Innovating Works
HORIZON-CL3-2023-CS-01-02
HORIZON-CL3-2023-CS-01-02: Privacy-preserving and identity management technologies
Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes:
Sólo fondo perdido 0 €
European
This call is closed This line is already closed so you can't apply. It closed last day 23-11-2023.
An upcoming call for this aid is expected, the exact start date of call is not yet clear.
Hace más de 17 mes(es) del cierre y aún no tenemos información sobre los proyectos financiados, no parece que se vaya a publicar esta información.
Presentation: Consortium Consortium: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Minimum number of participants.
This aid finances Proyectos:

Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes:

Improved scalable and reliable privacy-preserving and identity management technologies for federated and secure sharing and for processing of personal and industrial data and their integration in real-world systems;Improving privacy-preserving technologies for cyber threat intelligence and data sharing solutions;Privacy by design;Contribution to promotion of GDPR compliant European data spaces for digital services and research (in synergy with DATA Topics of Horizon Europe Cluster 4). Also, contribution to the promotion of eID Regulation compliant European solutions;Research and development of self-sovereign identity management technologies and solutions;Provide resource efficient and secure digital identity solutions for Small and medium sized enterprises (SME);Strengthened European ecosystem of open-source developers and researchers of privacy-preserving solutions;Usability of privacy-preserving and identity management technologies. Scope:Using big data for digital services and scientific research brings about new opportunities and challenges. For example, machine-... see more

Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes:

Improved scalable and reliable privacy-preserving and identity management technologies for federated and secure sharing and for processing of personal and industrial data and their integration in real-world systems;Improving privacy-preserving technologies for cyber threat intelligence and data sharing solutions;Privacy by design;Contribution to promotion of GDPR compliant European data spaces for digital services and research (in synergy with DATA Topics of Horizon Europe Cluster 4). Also, contribution to the promotion of eID Regulation compliant European solutions;Research and development of self-sovereign identity management technologies and solutions;Provide resource efficient and secure digital identity solutions for Small and medium sized enterprises (SME);Strengthened European ecosystem of open-source developers and researchers of privacy-preserving solutions;Usability of privacy-preserving and identity management technologies. Scope:Using big data for digital services and scientific research brings about new opportunities and challenges. For example, machine-learning methods process medical and behavioural data in order to find causes and explanations for diseases or health risks. However, a large amount of this data is personal data. Leakage or abuse of this kind of data, potential privacy risks (e.g. attribute disclosure or membership inference) and identity compromises pose threats to individuals, society and economy, which hamper further developing data spaces involving personal data. Likewise, there are similar challenges for the exploitation of non-personal/industrial data assets that may compromise the opportunities offered by the data economy. Advanced privacy-preserving technologies such as, for example, cryptographic anonymous credentials, homomorphic encryption, secure multiparty computation, and differential privacy have the potential to address these challenges. However, further work is required to ensure and test their applicability in real-world use case scenarios.

The security of any digital service or the access to data is based on secure digital identities. The eID Regulation provides the legal framework on which to build technological solutions that address the user needs concerning their digital identity. With regards to personal data, it is also important to develop self-sovereign identity solutions that give users complete control on their personal data and use.

Proposals should address usability, scalability and reliability of secure and privacy-preserving technologies in supply chain and take integration with existing infrastructures and traditional security measures into account. They should further take into account, whenever needed, the legacy variation in data types and models across different organizations. The proposed solutions should be validated and piloted in realistic, federated data infrastructures such as, for example, European data spaces. They should ensure compliance with data regulations and be GDPR compliant by-design. Open-source solutions are encouraged.

Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side, i.e. industry, service providers and, where relevant, end-users. The use of authentication and authorisation infrastructure framework tools developed for data spaces, and notably with the European Open Science Cloud, could be considered. Participation of SMEs is strongly encouraged. Legal expertise should also be added to ensure compliance of the project results with data regulations and the GDPR.

The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.

see less

Temáticas Obligatorias del proyecto: Temática principal: Privacy and identity management Digital Agenda Trust and privacy Cybersecurity Research Domains Privacy concerns behaviours and practices Security Authentication protocols/frameworks authorization Privacy by design (user-centric) privacy preservation Privacy Enhancing Technologies (PET)

Consortium characteristics

Scope European : The aid is European, you can apply to this line any company that is part of the European Community.
Tipo y tamaño de organizaciones: The necessary consortium design for the processing of this aid needs:

characteristics of the Proyecto

Requisitos de diseño: *Presupuesto para cada participante en el proyecto
Requisitos técnicos: Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes: Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes:
Financial Chapters: The chapters of financing expenses for this line are:
Personnel costs.
Expenses related to personnel working directly on the project are based on actual hours spent, based on company costs, and fixed ratios for certain employees, such as the company's owners.
Subcontracting costs.
Payments to external third parties to perform specific tasks that cannot be performed by the project beneficiaries.
Purchase costs.
They include the acquisition of equipment, amortization, material, licenses or other goods and services necessary for the execution of the project
Other cost categories.
Miscellaneous expenses such as financial costs, audit certificates or participation in events not covered by other categories
Indirect costs.
Overhead costs not directly assignable to the project (such as electricity, rent, or office space), calculated as a fixed 25% of eligible direct costs (excluding subcontracting).
Madurez tecnológica: The processing of this aid requires a minimum technological level in the project of TRL 6:. Se cuenta con prototipos piloto capaces de desarrollar todas las funciones necesarias dentro de un sistema determinado, habiendo superado pruebas de factibilidad en condiciones de operación o funcionamiento real. + info.
TRL esperado:

Characteristics of financing

Intensidad de la ayuda: Sólo fondo perdido + info
Lost Fund:
For the eligible budget, the intensity of the aid in the form of a lost fund may reach From a 70% up to a 100%.
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities. The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Guarantees:
does not require guarantees
No existen condiciones financieras para el beneficiario.

Additional information about the call

incentive effect: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
non -competitive competitive Very competitive
We do not know the total budget of the line pero en los últimos 6 meses la línea ha concecido
total granted en los últimos 6 meses.
minimis: Esta línea de financiación NO considera una “ayuda de minimis”. You can consult the regulations here.

other advantages

SME seal: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2023-CS-01 Privacy-preserving and identity management technologies Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes: Improved scalable and reliable priv...
Sin info.
HORIZON-CL3-2023-CS-01-01 Secure Computing Continuum (IoT, Edge, Cloud, Dataspaces)
en consorcio: Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes: Tools to support cybersecurity resi...
Cerrada does 1 year | next call scheduled for the month of
HORIZON-CL3-2023-CS-01-02 Privacy-preserving and identity management technologies
en consorcio: Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes: Improved scalable and reliable priv...
Cerrada does 1 year | next call scheduled for the month of
HORIZON-CL3-2023-CS-01-03 Security of robust AI systems
en consorcio: Expected Outcome:Projects’ results are expected to contribute to some or all of the following outcomes: Security-by-design concept and resi...
Cerrada does 1 year | next call scheduled for the month of