Fig. 5From: A threshold hybrid encryption method for integrity audit without trusted centerThe re-signature process without considering the collusionBack to article page