Welcome to the Institute for Quantum Computing


The Institute for Quantum Computing (IQC) at the University of Waterloo is pleased to congratulate IQC Canada Inc., for receiving $18.4 M in funding from Innovation, Science and Economic Development Canada’s Strategic Science Fund (SSF). The fund aims to mobilize the expertise and resources of independent, third-party science and research organizations to enhance Canada’s science technology and innovation excellence.

En francais

Congratulations to Dr. Rajibul Islam, a faculty member at the Institute for Quantum Computing (IQC) and a professor in the Department of Physics and Astronomy, who has been awarded the 2024 Excellence in Science Teaching Award.

This annual award, selected by the University of Waterloo’s Faculty of Science, recognizes instructors who have demonstrated sustained, high-quality teaching in their undergraduate or graduate courses.


CS/Math Seminar - Amir Arqand, IQC 

Quantum-Nano Centre, 200 University Ave West, Room QNC 1201 Waterloo, ON CA N2L 3G1 In person + ZOOM

The entropy accumulation theorem, and its subsequent generalized version, is a powerful tool in the security analysis of many device-dependent and device-independent cryptography protocols. However, it has the drawback that the finite-size bounds it yields are not necessarily optimal, and furthermore, it relies on the construction of an affine min-tradeoff function, which can often be challenging to construct optimally in practice. In this talk, we address both of these challenges simultaneously by deriving a new entropy accumulation bound. Our bound yields significantly better finite-size performance, and can be computed as an intuitively interpretable convex optimization, without any specification of affine min-tradeoff functions. Furthermore, it can be applied directly at the level of R´enyi entropies if desired, yielding fully-R´enyi security proofs. Our proof techniques are based on elaborating on a connection between entropy accumulation and the frameworks of quantum probability estimation or f-weighted R´enyi entropies, and in the process we obtain some new results with respect to those frameworks as well.

Wednesday, July 10, 2024 11:45 am - 12:45 pm EDT (GMT -04:00)

Security implications of device imperfections in quantum key distribution

IQC Special Seminar, Jerome Wiesemann, Fraunhofer Heinrich Hertz Institute HHI

Quantum key distribution (QKD) is on the verge of becoming a robust security solution, backed by security proofs that closely model practical implementations.  As QKD matures, a crucial requirement for its widespread adoption is establishing standards for evaluating and certifying practical implementations, particularly against side-channel attacks resulting from device imperfections that can undermine security claims. Today, QKD is at a stage where the development of such standards is increasingly prioritized. This works aims to address some of the challenges associated with this task by focusing on the process of preparing an in-house QKD system for evaluation. We first present a consolidated and accessible baseline security proof for the one-decoy state BB84 protocol with finite-keys, expressed in a unified language. Building upon this security proof, we identify and tackle some of the most critical side-channel attacks by characterizing and implementing countermeasures both in the QKD system and within the security proof. In this process, we iteratively evaluate the risk of the individual attacks and re-assess the security of the system. Evaluating the security of QKD systems additionally involves performing attacks to potentially identify new loopholes. Thus, we also aim to perform the first real-time Trojan horse attack on a decoy state BB84 system, further highlighting the need for robust countermeasures. By providing a critical evaluation of our QKD system and incorporating robust countermeasures against side-channel attacks, our research contributes to advancing the practical implementation and evaluation of QKD as a trusted security solution.