You have a key, which encrypts a shared key.
Your spouse has a key, which encrypts the same shared key.
Vault is encrypted with the shared key.
Access is controlled separately. But upon successful share, their existing key can decrypt the shared key which decrypts the vault.