It Is Time. Time To Get Oneself Familiar With Shamir's Secret Sharing SchemeSubmitted by Cyril on Sat, 08/10/2013 - 19:37
Now you know the keywords to lookup further, and some pointers beyond just the principle :
Original paper :
Information-theoretically secure : its security derives purely from information theory. That is, it cannot be broken even when the adversary has unlimited computing power.
Video presentation :