Fig. 3From: A threshold hybrid encryption method for integrity audit without trusted centerThe audit processBack to article page