costs related to data management and data sharing are eligible for reimbursement during the project duration.
The legal requirements for projects participating in this pilot are in the article 29.3 of the Model Grant Agreement.
- Additional documents
H2020 Work Programme 2016-17: Introduction
H2020 Work Programme 2016-17: Introduction to Leadership in enabling and industrial technologies (LEITs)
H2020 Work Programme 2016-17: Secure societies - protecting freedom and security of Europe and its citizens
H2020 Work Programme 2016-17: Dissemination, Exploitation and Evaluation
H2020 Work Programme 2016-17: General Annexes
Legal basis: Horizon 2020 - Regulation of Establishment
Legal basis: Horizon 2020 Rules for Participation
Legal basis: Horizon 2020 Specific Programme
- Flash Call Info en
No submission system is open for this topic.
H2020 Online Manual your online guide on the procedures from proposal submission to managing your grant.
Participant Portal FAQ – Submission of proposals.
National Contact Points (NCP) - contact your NCP for further assistance.
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
IT Helpdesk- contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
Ethics – for compliance with ethical issues, see the Participant Portal and Science and Society Portal
European IPR Helpdesk assists you on intellectual property issues
CEN and CENELEC, the European Standards Organisations, advise you how to tackle standardisation in your project proposal. Contact CEN-CENELEC Research Helpdesk at email@example.com.
The European Charter for Researchers and the Code of Conduct for their recruitment
Partner Search Services help you find a partner organisation for your proposal
Ideal-ist partner search facility