Fig. 9From: A threshold hybrid encryption method for integrity audit without trusted centerThe phase running time of our schemeBack to article page