DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PUBLICPQC

Transition to post-quantum Public Key Infrastructures -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • DIGITAL-2021-QCI-01-INDUSTRIAL
    Create a European Industrial Ecosystem for Secure QCI technologies and systems

    MOTIVATION This topic aims to build an ecosystem for secure quantum technologies, as a necessary foundation for the transition to post-quantum infrastructures. Same technology area, but broader objective, including infrastructure.

  • DIGITAL-2021-QCI-01-DEPLOY-NATIONAL
    Deploying advanced national QCI systems and networks

    MOTIVATION The deployment of national quantum systems completes the transition to post-quantum keys, particularly for network security. Similar deployment objectives, but different focus (quantum infrastructures vs. post-quantum PKI).

  • DIGITAL-2021-QCI-01-EUROQCI-QKD
    Coordinate the first deployment of national EuroQCI projects and prepare the large-scale QKD testing and certification infrastructure

    MOTIVATION Coordination of QKD deployments and preparation of test infrastructures are linked to post-quantum security (additional work for secure implementation).

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH
    Development and Deployment of Advanced Key Technologies

    MOTIVATION This topic shares the objective of developing and deploying advanced key technologies, in particular around post-quantum cryptography (so closely related field and objective).

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY
    Deployment of Post Quantum Cryptography in systems in industrial sectors

    MOTIVATION Sector-specific deployment of PQC solutions is directly linked to the transition of public PKI infrastructures (same type of deployment, but focus on industrial sectors).

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-06-TRANSITIONEUPQC
    Roadmap for the transition of European public administrations to a post-quantum cryptography era

    MOTIVATION This topic prepares public administrations for the transition to post-quantum cryptography, consistent with the deployment of suitable PKI infrastructures. (closely aligned with the objectives of this 2025 topic)

  • DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STANDARDPQC
    Standardisation and awareness of the European transition to post-quantum cryptography

    MOTIVATION Standardization and awareness-raising are key stages in the PQC transition, in conjunction with infrastructure deployment (complementary, more cross-functional).

Call text (as on F&T portal)

View on F&T portal
Expected Outcome:
  • New combiners ensuring that cryptographic schemes provide at least 128-bit security against quantum adversaries.
  • Experimental evaluation on hybrid certificates in several standard protocols that use those certificates, also considering options for different cryptographic algorithms at the root Certification Authority level and at the other levels, in terms of security, performance, and backward compatibility. The impact of such certificates in protocols should be tested via open-source libraries.
  • New and/or improved open-source libraries for certificate requests, issuance, validation, revocation and (privacy-friendly) certificate transparency.
  • Clear procedures taking into account all aspects of key management: requirements for signature generation, in terms of the software and hardware used to create signatures as well as the secure storage and handling of private keys to maintain their authenticity and confidentiality, signature validation, with specification of the data required for verifying signatures and outlining the conditions necessary for a successful signature verification process, signature life-cycle process, and validity status of signatures.
  • Test and evaluation of uses of X.509 certificates other than their core uses.
  • Tests and evaluation of alternatives to X.509 certificates.
  • Awareness activities and training courses.
Objective:

The overarching aim of this call is to tackle the challenges of an effective integration of PQC algorithms in Public Key Infrastructures (PKIs), which offers efficient migration strategies and strong business continuity guarantees.

The call targets the different actors involved in the PKI ecosystems and supply and value chains, who all have a unique set of diverse needs and interdependencies, such as Certificate Authorities (CAs), intermediate CAs, researchers, end-users in different domains, and vendors.

Scope:

Proposals shall target activities on the following subjects:

  • design of digital signature combiners and key encapsulation mechanism combiners.
  • the testing of deployment of certificates in protocols that use those certificates.
  • the development of novel protocols for Automatic Certificate Management and revocation and of novel protocols for (privacy-friendly) certificate-transparency.
  • the development of methods and tools that can be used by experts across various PKI domains, including all aspects of key management of asymmetric systems.

Proposals should carefully consider the requirements and constraints, such as security level, performance and business continuity, in a broad range of applications relevant for critical societal sectors and processes (such as governmental services, telecom, banking, smart homes, e-Health, automotive, and other sectors).

Proposals should address functions such as key establishment, digital signatures, and secure communication protocols that require careful adaptation with post-quantum counterparts to ensure resilience against threats posed by quantum-capable adversaries.

Proposals should safeguard compatibility with existing legacy systems. To achieve this, a transition to PKIs that support both pre-quantum and post-quantum cryptography should be addressed. The proposed systems should be able to seamlessly interact with legacy systems by disabling the post-quantum component as needed while preventing downgrade attacks. Relying solely on PQC solutions in this intermediate transition phase could introduce security risks given that the security analysis of the cryptosystems and of their implementations is not as mature as for their pre-quantum counterparts. Proposals should therefore use combinations of PQC solutions and established pre-quantum solutions, making sure to provide strongest-link security, meaning that the system remains secure as long as at least one of the components of the combination is secure.

For certificates for protocols that support negotiation, such as X.509 certificates for the Transport Layer (TLS), the use of post-quantum key exchange has already been demonstrated and can be implemented in a decentralised manner. Many other protocols need to be migrated, and this process will be more complex when old and new configurations must coexist. Moreover, for applications in IoT, smartcards, identity documents and others, the migration strategies defined for the core use cases of X.509 may well not work.

Proposals should develop clear procedures to effectively guide the various stakeholders involved in PKIs across different usage domains through the transition process.

Effective consortia should comprise a diverse range of actors along the entire PKI chain, encompassing expertise in areas such as software development, hardware implementation, cryptographic research, standardisation, policy, and application deployment, as well as organisations that can provide user case studies and real-world applications.

Activities should include some or all of the following:

  • Identification of requirements necessary to implement hybrid certificates.
  • Development of approaches and techniques for constructing cryptographic combiners for different protocols.
  • Testing of the combiners for issuance of new certificates for the different applications, taking into consideration the need to balance the growth of key, signature, and ciphertext sizes, which can lead to compatibility issues with standards, such as PKI certificates, revocation mechanisms, (privacy-friendly) certificate transparency mechanisms, the use of different cryptographic protocols across certificate chains, the applications requirements, such as security level, time-constraints in signing and verification steps, communication/computational and storage overhead, and hardware optimisation requirements.
  • Development of and/or further improvement of open-source libraries.
  • Development of novel protocols for Automatic Certificate Management and revocation, and of novel protocols for (privacy-friendly) certificate-transparency. Support to standardisation activities.
  • Development of recipes for the design and deployment of the new PKIs, with analysis that depends on each component of a given PKI. • Tests on specialised uses of X.509 certificates other than the core cases using TLS, such as roots of trust, device integrity, firmware signing, and others.
  • Design, improvement and testing of X.509 alternatives, such as, among others, Merkle tree ladders, the GNU Name System, older proposals such as SPKI and SDSI and the use of key encapsulation mechanisms for on-demand authentication in place of signatures.
  • Awareness and training activities for stakeholders with different profiles, emphasising the interdependencies in the transition and facilitating a broader understanding of the technical standards amongst PKI users.

Participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, this topic is subject to Article 12(5) of Regulation (EU) 2021/694.

News flashes

2025-08-08
The submission session is now available for: DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CYBERHEALTH, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PREPTEST, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PUBLICPQC
2025-08-08
The submission session is now available for: DIGITAL-ECCC-2025-DEPLOY-CYBER-08-CYBERHEALTH, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-NCC, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PREPTEST, DIGITAL-ECCC-2025-DEPLOY-CYBER-08-PUBLICPQC
call topic details
Call status: Open
Publication date: 2025-06-10 (1 month ago)
Opening date: 2025-06-12 (1 month ago)
Closing date: 2025-10-07 (1 month from now)
Procedure: single-stage

Budget: 15000000
Expected grants: 0
News flashes

This call topic has been appended 2 times by the EC with news.

  • 2025-08-08
    the submission session is now available...
  • 2025-08-08
    the submission session is now available...
Call

DIGITAL-ECCC-2025-DEPLOY-CYBER-08

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 2 other topics in this call:

Source information

Showing the latest information. Found 6 versions of this call topic in the F&T portal.

Information from

  • 2025-07-04_03-20-08
  • 2025-07-01_03-20-08
  • 2025-06-27_03-20-04
  • 2025-06-19_03-20-03
  • 2025-06-13_03-20-03
  • 2025-06-12_03-20-10

Check the differences between the versions.

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 3 months ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 1 month ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 1 month ago

    The call opened for submissions.

  4. Today

  5. Closing date

    - 1 month from now

    Deadline for submitting a project.

  6. Time to inform applicants Estimate

    - 6 months from now

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  7. Sign grant agreement Estimate

    - 9 months from now

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)

Bubbles

This call topic is part of: