Zero Knowledge (ZK) Jobs

801 jobs found

web3.career is now part of the Bondex Logo Bondex Ecosystem

Receive emails of Zero Knowledge (ZK) Jobs
Job Position Company Posted Location Salary Tags

Fabric of Truth, Inc

Boston, MA, United States

$84k - $164k

Fabric of Truth, Inc

Belgium

$84k - $164k

Fabric of Truth, Inc

Belgium

$89k - $102k

Fabric of Truth, Inc

Santa Clara, CA, United States

$113k - $173k

Fabric of Truth, Inc

Santa Clara, CA, United States

$113k - $173k

ZKV

London, United Kingdom

$157k - $175k

IO Global

Remote

$36k - $90k

IO Global

Remote

$86k - $90k

IO Global

Remote

$88k - $150k

IO Global

Remote

$72k - $164k

IO Global

Remote

$45k - $52k

Consensys

Remote

$155k - $186k

Provable

New York, NY, United States

$45k - $55k

RISC Zero

Remote

$143k - $164k

Aztec

Remote

$104k - $117k

Fabric of Truth, Inc
$84k - $164k estimated
Boston, Massachusetts
Apply

Applied Researcher, Cryptography Proof Systems

Belgium / Boston, Massachusetts / British Columbia / Chicago / France / Los Angeles, California / London / New York, New York / San Francisco, California / Toronto / UK / Seattle, Washington
R&D, Cryptography /
Full-time /
Remote

Apply for this job
FABRIC CRYPTOGRAPHY
WE ARE BUILDING THE WORLD'S FIRST CRYPTOGRAPHIC COMPUTER 
Fabric believes hardware determines the boundaries of humanity's collective creativity and imagination. We are building hardware for the next generation of cryptography because we believe in creating a more trustworthy world with secure, private computation at its core. Just as encryption and decryption enabled the Internet as we know it, this new paradigm of cryptographic algorithms, such as zero knowledge proofs, have even broader potential to revolutionize how trust, privacy, and identity work in our society. 

About the job
As a Cryptography Hardware Engineer at Fabric, you will play a pivotal role in shaping the future of modern cryptography systems and empowering our customers to build production systems securely. You will be involved in a variety of technical tasks related to ZKP protocols, framework improvement, and customer advisory, among other responsibilities. Your deep knowledge of cryptography, programming skills, and experience working with cryptocurrency or cryptographic products and LLVM will be highly valuable and necessary for the role.

What you'll be doing

    • Cryptography System Development: Utilize our framework to express modern cryptography systems, with a particular focus on Zero-Knowledge Proof (ZKP) protocols. Design and implement secure and efficient cryptographic solutions.
    • Product Improvements: Perform HW/SW co-design across the algorithms, the microarchitecture, and‬ the ISA‬.
    • Framework Enhancement: Continuously improve our existing framework and debugging tools based on your experience using them. Streamline the development process, optimize performance, and ensure robustness.
    • Technical Advisory: Advise customers on how to effectively use our system framework to build production systems, ensuring the security and integrity of their cryptographic implementations.
    • Research and Knowledge: Stay up to date on the latest advances in the field of cryptography, including emerging ZKP/FHE/PQC protocols and other relevant technologies. Incorporate these advancements into our products.

Qualifications and experience requirements

    • Qualifications and experience requirements
    • A Bachelor's, Master's, or Ph.D. degree in Computer Science, Electrical Engineering, Mathematics, or Computer Engineering.
    • Strong familiarity with the uses and implementations of Zero-Knowledge Proofs (ZKPs).
    • Experience implementing cryptographic algorithms in hardware, particularly‬ FPGAs.
    • Proficiency in programming languages such as Rust or Python, with a deep understanding of cryptography-related programming.
    • Previous experience working on a cryptography product.
    • An aptitude for problem-solving and a keen eye for details.

    • Fabric Cryptography is committed to fostering a diverse work environment and proud to be an equal opportunity employer. As we highly value diversity in our current and future employees, we do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law.

Apply for this job
⬇
Apply Now

What is Zero-knowledge?

Zero-knowledge is a concept in cryptography that allows two parties to exchange information without revealing any additional information beyond what is necessary to prove a particular fact

In other words, zero-knowledge is a way of proving something without actually revealing any details about the proof

Here are some examples of zero-knowledge:

  1. Password authentication: When you enter your password to log into an online account, the server doesn't actually know your password. Instead, it checks to see if the hash of your password matches the stored hash in its database. This is a form of zero-knowledge because the server doesn't know your actual password, just the hash that proves you know the correct password.
  2. Sudoku puzzles: Suppose you want to prove to someone that you've solved a particularly difficult Sudoku puzzle. You could do this by providing them with the completed puzzle, but that would reveal how you solved it. Instead, you could use a zero-knowledge proof where you demonstrate that you know the solution without actually revealing the solution itself.
  3. Bitcoin transactions: In a Bitcoin transaction, you prove that you have ownership of a certain amount of Bitcoin without revealing your private key. This is done using a zero-knowledge proof called a Schnorr signature, which allows you to prove ownership of a specific transaction output without revealing the private key associated with that output.
  4. Secure messaging: In a secure messaging app, you can prove to your contacts that you have access to a shared secret without revealing the secret itself. This is done using a zero-knowledge proof, which allows you to prove that you have access to the secret without actually revealing what the secret is.