Conference Proceedings

SoK: Trusted Setups for Powers-of-Tau Strings

F Wang, S Cohney, J Bonneau

Lecture Notes in Computer Science | Springer Nature Switzerland | Published : 2026

Abstract

Many cryptographic protocols rely upon an initial trusted setup to generate public parameters. While the concept is decades old, trusted setups have gained prominence with the advent of blockchain applications utilizing zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs), many of which rely on a “powers-of-tau” setup. Because such setups feature a dangerous trapdoor which undermines security if leaked, multiparty protocols are used to prevent the trapdoor from being known by any one party. Practical setups utilize an elaborate public ceremony to build confidence that the setup was not subverted. In this paper, we aim to systematize existing knowledge on trusted setups,..

View full abstract

University of Melbourne Researchers