Trusted setup cryptography question

Will individual trusted setup participants be able to prove that the public parameters have been derived from their input?