Will individual trusted setup participants be able to prove that the public parameters have been derived from their input?