Research & Innovation - Participant Portal


TOPIC : Cybersecurity, Trustworthy ICT

Topic identifier: ICT-32-2014
Publication date: 11 December 2013

Types of action: RIA Research and Innovation action
CSA Coordination and support action
Opening date:
11 December 2013
Deadline: 23 April 2014 17:00:00

Time Zone : (Brussels time)
  Horizon 2020
Topic Description

Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.

The challenge is to find solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities.


a.      Research & Innovation Actions

         Security-by-design for end-to-end security

Security-by-design paradigms have to be developed and tested, to providing end-to-end security, across all hardware and software layers of an ICT system and application and business services. Special attention has to be paid to the interaction of the layers and to a holistic approach. Platform independent solutions are needed to provide context aware and self-adaptive security in highly connected, complex and interoperable networks.

Automated security policy governance for such environments has to be addressed, allowing for run-time verification, customisation and enforcement between operators or virtual entities, in multi-layer and multi-service systems, spanning multiple domains or jurisdictions.

Open and dynamically reconfigurable environments need special attention, as well as environments where the user or provider has to rely on other providers, not necessarily of trustworthy origin.

The developed security-by-design solutions are expected to be usable in their deployment and implementation in order to decrease the security risks associated with improper use or misconfiguration and thereby allowing the user to trust devices and services intuitively.


Research projects have to address the key challenges to guarantee the security for the lifespan of the application it supports, to stay ahead of the evolution of the ICT environment and keep pace with the performance increase of ICT technology. The challenges to be addressed include:

-       Resource efficient and highly secure technology for hardware based real-time cryptography;

-       Resource efficient, real-time, highly secure fully homomorphic cryptography;

-       Distributed cryptography including functional cryptography;

-       Cryptographic tools for securely binding applications to software, firmware and hardware environments, with or without the possibility to adapt the cryptographic primitives which are used;

-       Post-quantum cryptography for long term security;

-       Quantum key distribution (QKD) systems and networks for long-term security by design, as well as networks supporting information theoretic cryptographic primitives, including but not restricted to the integration into existing optical networks (e.g. trusted nodes and/or using multiplexing), addressing:

                                        i.    low cost components for short-distance, low-bit-rate quantum key-distribution;

                                      ii.    high-bit rate QKD systems that are tolerant to noise and loss.

Projects have to demonstrate a net increase in performance, or reduction in energy or power consumption, compared to state-of-the-art approaches and have to validate the proposed technology in realistic application scenarios, taking into account the current trends in ICT like cloud, mobile, IoT, etc. Activities may include methods for provable security against physical attacks, as well as research toward security certification.

b.      Activities supporting the Cryptography Community

To complement the research activities in cryptography support and coordination actions should address the following aspects:

-       ensure a durable integration and structuring of the European cryptography community, involving academia, industry, law enforcement and defence agencies.

-       strengthen European excellence in this domain.

-       provide technology watch, joint research agendas and foresight studies.

-       identify technology gaps, market and implementation opportunities.

-       provide technical expertise to the cybersecurity and privacy communities.

-       contribute to the development of European standards, including for the public sector.

-       solve training needs and skill shortage of academia and industry.

-       evaluation and verification of cryptographic protocols and algorithms.

-       organize open competitions with security and implementation benchmarking.

-       dissemination and outreach, strengthening the link with institutional stakeholders.

Expected impact:

At macro level:

         a new paradigm for the design and implementation of ICT technology.

         ICT designed in Europe offering a higher level of security and/or privacy compared to non-European ICT products and services.

         ICT products and services compliant with Europe's security and privacy regulation.

         ICT with a measurably higher level of security and/or privacy, at marginal additional cost compared to ICT technology following the traditional designs (i.e. implementing security as add-on functionality).

At societal level:

         increase user trust in ICT and online services.

         improve users' ability to detect breaches of security and privacy.

         improved protection of the user's privacy, in compliance with applicable legislation.

         more resilient critical infrastructures and services.

At research and innovation level: a new generation of ICT systems, applications and services that

         empowers users to take control over their data and trust relations.

         provides security and privacy as a built-in feature, simpler to understand and manage for the user compared to traditional ICT.

         ICT solutions allowing the user to monitor if her/his rights-online are respected and in compliance with the EU regulation.

         simplify the implementation of cryptographic primitives.

         ICT technology that is proofed to be more secure than ICT designed the traditional way.

Instrument, funding level and budget

a.    Research & Innovation Actions – A mix of proposals requesting Small and Large contributions are expected

b.    Coordination and Support Actions

Topic conditions and documents

Please read carefully all provisions below before the preparation of your application.

To see the budget earmarked for this topic, please look at the call budget distribution table by topic in the workprogramme.

  1. List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
  2. Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
  3. Evaluation

    3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme

    3.2 Guide to the submission and evaluation process
  4. Proposal page limits and layout: Please refer to Part B of the standard proposal template.
  5. Indicative timetable for evaluation and grant agreement:
    Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
    Signature of grant agreements: maximum 3 months from the date of informing successful applicants.
  6. Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:

    Research and Innovation Action:

    Specific provisions and funding rates
    Standard proposal template (administrative forms and structure of technical annex)
    Standard evaluation form
    Annotated Model Grant Agreement

    Coordination and Support Action:

    Specific provisions and funding rates
    Standard proposal template (administrative forms and structure of technical annex)
    Standard evaluation form
    Annotated Model Grant Agreement
  7. Additional provisions:

    Horizon 2020 budget flexibility

    Classified information
  8. Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.


Additional documents

  • Call Flash Info en
  • Legal basis - Framework Programme H2020 en
  • Legal basis - Specific Programme H2020 en
  • WP H2020 - 1. Introduction en
  • WP H2020 - 5. Introduction to Leadership in enabling and industrial technologies (LEITs) en
  • WP H2020 - 5i. Information and communication technologies (ICT) en
  • WP H2020 - 17. Communication and Dissemination en
  • WP H2020 - 19. General Annexes en
  • A guide to ICT-related activities in WP2014-15 en

Submission Service

No submission system is open for this topic.

Get support

National Contact Points (NCP) – contact your NCP for further assistance.

Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.

B2Match networking platform with project ideas and participant profiles following the networking event in ICT 2013 in Vilnius

Ideal-IST partner search facility

Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.

IT Helpdesk – contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.

Ethics – to ensure compliance with ethical issues, further information is available on the Participant Portal and on the Science and Society Portal.

European IPR Helpdesk assists you on intellectual property issues.

The European Charter for Researchers and the Code of Conduct for their recruitment

CEN and CENELEC, the European Standards Organisations, advise you how to tackle standardisation in your project proposal. Contact CEN-CENELEC Research Helpdesk at

Partner Search Services helps you find a partner organisation for your proposal.

H2020 Online Manual your online guide on the procedures from proposal submission to managing your grant.