In this section, we initially delineate the access structure as implemented by our construction scheme. Subsequently, we present the quantum state sharing protocol based on quantum information masking.
Access structure
Assuming that Alice wants to…