{"guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","title":"Quantum Cryptography","subtitle":"from key distribution to position-based cryptography","slug":"32c3-7305-quantum_cryptography","link":"https://events.ccc.de/congress/2015/Fahrplan/events/7305.html","description":"I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key Distribution) and the latest developments (position-based quantum cryptography) in this fascinating research field. \n[No previous knowledge of quantum mechanics is required to follow the talk.]","original_language":"eng","persons":["Christian Schaffner"],"tags":["Science"],"view_count":26115,"promoted":false,"date":"2015-12-28T20:30:00.000+01:00","release_date":"2015-12-29T01:00:00.000+01:00","updated_at":"2026-03-07T11:30:06.648+01:00","length":3626,"duration":3626,"thumb_url":"https://static.media.ccc.de/media/congress/2015/7305-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2015/7305-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2015/1dcedd27-94b5-433e-a650-dccc1ba3d720-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2015/1dcedd27-94b5-433e-a650-dccc1ba3d720-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/32c3-7305-quantum_cryptography","url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_title":"32C3: gated communities","conference_url":"https://api.media.ccc.de/public/conferences/32c3","related":[{"event_id":734,"event_guid":"import-93ad379cd4c23b73b5","weight":4},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":5},{"event_id":2816,"event_guid":"78ea005f-4ddb-44d1-82e5-a2825ddea4e1","weight":2},{"event_id":2834,"event_guid":"1b6ed158-e206-416a-8705-9b285a428dbf","weight":5},{"event_id":2862,"event_guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","weight":5},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":11},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":2},{"event_id":2930,"event_guid":"31331405-a243-48ba-9536-83285542400a","weight":4},{"event_id":2936,"event_guid":"ff303155-f2fa-4c54-b9aa-ef47cd6e7704","weight":2},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":4},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":4},{"event_id":3648,"event_guid":"8aaa55ad-b426-4d7a-8d46-f4b34a906eda","weight":2},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":3},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":6},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":2},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":4}],"recordings":[{"size":55,"length":3617,"mime_type":"audio/mpeg","language":"deu","filename":"32c3-7305-de-Quantum_Cryptography.mp3","state":"downloaded","folder":"mp3-translated","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T23:39:01.652+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3-translated/32c3-7305-de-Quantum_Cryptography.mp3","url":"https://api.media.ccc.de/public/recordings/9127","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":47,"length":3616,"mime_type":"audio/opus","language":"deu","filename":"32c3-7305-de-Quantum_Cryptography.opus","state":"downloaded","folder":"opus-translation","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T23:45:54.858+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus-translation/32c3-7305-de-Quantum_Cryptography.opus","url":"https://api.media.ccc.de/public/recordings/9132","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_32c3-7305-en-de-Quantum_Cryptography.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T18:13:05.582+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/DRAFT_32c3-7305-en-de-Quantum_Cryptography.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50727","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":184,"length":3625,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7305-en-de-Quantum_Cryptography_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:13:31.184+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-sd/32c3-7305-en-de-Quantum_Cryptography_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/9468","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":216,"length":3626,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7305-en-de-Quantum_Cryptography_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:13:34.910+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7305-en-de-Quantum_Cryptography_sd.mp4","url":"https://api.media.ccc.de/public/recordings/9544","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":47,"length":3616,"mime_type":"audio/opus","language":"eng","filename":"32c3-7305-en-Quantum_Cryptography.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T23:44:45.671+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus/32c3-7305-en-Quantum_Cryptography.opus","url":"https://api.media.ccc.de/public/recordings/9131","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":487,"length":3625,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7305-en-de-Quantum_Cryptography_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:07.116+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7305-en-de-Quantum_Cryptography_hd.mp4","url":"https://api.media.ccc.de/public/recordings/8729","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":451,"length":3626,"mime_type":"video/mp4","language":"eng","filename":"32c3-7305-en-Quantum_Cryptography.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:06.693+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7305-en-Quantum_Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/8727","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":471,"length":3625,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7305-en-de-Quantum_Cryptography_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T21:01:46.373+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-hd/32c3-7305-en-de-Quantum_Cryptography_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/9460","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":450,"length":3626,"mime_type":"video/mp4","language":"deu","filename":"32c3-7305-de-Quantum_Cryptography.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:06.863+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7305-de-Quantum_Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/8728","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":55,"length":3617,"mime_type":"audio/mpeg","language":"eng","filename":"32c3-7305-en-Quantum_Cryptography.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T23:38:33.729+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3/32c3-7305-en-Quantum_Cryptography.mp3","url":"https://api.media.ccc.de/public/recordings/9126","event_url":"https://api.media.ccc.de/public/events/1dcedd27-94b5-433e-a650-dccc1ba3d720","conference_url":"https://api.media.ccc.de/public/conferences/32c3"}]}