Abstract:
The study of remote voting protocols resistant to the compromise of given number of voters is continued. It is shown that secret sharing schemes may be used for the contruction of remote voting protocols with the guaranteed level of resistance. Suggested remote voting protocols are compared with other known ones.