Fig. 6From: A threshold hybrid encryption method for integrity audit without trusted centerThe re-signature process of avoiding the collusionBack to article page