Zero Knowledge (ZK) Jobs

899 jobs found

web3.career is now part of the Bondex Logo Bondex Ecosystem

Receive emails of Zero Knowledge (ZK) Jobs
Job Position Company Posted Location Salary Tags

MobileCoin

San Francisco, CA, United States

$63k - $90k

DFINITY

Palo Alto, CA, United States

$80k - $105k

DFINITY

Zurich, Switzerland

$80k - $105k

Boson Protocol

London, United Kingdom

$72k - $150k

Harmony

Remote

$36k - $60k

Findora

Menlo Park, CA, United States

$54k - $73k

Findora

Remote

$45k - $75k

Findora

Remote

$23k - $62k

Findora

Remote

$80k - $105k

Findora

Remote

$54k - $90k

Chronicled.com

Remote

$72k - $100k

Hypersphere Capital Management LP

Miami, FL, United States

$63k - $90k

Findora

Remote

$54k - $73k

Findora

Remote

$47k - $70k

Cryptographer

MobileCoin
$63k - $90k estimated

This job is closed

MobileCoinis building the future of private, secure, and usable digital payments. We want to make a privacy-focused cryptocurrency you can use everyday to pay for anything.

We are passionate about researching, prototyping, and implementing mathematical methods to explore, isolate, and solve problems in the global financial markets while respecting user-privacy. We believe that career fulfillment and enterprise success converge when smart, hard-working, and intellectually curious people come together with a shared goal of innovation, and the pursuit of excellence.

Your Role

The Cryptographer will join MobileCoin’s Research team focusing on state-of-the-art research in zero-knowledge proving systems, reapplying existing circuit arithmetization techniques to current systems, searching for real-world optimizations, and investigating potential new proving systems. You will work closely with a small team of other researchers as we delve into revising the currency's current design to support new features, such as smart contracts, multiparty transactions, escrow services, Layer 2 protocols, selective ledger transparency, decentralized exchanges, synthetic assets, and more, all while maintaining our strong commitment to user-privacy and usability. A variety of backgrounds are welcome, from embedded systems and hardware focused cryptographic designers, to those with experience in formal verification and writing and modeling for security proofs, to best practices in making robust, misuse-resistant, production-quality cryptographic implementations. This is a rare opportunity for an applied cryptographer to holistically design a real-world, more private, more efficient system from the ground up, everything from low-level hardware optimization to maths to high-level user and developer interfaces and APIs.

Responsibilities

  • Research and design replacement technologies to enhance the security, speed, privacy, and usability of our current protocol

  • Investigate and prototype cryptographic primitives to allow additional future functionality

  • Document and share research findings with a small team

  • Review and audit existing cryptographic code and write arguments of security

Required Skills, Qualifications and Experience

  • Experience in auditing and reviewing cryptographic designs

  • Working knowledge of Rust, modern C++, C or another systems language

  • Background in contributing to privacy-focused projects

  • Strong programming skills in Sage, Python, or other scripting languages, used for rapid prototyping and building proofs-of-concept

  • Hands-on mentality, attention to detail, and keen interest in cryptography

  • 5+ years of industry or academic experience in cryptographic systems design

  • Ability to write thorough documentation, both for research papers and code

  • Ability to communicate effectively on technical and mathematical subjects with other experts

Preferred Skills, Qualifications and Experience

  • Experience in building or optimizing low-level algorithms, such as optimizing elliptic curve designs, or writing constant-time primitives

  • Academic background in mathematics, cryptography, or computer science

  • Background with formal verification and/or proof-driven development systems such as Coq, TLA+, Cryptol, etc.

  • Experience in building data, research or production tools for privacy preserving products

  • Experience with low-level implementations utilizing hardware devices such as SGX, HSMs, common embedded microarchitectures, and GPUs

  • Experience authoring and porting cryptographically-sensitive code

Employment Type: Full-Time or Contract

What is Zero-knowledge?

Zero-knowledge is a concept in cryptography that allows two parties to exchange information without revealing any additional information beyond what is necessary to prove a particular fact

In other words, zero-knowledge is a way of proving something without actually revealing any details about the proof

Here are some examples of zero-knowledge:

  1. Password authentication: When you enter your password to log into an online account, the server doesn't actually know your password. Instead, it checks to see if the hash of your password matches the stored hash in its database. This is a form of zero-knowledge because the server doesn't know your actual password, just the hash that proves you know the correct password.
  2. Sudoku puzzles: Suppose you want to prove to someone that you've solved a particularly difficult Sudoku puzzle. You could do this by providing them with the completed puzzle, but that would reveal how you solved it. Instead, you could use a zero-knowledge proof where you demonstrate that you know the solution without actually revealing the solution itself.
  3. Bitcoin transactions: In a Bitcoin transaction, you prove that you have ownership of a certain amount of Bitcoin without revealing your private key. This is done using a zero-knowledge proof called a Schnorr signature, which allows you to prove ownership of a specific transaction output without revealing the private key associated with that output.
  4. Secure messaging: In a secure messaging app, you can prove to your contacts that you have access to a shared secret without revealing the secret itself. This is done using a zero-knowledge proof, which allows you to prove that you have access to the secret without actually revealing what the secret is.