Let’s say we have a polynomial . Notice that we can evaluate it without knowing if we are given specifically and . Obviously this is only interesting in a group.
We can take advantage of this to allow the evaluation of arbitrary polynomials at point without exposing . We do this by generating a list of powers of e.g. . In order to actually hide we must represent these elements as elements in some finite field. So we multiply each element by some generator for an elliptic curve . S.t. we have . If we then publish this list, anyone with it can evaluate a polynomial of degree up to 3 at the point , without knowing .
We refer to this list as a Structured Reference String, or a Common Reference String.
This SRS is the basis of many Zero-Knowledge Proofs. The entity which generates the SRS will know and has the ability to forge proofs. As such, we refer to this process as Trusted Setup. One way to remove this vulnerability is to generate the SRS with a form of Multiparty Computation called a powers of tau ceremony.