The Main Objective of this Action is

  • to bring together European experts in the different sub-areas of cryptography, with special focus on closing the growing gap between theoretical and practical research, and with the main goal of designing, analyzing and implementing cryptographic algorithms that allow citizens and entities to interact securely with each other.

The Mission of this Action is

  • To gain new understanding of cryptographic models and techniques, in order to face current and future security challenges.
  • To consolidate and strengthen the scientific excellence of European cryptographic research through cooperation between national efforts.

Specific scientific objectives include (but are not limited to):

  • Designing more efficient cryptographic protocols for digital interaction, including: secure multiparty computation, fully-homomorphic encryption, electronic voting systems, secure outsourcing of computation and storage, verifiable computation, etc.
  • Developing efficient cryptographic tools with advanced functionalities to be used in novel contexts, including: advanced encryption schemes (identity-based, functional encryption, searchable encryption etc.) and other advanced primitives such as homomorphic authenticators, anonymous credentials etc.
  • Developing cryptographic models where theoretically secure schemes are also secure in practice and where practically secure schemes can be formally analyzed.
  • Analyzing deployed cryptographic protocols, discovering vulnerabilities and designing appropriate countermeasures.
  • Designing and developing formal verification tools that permit establishing the correctness and security of cryptographic implementations to a high degree of assurance, integrating the capability to reason about cryptographic security proofs, implementation correctness and physical security.
  • Investigating optimizations and countermeasures (e.g., against side channel attacks) for cryptographic implementations, addressing possible vulnerabilities arising from incorrect implementation and the potential for automatic deployment via domainspecific development tools.
  • Developing more efficient cryptographic primitives, with particular focus on lowpower computing devices (e.g. RFID, Internet of Things, implantable devices).
  • Assessing the plausibility of proposed computational assumptions, including novel lattice assumptions.
  • Moving towards standardizing the most ubiquitous lattice-based schemes, such as digital signatures.
  • Constructing more efficient "advanced" lattice-based cryptographic primitives.

  • Cooperating with regulations and standard bodies in the compilation of recommendation and good practices in cryptography.
  • Training young scientists and PhD students with a proper understanding of the state of the art of cryptographic techniques.
  • Consolidating the exchange between the scientific community and companies and other entities involved in the development of cryptographic solutions.