In the realm of contemporary cryptography, bounded copyright systems emerge as a groundbreaking approach to bolstering security. These innovative systems seamlessly encapsulate sensitive information within a specific framework, effectively minimizing the risk of unauthorized access and leakage. By explicitly controlling the scope and duration of co