SciTransfer
Organization

MULTICERT - SERVICOS DE CERTIFICACAO ELECTRONICA SA

Portuguese Certification Authority and eIDAS Trust Service Provider with operational PKI, digital signatures, and privacy-preserving identity research experience.

Infrastructure providersecurityPTNo active H2020 projectsThin data (2/5)
H2020 projects
2
As coordinator
0
Total EC funding
€562K
Unique partners
27
What they do

Their core work

MULTICERT is a Portuguese Certification Authority (CA) and qualified Trust Service Provider (TSP) operating under the EU eIDAS regulation — they issue digital certificates, electronic signatures, and authentication credentials used by businesses and public institutions across Portugal and Europe. Their core infrastructure is Public Key Infrastructure (PKI): the technical backbone that makes legally binding digital transactions possible. In H2020 projects, they contributed this rare operational expertise — not as researchers, but as the party that actually runs the trust machinery that academic and industrial partners design around. Any consortium needing a real, regulated TSP to validate or deploy digital identity and trust research would find MULTICERT one of the few partners in Southern Europe that can fill that role.

Core expertise

What they specialise in

Public Key Infrastructure (PKI) and digital certificatesprimary
2 projects

Both FutureTrust and OLYMPUS are trust and identity projects where MULTICERT's CA/PKI operations are the core industrial contribution.

Cross-border digital trust services under eIDASprimary
1 project

FutureTrust (2016-2019) explicitly targeted trustworthy global transactions, directly aligned with MULTICERT's role as a qualified TSP.

Privacy-preserving digital identity managementsecondary
1 project

OLYMPUS (2018-2021) focused on oblivious identity management for private services — an evolution beyond traditional certificate issuance toward user-centric, privacy-by-design identity.

Electronic authentication and identity assurancesecondary
2 projects

Both projects sit at the intersection of authentication infrastructure and identity assurance, consistent with a regulated CA's commercial product portfolio.

Evolution & trajectory

How they've shifted over time

Early focus
Cross-border digital trust services
Recent focus
Privacy-preserving identity management

MULTICERT's two-project trajectory shows a clear shift within the digital trust space. Their first project, FutureTrust (2016), was anchored in the established eIDAS trust services framework — cross-border recognition of digital signatures and trust anchors, work that mirrors a traditional CA's core business. By 2018, OLYMPUS marked a distinct pivot toward privacy-preserving identity: systems where the identity provider itself cannot track or profile users, a model that challenges the conventional CA role. This suggests MULTICERT is not standing still as a certificate factory but actively positioning for next-generation identity paradigms — decentralized identity, anonymous credentials, and privacy-by-design architectures that are now central to eIDAS 2.0 discussions.

MULTICERT is moving from traditional PKI and certification authority operations toward privacy-aware, user-centric digital identity — placing them well for eIDAS 2.0, European Digital Identity Wallet, and decentralized identity consortia forming now.

Collaboration profile

How they like to work

Role: specialist_contributorReach: European13 countries collaborated

MULTICERT participates exclusively as a consortium partner — never as coordinator across their entire H2020 portfolio — which tells you they join research consortia to contribute operational expertise rather than to drive research agendas. Despite only two projects, they engaged with 27 distinct partners across 13 countries, meaning each project involved a large, diverse consortium typical of EU security and digital infrastructure research. This breadth of exposure with no repeated leadership role suggests they are a reliable specialist partner: you bring them in for their regulatory standing and live infrastructure, not to manage the project.

Across just two projects, MULTICERT built connections with 27 unique partners spanning 13 countries — an unusually wide network for such a compact portfolio, reflecting the large consortium structures typical of EU security and identity research. Their partners likely include universities, public authorities, and technology companies from across the EU digital trust ecosystem.

Why partner with them

What sets them apart

MULTICERT occupies a rare niche: a commercially operating, regulated Certification Authority that actively participates in EU research projects. Most CAs and TSPs in Europe do not engage in R&D consortia at all, making MULTICERT unusual as a bridge between live PKI operations and frontier identity research. For a consortium building a digital identity or trust services project, MULTICERT offers something no university can: real infrastructure, real regulatory compliance, and real users — the difference between a prototype that works in a lab and one that can be certified and deployed across the EU.

Notable projects

Highlights from their portfolio

  • FutureTrust
    Largest funding received (€332,053) and directly addresses cross-border trust services under eIDAS — the regulatory heartland of MULTICERT's commercial business.
  • OLYMPUS
    Represents MULTICERT's forward-looking bet on privacy-preserving identity, a technically ambitious area that goes well beyond their core CA business and signals strategic R&D intent.
Cross-sector capabilities
digital governance and e-governmentfinancial services compliance and open banking identityhealthcare patient identity and consent managementlegal and notarial digital document signing
Analysis note: Only 2 projects with no keyword metadata available. Profile relies heavily on the organization name and project titles, supplemented by public knowledge that MULTICERT is a well-established Portuguese qualified Trust Service Provider. The expertise claims are well-grounded in project titles and sector classification, but cannot be verified against deliverables or report summaries. Treat as a directionally reliable but thin profile.