an intermediate of that process — that data can allow you to break the privacy guarantees of the system
should be thrown away — but if you have the intermediates, that lets you break the system
trusted setup:
1 - five ppl do diff parts on diff computer
2 - organized a mailing list and allowed anyone join the trusted setup, w the idea that if anyone is honest and throws away their thing, then you can’t break the system
limited set of ppl: each sets up a part of public and private key pair. everyone destroys the private keys at the end
but they kept some transcript value in the output/typo in the original paper. a lot of implementations just followed the paper
CRS: common reference string. output of the trusted setup, used in the subsequent proofs
?: how often do u have to do this trusted setup?
depends on the proof system
some proof systems require trusted setup, per transaction
others are trusted setup but transparent (zkSTARKs) and updatable
ppl can keep adding themselves to the trusted setup?
examples
constructions of zk proof systems:
e.g. zksnarks, bulletproofs, zkstarks, PLONK, halo, grof