Fig. 2From: A threshold hybrid encryption method for integrity audit without trusted centerThe encryption processBack to article page