Post-quantum cryptography transition

Grant Name
Post-quantum cryptography transition
Funder
Horizon Europe Framework Programme (HORIZON)
European Commission
Research Field
Digital Agenda
Deadline
2024-11-20
Grant Size
€18900000
Eligibility

General conditions


1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes


Proposal page limits and layout: described in Part B of the Application Form available in the Submission System


2. Eligible countries: described in Annex B of the Work Programme General Annexes


A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide.


3. Other eligibility conditions: described in Annex B of the Work Programme General Annexes


In order to achieve the expected outcomes, and safeguard the Union’s strategic assets, interests, autonomy, and security, participation in this topic is limited to legal entities established in Member States, associated countries, OECD countries. Proposals including legal entities which are not established in these countries will be ineligible.


4. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes


5. Evaluation and award:


  • Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes



  • Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual



  • Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes



6. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes


Specific conditions


7. Specific conditions: described in the [specific topic of the Work Programme]




Documents


Call documents:


Standard application form — call-specific application form is available in the Submission System


Standard application form (HE RIA, IA)


Standard evaluation form — will be used with the necessary adaptations


Standard evaluation form (HE RIA, IA)


MGA


HE General MGA v1.0


Additional documents:


HE Main Work Programme 2023–2024 – 1. General Introduction


HE Main Work Programme 2023–2024 – 6. Civil Security for Society


HE Main Work Programme 2023–2024 – 13. General Annexes



HE Programme Guide


HE Framework Programme and Rules for Participation Regulation 2021/695


HE Specific Programme Decision 2021/764


EU Financial Regulation



Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment


EU Grants AGA — Annotated Model Grant Agreement


Funding & Tenders Portal Online Manual


Funding & Tenders Portal Terms and Conditions


Funding & Tenders Portal Privacy Statement


Ownership control declaration (DEP, HE, EDF and CEF-DIG)

Grant Number
HORIZON-CL3-2024-CS-01-02
Description
ExpectedOutcome:

Projects’ results are expected to contribute to some or all of the following outcomes:

  • Increasing the maturity of current post-quantum cryptographic algorithms and contribution to further standardisation;
  • Easy-to-use tools for the large-scale implementation of post-quantum cryptographic algorithms, based on state-of-the-art standards;
  • Secure and efficient transition from pre- to post-quantum encryption through tools implementing a hybrid approach combining recognised pre-quantum public key algorithms and additional post-quantum algorithms;
  • Phase-in of post-quantum algorithms or protocols to new or existing applications;
  • Demonstrators and good-practice implementations of post-quantum cryptographic algorithms on varied hardware and software platforms;
  • Application-oriented recommendations for the widespread implementation of post-quantum cryptography across the EU.

Scope:

The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded - including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future still seems distant. There is a need to advance swiftly in the transition to quantum-resistant cryptography.

Post-quantum resistant cryptographic algorithms should be deployable in a dynamic manner in order to quickly react to new quantum computer developments. Recommendations for post-quantum cryptography have already been published, but have to be maintained up-to-date, Proposals received under this topic should contribute to developing coordinated European recommendations for the transition to post-quantum cryptography across the EU.

The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.

Funding resources

Purdue Grant Writing Lab: Introduction to Grant Writing Open Link
University of Wisconsin Writing Center: Planning and Writing a Grant Proposal Open Link

Quick share


Add deadline to calendar

2024-11-20

Have a funding opportunity that you want to list here?

Submit the grant details to support@peeref.com for review and listing.


Find the ideal target journal for your manuscript

Explore over 38,000 international journals covering a vast array of academic fields.

Search

Ask a Question. Answer a Question.

Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.

Get Started

Related opportunities

Open Topic
Security 2024-11-20 €6000000
Tracing of cryptocurrencies transactions related to criminal purposes
Terrorism 2024-11-20 €6000000
Detection and tracking of illegal and trafficked goods
Protection of citizens (goods and people... 2024-11-20 €6000000
Advanced real-time data analysis used for infrastructure resilience
Terrorism 2024-11-20 €5000000
Mitigating new threats and adapting investigation strategies in the era of Internet of Things
Internet of Things 2024-11-20 €5000000