Abstract:
The paper discusses the possibility of building remote voting protocols that are resistant to compromise of a given number of subscribers based on secret sharing schemes. The concept of stability of remote voting protocols is formalized in terms of information theory. The article is a continuation of the series of papers [1] and [2].