Trusted Setup

An algorithm that determines a protocol’s public parameters using information that must remain secret to ensure the protocol’s security.


See Common Reference String and the note at the bottom of the page. Opposite to a transparent setup.