Fig. 7From: A threshold hybrid encryption method for integrity audit without trusted centerThe communication cost comparison under the number of challenging blocksBack to article page