00What is a trusted setup?
Zero-knowledge proofs let you prove you belong to a group — without revealing which member you are. To do that, the group needs a shared "public parameter set" — call it a lockbox that everyone uses.
The problem: building the lockbox requires a secret key. If the person who builds it keeps that key, they can forge any membership proof. If the key is destroyed, nobody can ever forge again. A trusted setup ceremony is a choreographed way for a crowd to build the lockbox together, where anyone who destroys their personal part of the key locks it forever.
For Groth16 over a pairing-friendly curve (BLS12-381 here), soundness requires a structured reference string (SRS) of the form
$$ \sigma = \Big( \{ \tau^i G \}_{i=0}^{n-1}, \{ \alpha \tau^i G \}_{i=0}^{n-1}, \{ \beta \tau^i G \}_{i=0}^{n-1},\ \alpha H,\ \beta H \Big) $$
with $G \in \mathbb{G}_1$, $H \in \mathbb{G}_2$, and toxic scalars $\tau, \alpha, \beta \in \mathbb{F}_r^*$ that must be erased after generation. If $(\tau, \alpha, \beta)$ survive, the SRS is broken: anyone holding them can construct accepting proofs for false statements [Groth16].