Authenticable quantum secret sharing based on special entangled state

In this section, we initially delineate the access structure as implemented by our construction scheme. Subsequently, we present the quantum state sharing protocol based on quantum information masking.

Access structure

Assuming that Alice wants to…

Continue Reading