Fig. 4From: A threshold hybrid encryption method for integrity audit without trusted centerThe decryption processBack to article page