The person could encrypt a text file that contains the address with the Shamir secret sharing scheme and then send the encrypted pieces to different emails, which you can later reconstruct by combining the pieces. But this is challenging if the person is not technically inclined.