Trusted Setup
An algorithm that determines a protocol’s public parameters using information that must remain secret to ensure the protocol’s security.
See Common Reference String and the note at the bottom of the page. Opposite to a transparent setup.