Lead Cryptographer- Trust Protocols and Verifiable Computation
FoundersBookmark Details
The Global Centre for Risk and Innovation (GCRI) is assembling a top-tier cryptographic engineering team to co-develop the foundational trust layer for sovereign-scale AI infrastructure. This infrastructure enables verifiable AI inference, clause-based execution, and sovereign data governance for Earth-scale applications spanning climate science, disaster risk, secure health AI, and decentralized intelligence.
As Lead Cryptographer, you will architect the cryptographic backbone of this ecosystem—designing and validating zero-knowledge proof systems, verifiable execution protocols, and decentralized trust primitives that can scale across federated jurisdictions and agentic AI models. This role combines formal protocol design with applied system implementation, targeting integration across high-performance computing (HPC), edge environments, blockchain networks, and quantum-adjacent compute layers.
Key Responsibilities
1. Protocol Architecture
- Design and formalize verifiable compute protocols using ZK-SNARKs, ZK-STARKs, and TEEs
- Architect on-chain/off-chain hybrid attestation layers for clause-governed AI inference
- Develop cryptographic constraint systems enabling simulation and model verification at runtime
2. Clause Verification Engine
- Implement a clause-to-proof compiler pipeline for encoding legal, scientific, and policy clauses into verifiable computational conditions
- Design recursive proof systems for clause-dependent agentic AI behaviors
- Work with legal-tech and systems teams to enforce audit trails, non-repudiation, and smart contract–backed decision logs
3. Identity and Access Control
- Integrate Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) into fine-grained access systems for AI models, datasets, and federated nodes
- Develop role-based access cryptosystems for dynamic trust tiering, particularly for critical infrastructure and sensitive public datasets
4. Post-Quantum Readiness
- Assess integration pathways for post-quantum signature schemes (e.g., Falcon, Dilithium, SPHINCS+)
- Contribute to migration strategies and hybrid cryptographic stacks combining classical and quantum-safe primitives
5. Interoperability & Security Analysis
- Conduct formal verification of all cryptographic modules and trust enforcement pipelines
- Collaborate on threat modeling for distributed AI infrastructure, focusing on adversarial model injection, ZK proof forgery, and privacy leakage risks
- Ensure composability and compatibility with third-party ecosystems (e.g., Filecoin, Mina, EigenLayer, zkSync)
Required Expertise
- Advanced degree (PhD or equivalent experience) in Cryptography, Applied Mathematics, Computer Science, or related fields
- 7+ years of experience in applied cryptography, protocol engineering, or blockchain R&D
- Deep fluency in ZKP systems (Groth16, PLONK, Halo2, Marlin, Bulletproofs, etc.)
- Experience with formal systems verification, constraint systems, and modular SNARK circuit design
- Familiarity with cryptographic libraries and DSLs (e.g., Circom, Noir, Arkworks, gnark, Halo2, zkInterface)
- Experience deploying crypto systems at production scale, especially in privacy-preserving or federated contexts
Preferred (but not required)
- Contributions to open-source cryptographic protocols or ZKP standards bodies
- Familiarity with secure multi-party computation (MPC), homomorphic encryption, or functional encryption
- Experience with trusted hardware (SGX, Keystone, ARM TrustZone) in distributed inference environments
- Understanding of blockchain consensus, cryptoeconomic incentives, and distributed systems attack vectors
What You Will Influence
- The global design standard for clause-certifiable, sovereign-grade AI inference
- The verifiability substrate of a planetary-scale compute grid for science, resilience, and innovation
- The integrity layer of agentic AI models operating in health, climate, finance, and geopolitics
- The cross-jurisdictional legal enforceability of digital contracts through cryptographic finality
Share
Facebook
X
LinkedIn
Telegram
Tumblr
Whatsapp
VK
Mail