Trusted setup cryptography question


#1

Will individual trusted setup participants be able to prove that the public parameters have been derived from their input?