DS-06-2017

Cybersecurity PPP: Cryptography -

About the connections

The graph above was generated based on the following links

Call text (as on F&T portal)

View on F&T portal
Specific Challenge:

In line with technological developments and emerging threats, the improvement of performance and efficiency of cryptographic solutions is a persistent need across ICT.

Scope

Proposals may address one or more of the areas/challenges described below but not necessarily all of them:

- Functional encryption solutions that offer more flexibility and make it feasible to process encrypted data held on the Internet. Research should aim for solutions beyond the current only partial homomorphic encryption algorithms under development.

Activities should also deal with measurement of information leaked when allowing for flexibility and preserving data formats. Additionally, means to reduce this leakage (e.g., anonymization or obfuscation) should be researched.

- For application areas such as the Internet of Things, implantable medical devices and sensor nodes that harvest energy from the environment there is a need for ultra-lightweight cryptology. Additional means to protect privacy in these applications (e.g. anonymity in communications) should be developed.

Even if Moore’s law would hold for the next 10-15 years, the progress in bandwidth and storage capacity grows faster than the computing power; and so this means that there is a need for ultra-high-speed cryptographic algorithms that are fully parallelizable and energy efficient as well as high speed encryption applied directly to the physical layer, for example using quantum cryptography. This challenge is related to the challenge of ultra-lightweight cryptology but the optimization target is very different and hence completely different designs are expected.

- Implementation (hardware or software) is often the weak point of the strongest cryptographic protocols: physical cryptanalysis, including tampering, side channel, faults injection attacks, has to be taken into account in the early phases of a development. A specific attention should be paid to the security of the implementation and its validation.

While development tools today include support for good software practices that avoid many common implementation errors, these tools insufficiently support good practices that can bring cyber-secure primitives and applications. Therefore, more progress is needed in the development of toolkits that integrate encryption seamless in their toolbox environment.

- Authenticated encrypted token research for mobile payment solutions and related applications. Most currently existing payment solutions emulate a credit or debit card payment scheme. Tokenized payment solutions can effectively reduce the risk of cyber-fraud and open options for alternative payment options to European citizens. The proposals should aim to create a real e-currency without compromising security or opening doors for criminals. Different projects may be envisaged, such as an e-€ wallet that can be held on a mobile and used to pay anywhere anytime combining convenience, flexibility and security without compromising the instrument with (inflated) transaction costs or possible criminal misuses.

- Innovative cryptographic primitives and complementary non-cryptographic privacy-preserving mechanisms to enforce privacy at various levels (e.g. pairing based cryptography).

- New techniques, such as quantum safe cryptography, which are secure from quantum computers and other advances in computing and cryptanalysis.

- Proposals on quantum key distribution addressing challenges such as improved performance (higher bit rates, increased loss and noise resilience), network integration (coexistence on existing infrastructure) and the development of new protocols beyond key distribution. Proposals on quantum key distribution should include experimentation and validation with end-users in realistic and relevant scenarios such as for mobile communication backhauling, optical access networks or data-centre to data-centre communication.

- Automated proof techniques for cryptographic protocols.

The Commission considers that proposals requesting a contribution from the EU between EUR 3 million and EUR 5 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

The outcome of the proposals is expected to lead to development up to Technology Readiness Level (TRL) 3 to 5; please see part G of the General Annexes.

Expected Impact:
  • Increase the trustworthiness of European ICT services and products and the competitiveness of the European cryptography and smart card industry.
  • Increased trust in ICT and online services.
  • Protecting the European Fundamental Rights of Privacy and Data Protection.
  • Communication networks with automatic interference detection.
  • Improvement in performance and efficiency of cryptography beyond the state of the art.
  • Protection against emerging threats such as quantum computation.

News flashes

2018-01-16

An overview of the evaluation results (flash call info) is now available under the ‘Additional documents’ section on the topic pages.

2017-08-25

A total of 160 proposals have been submitted in response to this call. The number of proposals for each topic is shown below including the indicative budget of the topic:

DS-07-2017-RIA: 63 proposals (indicative budget: 10 M€);DS-07-2016-IA: 15 proposals (indicative budget: 8 M€);DS-08-2017: 82 proposals (indicative budget: 17.6 M€);

The evaluation of the proposals will start by mid-September and will be closed by the end of the year. Applicants will be informed on the outcome of the evaluations in mid-January 2018.

2017-08-11

An overview of the evaluation results (called 'Flash Call Info') of the topic DS-06-2017of H2020-DS-LEIT-2017 call is now available here or under the 'Topic conditions & documents' section on the correspondant topic page.

2017-04-26

The submission of proposals to the H2020-DS-LEIT-2017 call closed on 25 April 2017. 34 RIA proposals were submitted to this call's DS-06-2017 topic.

2017-03-01
The submission session is now available for: DS-07-2017(IA), DS-08-2017(IA), DS-07-2017(RIA)
2017-01-20

An overview of the evaluation results (flash call info) is now available under the tab ‘Call documents’ for DS-02, DS-04 and DS-05.

2017-01-11

As of 1st January 2017, Switzerland is associated to the entire H2020 programme. In consequence, it is now also associated to this topic. In a nutshell, this means that Swiss partners in a proposal are now on an equal footing with partners from EU Member States or other Associated Countries. For the details, please read this note.

2016-12-08
The submission session is now available for: DS-06-2017(RIA)
2016-08-30

A total of 80 proposals were submitted in response to this call. The number of proposals for each topic is shown below including the indicative budget of the topic:

  • DS-02-2016: 45 proposals (indicative budget: 22 M€);
  • DS-04-2016: 22 proposals (indicative budget: 4 M€);
  • DS-05-2016: 13 proposals (indicative budget: 3 M€);

The evaluation of the proposals is planned to start by mid-September 2016 and will be closed by the end of December 2016. Applicants will be informed on the outcome of the evaluations before the end of January 2017.

2016-07-29

An overview of the evaluation results (flash call info) for the topic DS-01-2016 that closed on 12 April 2016 is now available here or under the ‘Topic conditions & documents’ section on each topic page.

2016-07-27

A revised version of the Work programme has been adopted for 2016-2017 on July 25 2016. The main changes concern:

  • New provisions on Open Access Data have been added for 2017 calls with an opening date on or after 26/07/2016.
  • Topic title and long description have changed DS-07-2017, DS-08-2017.
  • Budget has changed for DS-08-2017.

2016-04-14

By the deadline of 12 April 2016, 17:00 CEST, 37 Proposals were submitted to topicDS-01-2016:• 28 Research & Innovation Actions (RIA)referring to "Assurance"• 4 are Innovation Actions (IA)referring to "Security Certification" and• 5 are Coordination & Support Actions (CSA),

2016-03-15
The submission session is now available for: DS-05-2016(CSA), DS-04-2016(RIA), DS-02-2016(IA)
2015-10-20
The submission session is now available for: DS-03-2016(RIA)
call topic details
Call status: Closed
Publication date: 2015-10-14 (9 years ago)
Opening date: 2016-12-08 (8 years ago)
Closing date: 2017-04-25 (8 years ago)
Procedure: single-stage

Budget: 20500000
Expected grants: not specified
News flashes

This call topic has been appended 14 times by the EC with news.

  • 2018-01-16
    an overview of the evaluation results (f...
  • 2017-08-25
    a total of 160 proposals have been submi...
  • 2017-08-11
    an overview of the evaluation results (c...
  • 2017-04-26
    the submission of proposals to the h2020...
  • 2017-03-01
    the submission session is now available...
  • 2017-01-20
    an overview of the evaluation results (f...
  • 2017-01-11
    as of 1st january 2017, switzerland is a...
  • 2016-12-08
    the submission session is now available...
  • 2016-08-30
    a total of 80 proposals were submitted i...
  • 2016-07-29
    an overview of the evaluation results (f...
  • 2016-07-27
    a revised version of the work programme...
  • 2016-04-14
    by the deadline of 12 april 2016, 17:00...
  • 2016-03-15
    the submission session is now available...
  • 2015-10-20
    the submission session is now available...
Call

H2020-DS-2016-2017

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 7 other topics in this call:

Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2024-03-30_14-22-45

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 9 years ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 9 years ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 8 years ago

    The call opened for submissions.

  4. Closing date

    - 8 years ago

    Deadline for submitting a project.

  5. Time to inform applicants Estimate

    - 7 years ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  6. Sign grant agreement Estimate

    - 7 years ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)