Summary: In this paper we show how to divide data
pieces in such a way that
is easily reconstructable from any
pieces, but even complete knowledge of
pieces reveals absolutely no information about
. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.