How can a key be split into 20 pieces while only requiring [any ?] 15 to work? Redundancy? There are a fair number of such schemes. The best overview is in Gus Simmons' own chapter in ``Contemporary Cryptology: The Science of Information Integrity'', edited by Simmons and published last year by IEEE Press.