In the realm of contemporary cryptography, bounded copyright systems emerge as a groundbreaking approach to bolstering security. These innovative systems seamlessly encapsulate sensitive information within a predetermined framework, effectively mitigating the risk of unauthorized access and leakage. By rigorously controlling the scope and duration