European UnionNon-profit, Private Business, Research Institution, Public Institution

Privacy Enhancing Technologies

Horizon Europe Civil Security for Society - Increased Cybersecurity

Funding Amount

€3.0M - €4.0M

Deadline

12/11/2025

Eligible Organization Types

Non-profit, Private Business, Research Institution, Public Institution

Trusted by

trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo
trusted by logo

What is the Privacy Enhancing Technologies Call?

Grant Description
This research and innovation action supports the development, testing and integration of privacy-enhancing technologies to protect personal and industrial data while enabling secure data processing and sharing. It addresses risks to privacy from advanced data analytics, quantum threats and supply chain vulnerabilities. Projects will produce robust, scalable, usable and GDPR-compliant solutions, promote privacy-by-design, post-quantum readiness and support EU strategic autonomy in cybersecurity.
Required Results for Successful Funding

Expected Outcomes

Projects funded under this call are expected to deliver one or more of the following outcomes:

• Robust, scalable and reliable privacy-upholding technologies for federated and secure data sharing in real-world systems

• Privacy-preserving approaches for cyber threat information sharing and collaborative computations with sensitive data

• Privacy-by-design integrated at the core of software/protocol development, with crypto-agile, modular implementations supporting post-quantum transition

• Privacy-enhancing technologies tailored for constrained devices

• Contributions to GDPR-compliant European data spaces for digital services and research (e.g., health data)

• PETs and solutions addressing the needs of citizens and SMEs

• Blockchain-based and decentralized PETs ensuring confidentiality, integrity and authenticity of transactions and digital assets, potentially combined with federated learning

• Insights into the usability and user experience of PETs, guiding the design of secure yet user-friendly systems
Funded areas

Scope Requirements

Projects must:

• Protect individuals’ personal data and privacy while enabling secure data processing and analysis

• Exploit both personal and non-personal/industrial data assets without compromising privacy or economic stability

• Address security against quantum adversaries via modular, post-quantum PET schemes and quantum-resistant PET design and analysis

• Improve the practical usability, scalability and dependability of PETs in realistic environments

• Integrate PETs into common European data spaces, aligning with GDPR and relevant Cluster 4 DATA topics

• Ensure seamless integration with existing infrastructures and conventional security protocols

• Accommodate diverse data types and models across organizations, with validation and pilot runs in real-world settings

• Embed privacy-by-design principles at every stage of software and protocol development

• Involve interdisciplinary consortia spanning industry stakeholders, service providers, end-users, SMEs and legal/regulatory experts

• Proactively identify and assess potential regulatory hurdles and constraints for the developed technologies
Additional Conditions for Applicants

Special Conditions

• Participation is limited to legal entities established in eligible countries (per WP General Annex B); entities controlled by non-eligible countries are excluded

• Applicants (except for topic CS-ECCC-03) must submit an Ownership Control Declaration annex

• Grants take the form of lump sums under the Horizon Europe Lump Sum MGA model (HORIZON-AG-LS)

• Single-stage submission; proposals must respect page limits and layout rules (Annex A/E and Part B of the Application Form)

• Admissibility, eligibility, financial/operational capacity, exclusion, evaluation and award criteria follow Horizon Europe General Annexes (B, C, D, E, F, G)

• Projects will be implemented under the contribution agreement entrusting ECCC with call execution

• Applicants should liaise with National Cybersecurity Coordination Centres and may contact the ECCC Applicants Direct Contact Centre
Important dates

Open from: 12/06/2025

Deadline:12/11/2025

Win your grant with Cogrant

How cogrant works

Smart Funding Fit Check
Smart Funding Fit Check

Instantly know if your project fits call criteria. Our system highlights strengths, gaps, and risks, so you only apply when your chances are real.

Intelligent Research Engine
Intelligent Research Engine

Our research engine digs deeper than any founder could alone. It pulls data about your company, your market, and even your competitors - giving your proposal an edge backed by facts, not fluff.

Full Proposal Development
Full Proposal Development

Our system builds your entire proposal from start to finish, ensuring every section is complete, coherent, and crafted to the highest quality. You focus on your vision — we deliver the winning document.

Expert Review
Expert Review

Our experts run a complete review before delivery, ensuring your draft proposal is accurate, well-structured, and polished. You’ll receive a high-quality draft that’s ready for your final touches before submission.

Our Numbers

Results that speak for themselves

70+
proposals prepared
€36.7M
total funding secured for clients
65%
win rate in highly competitive calls

Frequently asked questions