Next Article in Journal
Explore the Feeling of Presence and Purchase Intention in Livestream Shopping: A Flow-Based Model
Next Article in Special Issue
Multi-Party Evolutionary Game Analysis of Accounts Receivable Financing under the Application of Central Bank Digital Currency
Previous Article in Journal
An Investigation on Impact of Online Review Keywords on Consumers’ Product Consideration of Clothing
Previous Article in Special Issue
Trustful Blockchain-Based Framework for Privacy Enabling Voting in a University
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game

1
Faculty of Innovation Engineering, Macau University of Science and Technology, Macau 999078, China
2
School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China
3
Department of Computer Science and Technology, Hubei University of Education, Wuhan 430205, China
4
Blockchain Laboratory, YGSoft Incorporation, Zhuhai 519085, China
*
Author to whom correspondence should be addressed.
J. Theor. Appl. Electron. Commer. Res. 2023, 18(1), 206-236; https://doi.org/10.3390/jtaer18010012
Submission received: 28 September 2022 / Revised: 16 December 2022 / Accepted: 24 January 2023 / Published: 29 January 2023
(This article belongs to the Special Issue Blockchain Commerce Ecosystem)

Abstract

:
Blockchain technology (BCT) provides a new way to mitigate the default risks of lease contracts resulting from the information asymmetry in leasing. The conceptual architecture of a consortium blockchain-based leasing platform (CBLP) is first proposed to facilitate information sharing between small and medium-sized enterprises (SMEs, the “lessees”) and leasing firms (LFs, the “lessors”). Then, based on evolutionary game theory (EGT), this study builds a two-party game model and analyzes the influences of four types of factors (i.e., information sharing, credit, incentive–penalty, and risk) on SMEs’ contract compliance or default behaviors with/without blockchain empowerment. The primary findings of this study are as follows: (1) SMEs and LFs eventually evolve to implement the ideal “win–win” strategies of complying with the contract and adopting BCT. (2) The large residual value of the leased asset can tempt SMEs to conduct a default action of unauthorized asset disposal, while leading LFs to access the CBLP to utilize information shared on-chain. (3) When the maintenance service is outsourced instead of being provided by lessors, the maintenance fee is not a core determinant affecting the equilibrium state. (4) There is a critical value concerning the default penalty on-chain to incentivize the involved parties to keep their commitments. (5) The capability of utilizing information, storage overhead, and security risk should all be taken into consideration when deciding on the optimal strategies for SMEs and LFs. This study provides comprehensive insights for designing an incentive mechanism to encourage lessees and lessors to cooperatively construct a sustainable and trustworthy leasing environment.

1. Introduction

Small and medium-sized enterprises (SMEs) typically encounter capital constraints when buying heavy machinery and industrial equipment for manufacturing, such as forklifts, trucks, hoists, etc. [1]. To cut back on the capital expense, leasing an asset from the Original Equipment Manufacturer (OEM) or a Leasing Firm (LF) is a common and economical option to meet the demand for equipment [2]. Leasing has become a popular financing instrument [3].
In general, a lessee (e.g., SMEs) selects the required equipment, and then a lessor can directly lease the asset they manufacture (if the lessor is the OEM) or purchase the requested asset from the OEM for leasing it out (if the lessor is an LF, such as a financial institution or a firm that specializes in leasing), with the lessee paying rent to the lessor in exchange for using the asset [4]. When the leasing service period expires, the lessee may opt to retain, renew, or return the leased equipment depending on the lease’s contractual provisions. The leasing business emphasizes the separation of ownership and uses the rights of the leased asset [5].
Compared with purchasing, although leasing is more flexible and cost-efficient for a lessee, the current leasing business could encounter some challenges, such as lacking knowledge about the lessee’s credit history, being unable to fully track assets in real time, and failing to discover any default behavior arising from the information asymmetry. Blockchain technology (BCT) stores data in a tamper-proof ledger that can be shared P2P among many nodes without the aid of a reliable third party [6], which can help to transmit data efficiently and accurately among multiple organizations, particularly in the area of equipment leasing (asset management). Hence, in general, the lessee and lessor are encouraged to participate in information sharing on the blockchain.
Nonetheless, it is challenging for lessees or lessors (particularly for SMEs) to develop or participate in a blockchain-based application system (especially for the consortium permissioned blockchain system) due to the budget constraints of the BCT membership fee, heavy data storage (computation) charges, and other barriers [7]. Meanwhile, considering that stakeholders may maliciously handle sensitive data, the participants might be reluctant to share critical information with other parties [8] unless sufficient incentives nudge the lessee. However, previous researchers have not performed a quantitative exploration of stakeholders’ BCT-participating behaviors in the context of leasing, where there is a trade-off between the factors of information sharing, credit, incentive–penalty, and risk. On the other hand, although there exists some research relating to the blockchain applied in leasing, the interactive behaviors among lessees and lessors rarely receive adequate attention. Hence, our study aims to bridge this gap by addressing the following research questions.
(1)
How can the blockchain technically drive information sharing and storage between the SME (the “lessee”) and LF (the “lessor”)?
(2)
How to incentivize excellent lessees to share more information while expecting that rational lessees and lessors can both maximally benefit from the leasing business empowered by BCT.
(3)
How can the lessee and lessor adjust their behavior strategies to ensure that all parties’ payoffs reach equilibrium through continuous trial-and-error learning?
To address these questions, we need to accomplish the following research objectives. First, a conceptual architecture of a consortium blockchain-based leasing platform (CBLP) is devised, suitable for information sharing among SMEs and LFs in a P2P distributed network. Secondly, we employ evolutionary game theory (EGT) to formulate a game model, taking fully into consideration the four kinds of factors (i.e., information sharing, credit, incentive–penalty, and risk) that affect the leasing strategies involving the two game parties (lessee and lessor). Finally, the main impacting results are discussed in-depth, and policy implications are provided on the ground.
In addition, compared with other similar works investigating BCT strategies using the evolutionary game, the novelty and contributions of this study can be summarized as follows:
(1)
Our evolutionary game model is developed on the blockchain-based leasing business (specifically the operating lease) in manufacturing, which pays more attention to the SME’s leasing behavior (i.e., making the rental payment, reverting the leased asset, maintenance responsibility, and asset monitoring) dynamically changes with the BCT adoption/non-adoption strategy. This study can mitigate the shortcomings of today’s leasing management.
(2)
We provide a more comprehensive analysis demonstrating that the four factors of “information sharing, credit, incentive–penalty, and risk” dynamically impact the lessee’s complying performance on the LC and the lessor’s decision-making on BCT adoption. More importantly, we carefully consider technical barriers faced by the organizational players when implementing BCT, such as on-chain and off-chain storage overheads, leasing transaction verification overheads, and credit assessment in BCT.
(3)
Based on the game analysis, our experimental results can support LFs (the “lessor”) in comprehensively understanding how SMEs (the “lessee”) meet the obligations in the LC and give some implications to policymakers when designing a proper incentive mechanism on the lease.
The remainder of this paper is structured as follows: Section 2 provides a theoretical background of the leasing business, BCT, leasing empowered by BCT, and the evolutionary game integrated with BCT. Section 3 exhibits the CBLP composed of SMEs and LFs. Section 4 states the problem description. Section 5 builds the game model. Section 6 provides a mathematical analysis of the model stability. Section 7 conducts a numerical simulation. Some recommendations and policy implications are provided in Section 8.

2. Literature Review

The following subsections will give an overview of crucial terminologies (i.e., leasing and BCT), the state of the art of BCT-based leasing, and BCT strategies using evolutionary game theory, which serve as a solid theoretical background for this study. After that, the main challenges in conventional leasing are highlighted.

2.1. Definition of Leasing

SMEs typically need to decide between leasing and buying an expensive heavy asset (such as real estate, transportation equipment, industrial equipment, etc.). In recent years, leasing assets has become a popular financing tool for SMEs to solve capital problems in the supply chain [9]. According to the Accounting Standard IAS 17, “a lease is an agreement whereby the lessor conveys to the lessee in return for payment or series of payment the right to use an asset for an agreed period of time” (see, e.g., European Commission, 2012) [10]. From an accounting perspective, there are two types of lease, a capital lease and an operating lease [11]. In a capital lease, the lessor transfers the ownership of the asset to the lessee at the end of the lease. In contrast, an operating lease only allows the lessee to have the right to use the assets. Still, it requires the asset to be reverted to the lessor, such that the lessor will either re-lease the asset in another LC or sell it to release the residual value. At present, the operating lease dominates the leasing market.
Concerning the determinants in default actions of the LC, Kaposty et al. [12] defined an LC as having defaulted when the lessee becomes insolvent or the lessor terminates the contract due to an overdue payment owed by the lessee. The latter case is considered in this study. Difficulty in repossessing the leased asset is also one of the results of defaulting [13]. Altman et al. [14] discovered that a lessee with poor creditworthiness defaults more easily, resulting in higher default losses. On the other hand, Kysucky and Norden [15] revealed that reducing information asymmetry between the lessee and lessor could motivate the lessee to maintain its reputation to obtain future leases. In addition, an exhaustive inspection of asset maintenance and disposals plays an essential role in contract defaults [12]. However, the current leasing system lacks the ability to reliably record real-time information (including the documents) about the leased asset’s operational activity, which hampers the lessor’s ability to ensure the lessee’s compliance with the LC.

2.2. Blockchain Technology (BCT)

Blockchain Technology (BCT) was initially proposed by Satoshi Nakamoto, and it enables transactions to be encapsulated in data blocks and appended to a ledger as a chain structure [16]. It allows distributed and mutually distrustful nodes validate transactions through consensus mechanisms while utilizing cryptography (i.e., public–private key encryption and hash functions) to ensure data integrity. By its nature, blockchain technology makes transactions synchronous, non-reversible, immutable, and traceable in distributed databases, enabling organizations to store and share reliable data without double-checking [17]. Blockchain technology can effectively solve the problem of information asymmetry [18] and monitor the asset’s operation in real time, which helps the lessor to alleviate the default risks caused by a low-credit lessee [19]. Therefore, it is beneficial to encourage SMEs (the “lessee”) to use BCT and energetically participate in information sharing.
BCT is generally classified as the permissionless blockchain and the permissioned blockchain [20], depending on whether or not nodes are granted to participants in a blockchain network [14,17]. The permissionless blockchain, also called public blockchain, is open access, allowing any node to participate in the consensus procedure, such as Bitcoin and Ethereum. The permissioned blockchain can be further categorized into private permissioned blockchain, in which whitelisted participants in one organization are selected in advance to join the invitation-only network, and a consortium permissioned blockchain, which is operated under the control of several authorized organizations allowing the identifiable participants to execute certain on-chain actions, such as Quorum, Hyperledger Fabric, and Corda. The consortium blockchain is becoming popular with enterprises, where a group of companies collaboratively use the blockchain to improve business processes. Any organization can apply to join the blockchain network, but only authorized organizations granted membership are allowed to write or read information on-chain [21]. This study is dedicated to introducing a consortium permissioned blockchain jointly maintained by the OEM, SMEs, LFs, third-party maintenance centers (MCs), and regulators. At present, blockchain has been widely used in many industries for sharing information, such as supply chain [22], energy [23], healthcare [24], industrial manufacturing [25], smart cities [26], and online education [27].

2.3. BCT Application in Leasing

Currently, there is relatively limited research on the application of BCT in the leasing business. Most research focuses on how BCT fosters information exchange through the lifecycle of the leasing process and improves the efficiency and transparency of leased asset management. For instance, to address the issues of lengthy negotiation cycles and cumbersome financing procedures caused by information asymmetry, IBM proposed a crane leasing model based on the IBM Blockchain Platform that requires the identity of the leased crane to be registered on the blockchain and leasing transactions to be recorded on the leasing blockchain [28]. Leased physical aircraft can be tokenized via blockchain, facilitating asset management [13]. In addition, several researchers are particularly interested in BCT-based car-leasing. Auer et al. [29] developed a prototype blockchain-IoT-based car-leasing platform, demonstrating that the blockchain can facilitate collaboration among stakeholders to some extent while relying on the appropriate balance among factors such as security, authenticity, traceability, scalability, etc. It also emphasizes considering storing car-renting events on- or off-chain to support scalability, as agreed by Faber et al. [30]. To address the problem of inefficiency in delivering and searching records, Agyekum et al. [31] used Ethereum to construct a car-leasing platform that enables the transfer of ownership of a leased car by invoking a transaction on the blockchain, hence helping the regulator to clearly monitor every leasing transaction.
The aforementioned cases imply the following potential benefits of the blockchain applied in leasing: (1) Stakeholders (such as lessors) spend less time verifying the leasing information’s authenticity on-chain, since the blockchain can record lease contracts and financial transactions in a non-editable way, which reduces the credit investigation cost [32]. (2) Smart contracts deployed on a distributed ledger can help automate some lease payments or ownership transfers, speeding up the processing of rental transactions [33]. (3) All historical events associated with the leased assets’ operation and maintenance and the provenance-related financing activities are objectively recorded by multiple nodes on-chain, which could guarantee asset traceability and data credibility in the leasing business [34]. Hence, BCT is conducive for SMEs and LFs to effectively choose the suitable potential lessor/lessee to sign the LC.

2.4. Evolutionary Game Theory (EGT)

Evolutionary game theory (EGT) is derived to explore the behavior of the large population of boundedly rational agents who repeatedly engage in strategic interactions under incomplete information circumstances [35]. In contrast with classic game theory, EGT has the advantage of analyzing how the game player would dynamically change their own strategic decisions over time through learning and adapting to the other’s strategic decisions [36]. There is a core concept in EGT named evolutionary stable strategy (ESS), which, if adopted by all players, means that the game cannot be invaded by alternative strategies [37]. Several researchers have applied EGT to leasing issues. For example, to study the safety supervision of town crane operation, Chen et al. [38] established a tripartite evolutionary game model, which reveals that when the penalty amount resulting from poor crane supervision is greater than the total safety investment cost, the stakeholders will apply strict supervision strategies to the asset.
In addition, some scholars have conducted similar works deciding whether to adopt BCT using evolutionary game theory. However, most of them focus on the supply chain (finance). For instance, Su et al. [39] constructed a tripartite game model to explore BCT in relation to the evolutionary stability strategies among CEs, SMEs, and FIs, discovering that relatively large default losses can help SMEs to repay receivables on time. Tang et al. [40] used an evolutionary game to demonstrate that BCT can effectively facilitate information sharing in supply chain collaborations. Sun et al. [41] established an evolutionary game model to reveal that BCT impacts credit risk, which plays a vital role in deciding whether financial institutions accept factoring applications in supply chain finance. Song et al. [42] analyzed a tripartite game model of an agricultural supply chain, discovering that blockchain operation costs significantly affect the behaviors of governments and agricultural enterprises.
Based on the above literature analysis, it can be found that most research mainly focuses on proposing a blockchain-based leasing scheme or using EGT to study the SME’s BCT strategies in the supply chain. Nevertheless, our work not only provides a consortium blockchain-based leasing platform (CBLP) to streamline the information sharing between lessees and lessors, but also contributes to establishing a two-player evolutionary game model analyzing the lessee’s leasing behaviors (i.e., complying with or defaulting on the LC) considering whether to adopt BCT for information sharing. This study will shed light on the long-term development of the leasing industry.

3. Description of Consortium Blockchain-Based Leasing Platform (CBLP)

Since the evolutionary model that this study will construct is of significant relevance to information storage (i.e., on- and off-chain) and consensus mechanisms (i.e., Raft with credit evaluation and transaction verification), in this section, it is necessary first to present the conceptual architecture of the proposed consortium blockchain-based leasing platform (CBLP), and then the transaction verification process will be concisely explained.

3.1. Conceptual Architecture of CBLP

This research first provides a consortium blockchain-based leasing platform integrated with RFID devices [43], which incorporates stakeholders such as OEM, SMEs, LFs, MCs, and regulators. The platform is built by using Hyperledger Fabric (HLF) [44], which is an enterprise-grade permissioned blockchain platform facilitating information sharing among multiple organizations [45,46]. In general, an authorized node is required to pay fees to access the consortium blockchain [47]. In the distributed ledger, only organizations with valid IDs can process transactions. More specifically, all authorized lessees and lessors have their PKI-CA certificate and unique Decentralized Identifiers (DIDs) registered on a blockchain with restricted access [48,49]. By scanning the RFID sensor tags encapsulated in the DID, the running condition of the leased asset is recorded as a transaction, which is then turned into a “block” and appended to the ledger. This means that the lessee cannot refute or alter the historical logs of equipment operation and maintenance. This data reliability is conducive to efficiently managing the whole life cycle of the physical leased asset [50], which can help to reduce the inspection costs during the leasing period. It is also critical for each participant involved to be certain about the asset traceability in case of fraud, damages, dispossession, or misdisposition.
On the other hand, due to the large data sets shared by many various stakeholders, there is a need to consider data storage and scalability challenges when assessing to what extent SMEs are willing to adopt BCT [51]. Our work leverages a hybrid on-chain and off-chain storage mechanism to store and access information (especially complexity data) on the CBLP [52,53]. Specifically, the encrypted raw data (e.g., file) are stored on an off-chain cloud storage provider (CSP) or distributed storage system (e.g., InterPlanetary File System, IPFS) [54]. The off-chain data are linked with the specific metadata via a hash pointer, which is stored as a transaction validated to the ledger and can be used to audit the off-chain data that were not modified [55]. The architecture of CBLP with on- and off-chain information storage mechanisms is shown in Figure 1.

3.2. Raft Consensus Based on Credit

Since various transactions are executed through triggering relevant smart contracts (e.g., lease contract, asset ownership transfer contract, lease payment contract, data sharing contract) using multiple organizational nodes, a consensus protocol is used by the CBLP. It plays a crucial role in ensuring that the transactions are recorded in an agreed order on-chain. Meanwhile, to avoid the untrusted consortium stakeholders uploading false information or changing the private data content on-chain to comply with the contract, we use a Raft consensus algorithm combined with “credit” incentives to maintain the blockchain. That is, an SME (Org-lessee node A) and an LF (Org-lessor node B) adopt the flow of “execute–order–validate” to record the transactions on-chain [45]. This is the most fundamental transaction process of Hyperledger Fabric at present and will not be elaborated on further due to the limitations of this paper’s length, while it is depicted in Figure 2.
Notably, the Raft consensus protocol follows the “leader and follower” architecture [56,57] to implement the ordering service, where the leader nodes are dynamically elected from the Consenter Set and a node’s credit value determines whether it can join the Consenter Set [58]. When the credit value exceeds a predetermined threshold, the node can join the Consenter Set as a consensus node. On the contrary, when the credit is lower than the minimum threshold, the node will face a penalty imposed by the CBLP. In addition, we propose that the credit value is increased or decreased according to the contract compliance or default behavior of the (SME) Org-lessee node in the leasing business; the more frequently it conforms to the lease contract, the higher its credit value and the greater the likelihood is that the node will be selected as the “Leader” in the Consenter Set to package transactions into a new block and finalize it. Credit assessed for the SME cannot be treated as an indicator of the lessee’s reputation and contribution to the leasing business. Still, it can help the enterprise earn more recognition and achieve more lease financing opportunities from lessors, encouraging each lessee to share information on the CBLP [58].
In summary, based on the right balance of the above on- and off-chain storage costs and credit incentive mechanisms, the nodes will choose to actively comply with the LC and upload authentic information on-chain by joining the consortium blockchain for larger gains, resulting in the eventual emergence of a Nash equilibrium.

4. Problem Description

In this section, we will first describe the problem we studied. The basic lease scenario explored in this study is provided to better understand the game model. Afterward, the critical parameters are elucidated and presented in Table 1.

4.1. Description of Problem

The game model involves two types of players in a lease: the lessee (i.e., an SME) and lessor (i.e., an LF). Under a conventional lease, the SME is responsible for paying fees for the right to use an asset leased from the LF, and generally, the SME as a lessee must maintain the asset to ensure that it remains in an operational condition [59]. The LF will pay the credit investigation cost to evaluate whether an SME can pay its rent on time. Meanwhile, it is difficult for the parties to immediately share information (including the historical default records) and for the LF to monitor the leased equipment/assets in real time. Applying BCT can solve the aforementioned issues [29]. If the LF requires the SME to join the consortium so as to upload information (such as historical asset operation documents or payment performance, etc.) on the CBLP, not only can a credit review be instantly conducted, but the ownership and provenance of the leased asset can also be tracked in real time through the asset’s operation. Moreover, a smart contract can be automatically executed to make the lease payment as agreed in the lease contract (LC), which results in the synergetic gains of the leasing process and improves the efficiency of asset management empowered by the blockchain [60]. If stakeholders can share and process a greater quantity of information on-chain, thereby significantly improving the precision of the decisions made by each party, it is essential to take into consideration the corresponding data storage overheads, security exposure, and transaction verification costs when practically using BCT. Once the SME and LF adopt the CBLP, they need to be subject to harsher punishments resulting from defaulting behavior, which undermines the enterprise’s reputation on the whole network. In addition, a blockchain-based credit evaluation mechanism can enhance the effective management of the leased asset, which is also conducive to mining reliable data blocks in the distributed ledger.
Therefore, this study intends to model the problem that considers the SME and LFs individual decision-makers concerning “complying with or defaulting on the LC” and “accessing or not accessing the CBLP” and to comprehensively analyze the dynamic influence of the four factors (i.e., information sharing, credit, incentive–penalty, and risk) on the choice of strategy by using evolutionary games.

4.2. Basic Lease Scenarios

The game model is constructed based on an operating lease with respect to heavy equipment (e.g., forklifts, trucks, and hoists) in the manufacturing supply chain. Generally, the equipment is relatively expensive to purchase, and leasing it is a better option for SMEs. The LF (the “lessor”) first acquires an asset from an OEM and lends the asset to the SME (the “lessee”) for a specific term in exchange for periodic rental payments. Once the LC is signed, the SME has the right to use the asset, whereas the ownership of the leased asset remains with the LF. Therefore, the SME must comply with the contract, not only paying the full rent on time but also reverting the asset to the LF at the maturity date of the lease; otherwise, the SME will pay the penalty for their default. In addition, the LC specifies that the lessee takes responsibility for the maintenance and outsources it to the OEM or MCs other than the lessor (LF in this case).

4.3. Model Parameters

Rental Payments ( R ): Rental payments refer to the monthly/quarterly rent that the SME (the “lessee”) pays to the LF (the “lessor”).
(1)
Return rate ( r 1 ,   r 2 ): Return rate refers to the yield that can be earned when completing the investment activity on the lease.
(2)
Reinvestment rate ( r 3 ): Reinvestment rate refers to the yield that the lessee expects to earn when it does not pay or defers the full rental price, which can be put into other investments for extra gains.
(3)
Maintenance fee ( f ): Maintenance fee refers to the cost of carrying out maintenance actions to ensure that the leased asset is in a proper operating condition. In this study, the LC states that the maintenance service must be provided by MCs and completed until the lease termination—the maintenance fee is not embedded in the rental payment.
(4)
Loss rate ( ε ): Loss rate refers to the loss that could result from the lessee’s defaulting behavior—for instance, if the lessee defaults by not returning the leased asset at the end of the lease, which cannot be re-leased to the next lessee upon termination of the previous LC.
The relevant parameters’ notations and definitions are shown in Table 1.

5. Model Formulation

In this section, an evolutionary game model between the SME (the “lessee”) and the LF (the “lessor”) is developed. Before the mathematical payoff matrix is constructed, some assumptions are first provided.

5.1. Basic Assumptions

Assumption 1 (A1):
Rational Participants Assumption.
All participants in the game are boundedly rational [61]. Nodes with constrained computing power may not be able to perfectly utilize all of the information on-chain owing to hardware faults or network congestion. Under asymmetric information, each node will constantly select the optimal strategy to maximize its interests while being affected by multiple factors and will eventually reach a state of equilibrium [62,63].
Assumption 2 (A2):
Strategy Selection Assumption.
Assume that the SME (the “lessee”) chooses to “comply with or default on the LC” with the respective probability of x or 1 x ,   x [ 0 ,   1 ] . The LF (the “lessor”) chooses to “access or not access the CBLP”, utilizing the information shared by stakeholders with the respective probability of y or 1 y ,   y [ 0 ,   1 ] .
Assumption 3 (A3):
Default Behavior Assumption.
For the SME’s unilateral default behavior, assume that it consists of two primary actions: one is not making the full rental payment by the due date, and the other is failing to return the leased asset to the lessor when the LC expires (for simplicity, this study considers that the two actions simultaneously occur when modeling).
Assumption 4 (A4):
Information Sharing Assumption.
The quantity of information shared by the player is 𝓏 i , and the ability of each player to process and utilize the information on-chain [40] is u j , which depends on the computing power. Hence, the amount of effective information on-chain that the SME or the LF obtains from each other is, respectively, u A 𝓏 B and u B 𝓏 A .
Assumption 5 (A5):
Credit Assumption.
Assume that each SME will be assigned a credit value Δ v c , which increases with the LC compliance performance. The higher the credit value owned by the SME, the greater the possibility of the enterprise becoming the “Leader” in the Raft Consensus Protocol (Section 3.2) to validate the lease transaction on each consensus round, so improving the lessee’s reputation and recognition on-chain.
Assumption 6 (A6):
Incentive–Penalty Assumption.
After the SME participates in information sharing, if the enterprise breaches the LC or tries to tamper with the existing LC to legalize the default behavior on-chain, this has a profoundly negative effect on the leasing business, hence making the SME’s default penalty intensity larger under the CBLP—that is, p 2 > p 1 . The penalty can be deducted from the lessee’s token deposit by executing a smart contract of transferring transactions [64].
Assumption 7 (A7):
(Technology) Risk Assumption.
BCT can improve the data transmission efficiency ( φ ) end-to-end, but meanwhile, each player has to bear the data validation on-chain ( ω ) and storage costs off-chain ( λ ) due to the blockchain’s storage limitations. The player also may suffer security risks ( η ), such as data leakage risks and network attack risks [65]. This has practical implications, in that the benefits of sharing information outweigh the relevant costs after joining the blockchain network, φ > ω + λ + η .
Assumption 8 (A8):
Other Cost Assumption.
A8.1: 
The blockchain can record the SME’s credit history as tamper-resistant and traceable data [66], and if the SME joins the blockchain network, the marginal credit investigation cost ( C t ) will shrink and asymptotically approach zero.
A8.2: 
In leased asset management empowered by BCT, the LF can continuously monitor the condition of the leased asset at lower costs [67]—as such, C 1 > C 2 .

5.2. Payoff Matrix

In this model, there are four different strategies. Considering that the model is complicated to understand, based on the above lease scenario and assumptions, this subsection will thoroughly explain the players’ payoff under each strategy.
(1)
Strategy I: S 1 = { Comply, Access }
Since the SME (the “lessee”) fully abides by the LC, and the LF accesses the CBLP, taking advantage of information sharing on-chain, this results in the SME obtaining the rewards of successfully mining the block I , effective information utilization [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] , the return on the lease R r 1 , the incentive σ given by the LF (the “lessor”), plus the credit value; however, the SME has to make the payments of rental R , maintenance fee f , and the consortium membership cost C b .
On the other hand, the LF obtains rent R ,   the return on the lease R r 2 , effective information utilization [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] , synergy gain g on the lease empowered by BCT, plus the residual value of the leased asset v s after receiving the leased asset returned from the SME, while bearing the cost of purchasing the asset from the OEM at price C 0 , monitoring cost C 2 , and the consortium membership cost C b .
Therefore, in Strategy I, the payoffs of the SME and LF are formulated as in Equations (1) and (2), respectively.
P A S 1 = I + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] + R ( r 1 1 ) + σ + Δ v c f C b
P B S 1 = R ( r 2 + 1 ) + v s + [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] + g C 0 C 2 C b
(2)
Strategy II: S 2 = { Default, Access }
Due to default actions (Section 4.2.), the SME uses the rent to perform re-investment and dispose of the leased asset that has been exhaustively used for manufacturing at the end of the lease. Therefore, it gives the SME the chances to earn extra re-reinvestment return R r 3 and sell the leased asset at the market value of the residual v s . Adopting the BCT provides the SME with effective information utilization [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] . However, to continuously keep the leased asset effectively operating without impacting production, the SME still needs to pay the maintenance fee to the MC (instead of the LF) and will be punished in p 2 resulting from the default actions.
Meanwhile, although the LF can obtain the effective information utilization empowered by the BCT, the default behavior by the SME not only causes the LF to be unable to receive the rental payment R ,   but also leads to it losing the further earnings R ε from re-leasing to other lessees due to the out-of-control of the leased asset when the rental period is complete. The asset acquiring cost C 0 , monitoring cost C 2 , and the consortium membership cost C b occur.
Therefore, in Strategy II, the payoffs of the SME and LF are formulated as in Equations (3) and (4), respectively.
P A S 2 = R r 3 + v s + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] f p 2 C b
P B S 2 = [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] R ε C 0 C 2 C b
(3)
Strategy III: S 3 = { Comply, Not-access }
When the SME actively keeps to the stipulations of the LC, the SME earns the investment return R r 1 on the lease and is rewarded by the LF with the incentive σ . However, the SME needs to pay the maintenance fee f to ensure that the leased asset is in good condition.
For the lessor, the LF not only obtains benefit R r 2   from the leasing activity, but it also retains the value of the leased asset v s   at the end of the LC. Nonetheless, the insufficient credit record integrity of the SME forces the LF to incur credit audit expenses C t before making a decision on the lease. The costs ( C 0 ,   C 1 ) of acquiring and monitoring the leased assets are ineluctable.
Therefore, in Strategy III, the payoffs of the SME and LF are formulated as in Equations (5) and (6), respectively.
P A S 3 = R ( r 1 1 ) + σ f
P B S 3 = R ( r 2 + 1 ) + v s C 0 C t C 1
(4)
Strategy IV: S 4 = { Default, Not-access }
Based on the above Strategies II and III, the SME will always earn the reinvestment return R r 3 and residual value v s , but it may also suffer from the default punishment p 1 . In addition, although the SME will resell the leased asset by defaulting, the enterprise has to take responsibility for maintaining it f to ensure that the leased asset remains in an operational condition for manufacturing.
If the SME breaches the LC without joining the blockchain network, the LF does not get any returns, and may even be charged with the costs in credit auditing C t , asset acquiring C 0 , and monitoring C 1 .
Therefore, in Strategy IV, the payoffs of the SME and LF are formulated as in Equations (7) and (8), respectively.
P A S 4 = R r 3 + v s f p 1
P B S 4 = R ε C 0 C t C 1
Consequently, the profit matrix of the two-party game is shown in Table 2.

6. Model Stability Analysis

This section will first construct the replicator dynamic equations between the SME and LF and then will discuss in depth how the two rational players reach an equilibrium state through iteratively changing strategies. A mathematical sensitivity analysis on each type of factor (i.e., information sharing, credit, incentive–penalty, risk) will ultimately be provided.

6.1. Replicator Dynamic System

Based on the above evolutionary game payoff matrix, we can calculate the expected returns of the SME (the “lessee”) and LF (the “lessor”) when they choose different strategies, and then construct the replicator dynamic equations for each subject.

6.1.1. Replication Dynamic Equation of the SME

Assuming the expected return of the SME’s compliance with and, defaulting on the LC, the average returns are E x ,   E 1 x , and E x ¯ , respectively. Then:
E x = y [ I + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] + R ( r 1 1 ) + σ + Δ v c f C b ] + ( 1 y ) [ R ( r 1 1 ) + σ f ]
E 1 x = y [ R r 3 + v s + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] f p 2 C b ] + ( 1 y ) ( R r 3 + v s f p 1 )
E x ¯ = x E x + ( 1 x ) E 1 x
The replication dynamics equation (RDE) [68] of the SME is denoted as follows:
F ( x ) = d x d t = x ( E x E x ¯ ) = x ( 1 x ) ( E x E 1 x ) = x ( 1 x ) [ y ( I + Δ v c + p 2 p 1 ) + ( r 1 r 3 1 )   R + σ + p 1 v s ]
Let F ( x ) = 0 , and we obtain the stationary point of the differential equation as follows:
x 1 = 0 ,   x 2 = 1
y = ( 1 + r 3 r 1 ) R + v s σ p 1 I + Δ v c + p 2 p 1
Based on Equation (14), we can discover that, as shown in Figure 3:
When y = y , the LF can access the CBLP to use the information on-chain with a probability of y , and F ( x ) x = 0 always holds. That is, the state is always stable, regardless of the value of x . Moreover, any change in other exogenous variables will not alter the stability of the state. x is the equilibrium point, and all states are stable.
When y y , the system needs to satisfy two requirements to obtain evolutionary stability, i.e., F ( x ) = 0 and F ( x ) < 0 . Then:
  • In the case of y > y , F ( 1 ) < 0 . x = x 2 = 1 is an evolutionary stable strategy (ESS). When the probability of the LF accessing the CBLP is larger than y , the SME will converge with the equilibrium strategy of “comply with the LC”. The number of SMEs who abide by the contract will gradually increase.
  • In the case of y < y , F ( 0 ) < 0 .   x = x 1 = 0 is an evolutionary stable strategy (ESS). It implies that more SMEs will eventually evolve into a stable state of defaulting on the LC, since LFs struggle to distinguish the forgery of credit records without BCT [69].
According to Equation (14), we can find that the probability of the LF choosing to access the CBLP, requiring the SME to join the consortium, is small, and the SME tends to breach the LC. Moreover, the “comply with or default on the LC” decision of the SME has nothing to do with the information sharing ( 𝓏 i ,   u j ), the asset maintenance fee ( f ), or the consortium membership fee ( C b ). In contrast, the determinant of the decision is the size of the gap between the lease reinvestment earnings (i.e., ( 1 + r 3 r 1 ) R ) that the SME would gain for the default and the rewards (i.e., σ ) it would receive for its compliance.
In addition, Equation (14) gives some further insights that the residual value of the leased asset ( v s ) is positively correlated with the probability y that the LF chooses to access the CBLP. This is because if the LC provisions are that the lessors (i.e., LF) ensure that the residual value of the leased asset is immutably recorded on-chain, it mitigates the uncertainty of residual value risk, aiding the lessor to retain ownership of the asset at the end of the lease. Meanwhile, the default margin penalty ( p 2 p 1 p 1 ) imposed on the SME is negatively correlated with y . When p 2 p 1 p 1 decreases, the probability of the LF choosing to access the CBLP increases, the main reason for which is that the relatively small penalty ( p 2 ) set up on-chain can effectively reduce the default risk of the SME, which makes the LF is more willing to access the CBLP. In addition, owing to the compliance behavior, the higher credit ( Δ v c ) achieved by the SME will stimulate the LF to stick with the conventional leasing mode.

6.1.2. Replication Dynamic Equation of the LF

Assuming the expected return of the LF accessing and not accessing the CBLP to utilize the information shared on-chain, the average returns are E y ,   E 1 y , and E y ¯ , respectively. Then:
E y       = x [ R ( r 2 + 1 ) + v s + [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] + g C 0 C 2 C b ] + ( 1 x ) [ [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] R ε C 0 C 2 C b ]
E 1 y = x [ R ( r 2 + 1 ) + v s C 0 C t C 1 ] + ( 1 x ) [ R ε C 0 C t C 1 ]
E y ¯       = y E y + ( 1 y ) E 1 y
The replication dynamics equation (RDE) [68] of the LF is denoted as follows:
F ( y ) = d y d t = y ( E y E y ¯ )   = y ( 1 y ) ( E y E 1 y ) = y ( 1 y ) [ g x + ( ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ) ]
Let F ( y ) = 0 , and we obtain the stationary point of the differential equation as follows:
y 1 = 0 ,   y 2 = 1 ,
x = C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 g
Based on Equation (20), we can discover that, as shown in Figure 4:
When x = x , the SME complies with the LC with a probability of x , and F ( y ) y = 0 is always established. The state is always stable no matter how the value of y changes. In   this case,   y is the equilibrium point, and all states are stable.
When x x , the system needs to satisfy two requirements to obtain evolutionary stability, i.e., F ( y ) = 0 and F ( y ) < 0 . Then:
  • In the case of x > x , F ( 0 ) < 0 . y = y 1 = 0 is an evolutionary stable strategy (ESS). When the probability of SME compliance is larger than x , the LF converges to the equilibrium strategy of “not accessing the CBLP ”, and thereby the SME does not need to join the consortium blockchain to share information.
  • In the case of x < x , F ( 1 ) < 0 . y = y 2 = 1 is an evolutionary stable strategy (ESS). When the probability of SME compliance is less than   x , the LF will converge with the equilibrium strategy of “access the CBLP ” to participate in information sharing on-chain to complete the lease.
According to Equation (20), we can find that considering the long-term cooperation, when the SME is more likely to abide by the LC, the LF will decide not to access the CBLP due to the limited synergy and information utilization benefits obtained.
In addition, Equation (20) gives some further insights that the asset maintenance cost ( f ) will not affect the SME’s decision to comply or default, since once an outsourced maintenance action begins, it will not be interrupted until the lease expires. Both the consortium membership fee ( C b ) and asset monitoring cost on-chain ( C 2 ) are positively correlated with the x . When the CBLP sets up higher costs for stakeholders to join the consortium, to improve the lease willingness of the LF, the SME is more inclined to comply with the LC and provide genuine lease information. When the leased asset is fully inspected under the CBLP, the SME will not easily default by deferring the lease payment or not returning the leased asset after signing the LC on-chain. Notably, the LF has a higher ability to absorb more high-quality information that the SME shares on-chain, which can expedite the SME’s default behavior. It seems to be a paradox that is contrary to the LF’s decision-making in terms of accessing or not accessing the CBLP. This is because when BCT empowers more information synergy for the LF, the LF is more willing to access the CBLP, which compels the SME to bear the consortium membership cost, data storage, and verification overhead. To compensate for the potential losses that may be suffered, the SME will take risks, opting for default, decreasing the likelihood of compliance. The whole process will finally be formed as an unstable circle.

6.2. Analysis of Equilibrium Stability and ESS

Based on the above analysis, the game system has five local equilibrium points: ( 0 ,   0 ) ,   ( 1 ,   0 ) ,   ( 0 ,   1 ) ,   ( 1 ,   1 ) ,   and   ( x , y ) .
To find the evolutionary stability strategy (ESS), the local stability analysis of the Jacobian matrix is employed [70,71], and thereby we take the first-order derivatives of Equations (12) and (18), respectively, achieving the following Jacobian matrix J .
J = [ F ( x ) x F ( x ) y F ( y ) x F ( y ) y ]
where:
F ( x ) x = ( 1 2 x ) [ y ( I + Δ v c + p 2 p 1 ) + ( r 1 r 3 1 )   R + σ + p 1 v s ]
F ( x ) y = x ( 1 x ) ( I + Δ v c + p 2 p 1 )
F ( y ) x = y ( 1 y ) g
F ( y ) y = ( 1 2 y ) [ g x + ( ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ) ]
Next, we can calculate the trace value t r J and determinant value d e t J of the Jacobian matrix J .
t r J = δ F ( x ) δ x + δ F ( y ) δ y
d e t J = [ δ F ( x ) δ x ] [ δ F ( y ) δ y ] [ δ F ( x ) δ y ] [ δ F ( y ) δ x ]
Thus, the t r J and d e t J to the equilibrium point are shown in Table 3.
The local stability analysis of the five equilibria was performed to investigate the relationship between positive and negative tr J   and det J and evolutionary stability at the five equilibrium points. When a local equilibrium point satisfies the conditions that trace tr J   < 0 and the determinant det J > 0   of the Jacobian matrix J , it is an evolutionary stable strategy (ESS) [72]. If the tr J > 0 and det J > 0 , the equilibrium point is unstable or a saddle point.
Nonetheless, it is obvious that the stationary point ( x , y ) should meet 0 x 1 , 0 y 1 , which is meaningful. Considering g > 0 and 0 C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 g 1 , demonstrating that:
Condition   1 :   { C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 > 0 g > 0 ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 + g C 2 C b > 0
Similarly, according to Assumption 3, we know that p 2 > p 1 , which indicates the denominator of y , I + Δ v c + p 2 p 1 > 0 , then: 0 ( 1 + r 3 r 1 ) R + v s σ p 1 I + Δ v c + p 2 p 1   1 , demonstrating that:
Condition   2 :   { ( 1 + r 3 r 1 ) R + v s σ p 1 > 0 I + Δ v c + p 2 p 1 > 0 I + Δ v c + p 2 + σ v s ( 1 + r 3 r 1 ) R > 0
Based on Condition 1 and Condition 2, we can use the signs of tr J   and det J to judge the stability of the equilibrium point of the evolutionary game. The results are shown in Table 4.
According to Table 4, we can find that E 2 ( 0 , 1 ) and E 3 ( 1 , 0 ) are unstable points. E 5 ( x , y ) is a saddle point revealing that evolutionary stability is affected by the values of x and y . The game system has two ESS equilibrium points: E 1 ( 0 , 0 ) and E 4 ( 1 , 1 ) . This indicates that the game’s ultimate evolutionary strategies are “Strategy I: S 1 = { Comply, Access } ” and “Strategy IV: S 4 = { Default, Not-access } ”, meaning that both SMEs and LFs converge at the locations E 1 and E 4 in Figure 5.
That is, when both parties’ decisions are in the region E 1 E 2 E 5 E 3 , the game evolves to point E 1 ( 0 , 0 ) , i.e., the SME breaches the LC, and the LF does not access the CBLP, requiring the SME to access the consortium blockchain. When both parties’ decisions are located in region E 2 E 4 E 3 E 5 , the game evolves into the ideal stable state E 4 ( 1 , 1 ) , i.e., the SME abides by the LC and the LF requires the SME to access the consortium blockchain. The probability of the evolutionary outcome between the game subjects can be represented in terms of the area of the regions E 1 E 2 E 5 E 3   and E 2 E 4 E 3 E 5 [73], the size of which depends on the coordinates of the point E 5 (the saddle point ( x , y ) ), where: S E 1 E 2 E 5 E 3 = 1 2 ( x + y ) ,   S E 2 E 4 E 3 E 5 = 1 2 [ ( 1 x ) + ( 1 y ) ] .   The possibility that the SME will conform to the contract and be required to access the CBLP increases as the region E 2 E 4 E 3 E 5 expands.

6.3. Sensitivity Analysis in the Evolutionary Game

The choices made by the game subjects are influenced by the exogenous variables in the model. By taking derivatives of S E 2 E 4 E 3 E 5 (abbreviated hereafter as ‘ S ’) while holding the other parameters constant, it is possible to determine how each parameter affects the game’s evolutionary results (i.e., S E 2 E 4 E 3 E 5 ).
x = C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 g
y = ( 1 + r 3 r 1 ) R + v s σ p 1 I + Δ v c + p 2 p 1
S E 2 E 4 E 3 E 5 = S = 1 2 [ ( 1 C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 g ) + ( 1 ( 1 + r 3 r 1 ) R + v s σ p 1 I + Δ v c + p 2 p 1 ) ]
The evolutionary game results are primarily related to the four main determinants: information sharing, credit, incentive–penalty, and risk. The sensitivity analysis of the influence of the four factors on S E 2 E 4 E 3 E 5 is described below.

6.3.1. Impact of Information Sharing on S

Taking the derivatives of Equation (32) corresponding to 𝓏 A , 𝓏 B , and u B ,
S 𝓏 A = u B 2 g > 0
S 𝓏 B = φ ω λ η 2 g > 0
S u B = 𝓏 A 2 g > 0
S is an increasing function of 𝓏 A and 𝓏 B , since Equation (34) is true under Assumption 7 (A7). That is, as the amount of information shared on-chain ( 𝓏 i ) increases, S will gradually increase, indicating the possibility of evolution to the stable state E 4 ( 1 ,   1 ) as the quantity of information shared on-chain increases. It further means that this parameter has a favorable impact on the probability of SMEs’ decisions to comply with the contract and being required to join the consortium. The more accurate the information that is shared on the blockchain network, the easier it will be to create a transparent and reliable environment for leasing, and the more SMEs will actively disclose high-quality information to ensure that leasing transactions are executed smoothly.
S is an increasing function of u B . The more the LF can use the effective data on-chain, the more the LF is likely to access the CBLP to clearly monitor the SME’s compliance with the LC, thus increasing the likelihood of rental payment on time.

6.3.2. Impact of Credit on S

Taking the derivatives of Equation (32) corresponding to Δ v c ,
S Δ v c = ( 1 + r 3 r 1 ) R + v s σ p 1 2 ( I + Δ v c + p 2 p 1 ) 2 > 0
S is an increasing function of Δ v c . Therefore, as Δ v c increases, the SME has a higher probability of conforming to the LC. Then, a higher credit value is assigned to the SME, resulting in the SME’s nodes having a higher probability of being selected as a leader node when performing the Raft consensus protocol. Conversely, a node will be removed from the Consenter Set if its total credit value falls below the minimum threshold because of multiple defaults, escalating the penalty and helping to establish a high-credit leasing environment.

6.3.3. Impact of Incentive–Penalty on S

Taking the derivative of Equation (32) corresponding to σ ,   I , g and p2,
S σ = 1 2 ( I + Δ v c + p 2 p 1 ) > 0
S I = ( 1 + r 3 r 1 ) R + v s σ p 1 2 ( I + Δ v c + p 2 p 1 ) 2 > 0
S g = C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 2 g 2 > 0
S p 2 = ( 1 + r 3 r 1 ) R + v s σ p 1 2 ( I + Δ v c + p 2 p 1 ) 2 > 0
S is an increasing function of σ ,   I , g , and p 2 . The likelihood that previously defaulting SMEs will start to keep their contracts and that the SME is motivated to access the blockchain increases with the incentives the LF provides to them. To encourage a node to choose the on-chain strategy and to encourage more SMEs to become consortium nodes, the LF can appropriately boost the compliance reward of the SMEs when creating the incentive strategy. No matter whether the SME defers the rental payment or refuses to return the leased asset, both default behaviors will lead to the lessee being charged a penalty, which irrevocably damages the SME’s reputation on-chain. Hence, once the SME joins the consortium, the likelihood of compliance rises as the default penalties rise. The LF will also keep using the on-chain strategy to observe how the SMEs choose their payment strategies. Therefore, the penalties for SMEs should be suitably enhanced to guarantee a prompt rental payment.

6.3.4. Impact of Risk on S

Taking the derivatives of Equation (32) corresponding to   φ ,   ω , λ , and η ,
S φ = 𝓏 B 2 g > 0
S ω = 𝓏 B 2 g < 0
S λ = 𝓏 B 2 g < 0
S η = 𝓏 B 2 g < 0
S is an increasing function of φ . When more high-quality data are effectively distributed and shared by each subject on-chain, more subjects will join the consortium to complete the leasing transactions as more return is generated.
In addition, S is a decreasing function of ω , λ , and η . If the participants bear more consensus verification and storage costs, and take on greater security risks, they will be more reluctant to join the consortium and the probability of default will increase.
To sum up, different types of factors will have different effects on decision-making.

7. Numerical Experiments and Implications

This section will present some simulation results. We first use VENSIM PLE to build a system dynamics (SD) model to analyze the causal relationships among the variables and strategies. Then, MATLAB_R2021b is employed to examine the efficacy of the evolutionary stable strategies (ESSs) and to demonstrate the previous mathematical sensitivity analysis of each factor. Lastly, some implications of the results are given.
The game system has intermediate variables (including E x ,   E 1 x ,   E y ,     E 1 y ) and a range of exogenous variables (as presented in Table 1). We set initial values for the exogenous variables involved in the model, as shown in Table 5. In this study, it is assumed that all exogenous variables are positive, and the return of each strategy of each game subject is guaranteed to be positive.

7.1. System Dynamics Model Experiment

We establish the SD model of the two-party evolutionary game system as depicted in Figure 6. The arrow tails in Table 5 are connected to the independent variables in the associated equation, and the arrowheads are connected to the dependent variables. We set the simulation parameters of INITIAL TIME = 0, FINAL TIME = 10, and TIME STEP = 0.0078125.
It can be seen from Figure 7a,b that when the initial states of both sides are pure strategies (i.e., ( 0 ,   0 ) ,   ( 0 ,   1 ) ,   ( 1 ,   0 ) ,   and   ( 1 ,   1 ) ), no party in the system is willing to change the current state to break the equilibrium. For instance, the initial state of ( x = 0 ,   y = 0 ) or ( x = 1 ,   y = 1 ) will be unchanged if there is no interruption during the evolution. However, this does not mean that these equilibrium states are stable, and once one or both parties take the initiative to make a small change, the equilibrium state will be broken. Although the SME’s compliance probability x and the LF’s CBLP access probability   y (for 0.0001) evolve with small mutations, they quickly shift to a new strategy once they find that doing this will yield a higher expected return, thus adjusting the strategy through a mutation of parties to bring the system into a new equilibrium. In addition, through simulating the model, we also discover that the ultimate equilibrium state is ( 1 ,   1 ) when the initial state is x = 0.5 ,   y = 0.5 ,   as shown in Figure 7c.
In fact, when x = 0 , no matter how y ranges from 0 to 1, the system will reach an equilibrium state ( 0 ,   0 ) . When x = 1 , no matter how y ranges from 0 to 1, the system will reach an equilibrium state ( 1 ,   1 ) . Similarly, when y = 0 , no matter how x ranges from 0 to 1, the system will reach an equilibrium state ( 0 ,   0 ) , and when y = 1 , no matter how x ranges from 0 to 1, the system will reach an equilibrium state ( 1 ,   1 ) .

7.2. Effect of Parameter Changes on Evolutionary Stable Strategies

We initiate the probabilities of x and y with values ranging from 0 to 1 in steps of 0.1. It can be seen from Figure 8 that almost all curves converge at ( 0 ,   0 ) and ( 1 ,   1 ) , which is consistent with the preceding discussion in Section 6.2.
The following subsection further discusses the impacts of the four factors on evolution. Here, we assume the initial strategy probability for each participant is 0.5.

7.2.1. Evolution Impacted by Information Sharing

The initial quantity of information sharing ( 𝓏 i ) for each participant was set to 1, 3, 5, 7, and 9. As shown in Figure 9a. there are two critical values. When 𝓏 i is greater than 5 and less than 3, the probability is that all parties will converge at 1 and 0, respectively. The system evolves to the states (1, 1) and (0, 0), accordingly. When the computing power u j of each organization is less than 0.3, x and y both converge at 0 , and the system evolves to the state ( 0 ,   0 ) (see Figure 9b). When u j is greater than 0.5, it results in an evolutionary state ( 1 ,   1 ) , indicating that the parties with higher computation are more willing to be incentivized to join the consortium blockchain to share information.

7.2.2. Evolution Impacted by Credit

In order to further study how different levels of credit affect the decision-making of SMEs and LFs, we simulate the factor “credit value” in the range from 1 to 10, with a step size of 2, while keeping the other parameters at their initial values. Figure 10 indicates that all curves gradually converged to x = 1 ,   y = 1 , indicating that higher credit helps to motivate the SME to fulfill the contract and join the blockchain to share their information. However, it also can be found that the SME’s strategy of choosing to keep the contract is more influenced and motivated by “credit” than the strategy of joining the blockchain.

7.2.3. Evolution Impacted by Incentive-Penalty

We award an incentive I (e.g., a kind of “gas” fee with blockchain) to the SMEs who publish a valid block during the financing transaction confirmation process. When we dynamically adjust the incentive value I from 1.2 to 9.6, we are surprised to find that the system always evolves to the equilibrium point ( 1 , 1 ) in Figure 11a. This means that no matter how many block rewards are paid to the SME for being a block verifier/miner, the SME resolutely adheres to conforming to the contract and enters the blockchain, whereas with a higher I , the SME is more proactive in participating in information sharing on-chain.
We set the penalty on-chain ( p 2 ) to 2, 4, 6, 8, and 10, revealing the evolution curves of x ( t ) and y ( t ) following the change in p 2 , as shown in Figure 11b. The figure shows that when the punishment intensity is relatively small, for instance p 2 = 2 , the SME tends to breach the contract, and when the punishment intensity increases to p 2 = 8 , the SME tends to actively comply with the contract. In other words, the penalty has a threshold that affects the SME’s strategy selection of SMEs joining the blockchain, which is outside of the initial expectations—for example, a high penalty erodes the incentive to participate in information sharing.

7.2.4. Evolution Impacted by Risk

We set the risk cost of the consensus on-chain ( ω ) and storage off-chain ( μ ) to 0.2, 0.4, 0.6, 0.8, and 1.0, and the corresponding impacts on the two parties’ strategies were analyzed. As shown in Figure 12, the critical value of the initial risk cost is between 0.2 and 0.4. When the risk is less than 0.2, the SME’s and LF’s probabilities x and y both converged at 1. Vice versa, when the risk level is greater than 0.4, the system evolves to point ( 1 ,   1 ) . Similar results can be inferred from the influencing security risk ( η ).

7.3. Implications of the Results

Based on the above replicator dynamic analysis and simulation results, this study provides some implications:
(1)
The results reveal that the residual value of the leased asset is a decisive factor supporting the lessor’s access strategy. Before signing the LC, it is necessary to estimate the asset residual value; if the value is relatively large at the termination of the lease, LFs (lessors) have a high probability of actively adopting BCT to efficiently prove their ownership of the leased asset on-chain. Thus, from the perspective of reducing risks of leased asset default, a blockchain-based leasing service provided by the lessor is more beneficial for an operating lease than a capital lease.
(2)
Most leasing businesses tend to treat maintenance as a non-core activity and commonly outsource it to a third-party MC [10], as assumed in this study (Section 4). The results indicate that when the maintenance fee is not embedded in the rental payment, the maintenance charge is not a determinant impacting the lessee’s decisions regarding compliance with/defaulting on the LC. Hence, before the lessor decides whether to adopt BCT, it is necessary to take into consideration the in-house or outsourced maintenance problem.
(3)
To encourage lessees and lessors to evolve to the ideal equilibrium state, an incentive mechanism should be designed to motivate all parties to cooperatively construct a sustainable and more trustworthy leasing environment. More high-quality information should be shared on-chain, and stakeholders should also improve the capability to effectively utilize the data on- and off-chain [74]. In contrast to the fixed rewards resulting from block mining, the incentive associated with incremental or deductible credit value for consensus action tends to inspire lessees’ willingness to comply with the contract under the BCT-based leasing business. An appropriate default penalty should be set up on-chain that can deter the lessee from defaulting and encourage it to make rental payments on time and return the leased asset as agreed in the LC. When making strategic decisions to join the consortium to share information, participants (particularly lessees) are more sensitive to the technology risk factor to which they are subject. To reduce the cost of building and maintaining the blockchain system to support the leasing business (e.g., on-chain and off-chain storage costs, verification costs, etc.), it is advised and helpful to embed blockchain-as-a-service (BaaS) in our CBLP in the future [75], which will also enhance SMEs’ willingness to share more valuable information on-chain, achieving a win–win outcome in the leasing business.

8. Conclusions and Future Works

8.1. Conclusions

BCT provides a new idea for leasing to address the challenges of the information asymmetry and traceability of leased assets to some degree. Hence, there exists great significance in designing an incentive mechanism to encourage lessees and lessors to join the consortium blockchain and actively share information on-chain. This study first proposes a conceptual architecture of the consortium blockchain-based leasing platform (CBLP), then constructs a dynamical evolutionary game model between the SME (the “lessee”) and LF (the “lessor”). Our primary findings are as follows:
(1)
With long-term cooperation, the two parties (lessee and lessor) eventually evolve to adopt strategies in which the lessee is more inclined to conform to the LC and the lessor becomes more proactive in accessing the CBLP as a consortium node to share information on-chain.
(2)
According to previous basic lease scenarios that we assumed, two default actions are explored: (i) overdue rental payment; (ii) asset disposal against the LC. For the former default action, we found that the larger proceeds gained resulting from reinvesting the rental payment will cause the lessee to default, and at this time, the lessor will tend to adopt BCT to mitigate the overdue-payment default risk. In addition, the residual value of the leased asset has a positive impact on the exposure at default, and the lessee will be more likely to default by not returning the leased asset to the lessor due to the temptation of the high profit achieved from asset disposal at the end of the lease. Meanwhile, the lessee’s default on asset disposals will result in the lessor being more inclined to adopt BCT to ensure a timely claim of repossession of the leased asset.
(3)
Although blockchain can guarantee data reliability (e.g., maintenance events) [76], maintenance cost is not a determinant of the equilibrium state once the maintenance service is outsourced. On the contrary, in-house maintenance provided by the lessor may affect the two parties’ strategic decisions.
(4)
When the lessee and lessor have incentives to participate in sharing or utilizing more information on-chain, the lessee will eventually evolve to conform to the LC, which will benefit the lessor and leasing industry. Setting up a changeable credit associated with the lessee’s LC performance to compete for a block accounting right via a consensus mechanism [77] is an effective way to incentivize the lessee to comply with the LC, while this method does not work much to incentive the lessor to adopt BCT. In addition, only when the default penalty on-chain exceeds a critical value can it work to incentivize lessees to correctly fulfill their obligations in the LC [78], once the penalty is lower than a critical value, which will in return increase the default risk. The technology risks and relevant costs concerning CBLP deployment play a vital role in encouraging the consortium to participate in information sharing on-chain, which is consistent with what we expected in reality.
In summary, this study enables lessees and lessors to build a trustworthy cooperative relationship on the consortium blockchain-based leasing platform, while also assisting lessors or regulators in taking effective measures to incentivize lessees to comply with the lease contract and share more information on-chain to enhance the management of default risks in the leasing industry.

8.2. Limitations and Future Directions

Considering that the practical application of BCT in the leasing industry is rare, it is difficult to obtain real data. Thus, this study focuses on mathematical modeling and numerical simulation. The conclusions of this study can be further demonstrated and enriched via empirical analysis of specific cases. Meanwhile, there are still some avenues to be explored in the future. For example, it is meaningful to explore “tripartite–win” strategies among lessees, lessors, and OEMs (or third-party MCs). Additionally, blockchain smart contracts play an essential role in financing transactions [79]. Further research can offer new insights into the cost reduction and value transfer of using smart contracts [80] to motivate the related parties to share information.

Author Contributions

Conceptualization, H.C.; methodology, H.C. and J.L. (Jing Lu); software, H.C. and J.L. (Jian Li); validation, H.C., J.L. (Jing Lu) and Z.X.; formal analysis, H.C. and J.L. (Jian Li); data curation, H.C. and J.L. (Jian Li); writing-original draft, H.C.; writing-review and editing, S.-L.L.; visualization, H.C. and Z.X; supervision, S.-L.L.; All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly funded by the Department of Science and Technology of Guangdong Province [Grant number 2020A0505090004] and Macau Science and Technology Development Funds [Grant number 0061/2020/A2, 0158/2019/A3].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to the editors and the anonymous referees for their constructive and thorough comments, which helped to improve our paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

OEMOriginal Equipment Manufacturer
SMEsSmall and Medium-Sized Enterprises
LFsLeasing Firms
MCsMaintenance Centers
LCLease Contract
CPLCapital Lease
OPLOperating Lease
EGTEvolutionary Game Theory
ESSEvolutionary Stable Strategy
BCTBlockchain Technology
RDEReplication Dynamics Equation
CBLPConsortium Blockchain-Based Leasing Platform
HLFHyperledger Fabric
BaaSBlockchain as a Service
CSPCloud Storage Provider
IPFSInterPlanetary File System

References

  1. Mol-Gómez-Vázquez, A.; Hernández-Cánovas, G.; Köeter-Kant, J. Economic and Institutional Determinants of Lease Financing for European SMEs: An Analysis across Developing and Developed Countries. J. Small Bus. Manag. 2020, 1–22. [Google Scholar] [CrossRef]
  2. Li, J.; Wang, H.; Deng, Z.; Zhang, W.; Zhang, G. Leasing or Selling? The Channel Choice of Durable Goods Manufacturer Considering Consumers’ Capital Constraint. Flex. Serv. Manuf. J. 2022, 34, 317–350. [Google Scholar] [CrossRef]
  3. Eisfeldt, A.L.; Rampini, A.A. Leasing, Ability to Repossess, and Debt Capacity. Rev. Financ. Stud. 2009, 22, 1621–1657. [Google Scholar] [CrossRef] [Green Version]
  4. Van Loon, P.; Delagarde, C.; Van Wassenhove, L.N.; Mihelič, A. Leasing or Buying White Goods: Comparing Manufacturer Profitability versus Cost to Consumer. Int. J. Prod. Res. 2020, 58, 1092–1106. [Google Scholar] [CrossRef]
  5. Smith, C.W.; Wakeman, L.M. Determinants of Corporate Leasing Policy. J. Financ. 1985, 40, 895–908. [Google Scholar] [CrossRef]
  6. Zheng, B.-K.; Zhu, L.-H.; Shen, M.; Gao, F.; Zhang, C.; Li, Y.-D.; Yang, J. Scalable and Privacy-Preserving Data Sharing Based on Blockchain. J. Comput. Sci. Technol. 2018, 33, 557–567. [Google Scholar] [CrossRef]
  7. Dedeoglu, V.; Jurdak, R.; Dorri, A.; Lunardi, R.C.; Michelin, R.A.; Zorzo, A.F.; Kanhere, S.S. Blockchain Technologies for IoT; Springer: Berlin/Heidelberg, Germany, 2020; pp. 55–89. ISBN 9789811387753. [Google Scholar]
  8. Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain Technology and Its Relationships to Sustainable Supply Chain Management. Int. J. Prod. Res. 2019, 57, 2117–2135. [Google Scholar] [CrossRef] [Green Version]
  9. Wang, W.; Feng, L.; Li, Y.; Xu, F.; Deng, Q. Role of Financial Leasing in a Capital-Constrained Service Supply Chain. Transp. Res. Part E Logist. Transp. Rev. 2020, 143, 102097. [Google Scholar] [CrossRef]
  10. Lease Accounting Framework and the Development of International Accounting Standards|SpringerLink. Available online: https://link.springer.com/chapter/10.1007/978-3-030-71633-2_2 (accessed on 29 November 2022).
  11. Murthy, D.N.P.; Jack, N. Extended Warranties, Maintenance Service and Lease Contracts; Springer Series in Reliability Engineering; Springer: London, UK, 2014; ISBN 978-1-4471-6439-5. [Google Scholar]
  12. Kaposty, F.; Klein, P.; Löderbusch, M.; Pfingsten, A. Loss given default in SME leasing. Rev. Manag. Sci. 2022, 16, 1561–1597. [Google Scholar] [CrossRef]
  13. Kuhle, P. Building A Blockchain-Based Decentralized Digital Asset Management System for Commercial Aircraft Leasing. Comput. Ind. 2021, 21, 103393. [Google Scholar] [CrossRef]
  14. Altman, E.I.; Brady, B.; Resti, A.; Sironi, A. The Link between Default and Recovery Rates: Theory, Empirical Evidence, and Implications. J. Bus. 2005, 78, 2203–2228. [Google Scholar] [CrossRef]
  15. Kysucky, V.; Norden, L. The Benefits of Relationship Lending in a Cross-Country Context: A Meta-Analysis. Manag. Sci. 2016, 62, 90–110. [Google Scholar] [CrossRef] [Green Version]
  16. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21260. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 27 January 2023).
  17. Politou, E.; Casino, F.; Alepis, E.; Patsakis, C. Blockchain Mutability: Challenges and Proposed Solutions. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1972–1986. [Google Scholar] [CrossRef] [Green Version]
  18. Viriyasitavat, W.; Hoonsopon, D. Blockchain Characteristics and Consensus in Modern Business Processes. J. Ind. Inf. Integr. 2019, 13, 32–39. [Google Scholar] [CrossRef]
  19. Yu, Y.; Huang, G.; Guo, X. Financing Strategy Analysis for a Multi-Sided Platform with Blockchain Technology. Int. J. Prod. Res. 2021, 59, 4513–4532. [Google Scholar] [CrossRef]
  20. Belotti, M.; Božić, N.; Pujolle, G.; Secci, S. A Vademecum on Blockchain Technologies: When, Which, and How. IEEE Commun. Surv. Tutor. 2019, 21, 3796–3838. [Google Scholar] [CrossRef] [Green Version]
  21. Singh, S.K.; Jenamani, M.; Dasgupta, D.; Das, S. A Conceptual Model for Indian Public Distribution System Using Consortium Blockchain with On-Chain and off-Chain Trusted Data. Inf. Technol. Dev. 2021, 27, 499–523. [Google Scholar] [CrossRef]
  22. Dutta, P.; Choi, T.-M.; Somani, S.; Butala, R. Blockchain Technology in Supply Chain Operations: Applications, Challenges and Research Opportunities. Transp. Res. Part E Logist. Transp. Rev. 2020, 142, 102067. [Google Scholar] [CrossRef]
  23. Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain Technology in the Energy Sector: A Systematic Review of Challenges and Opportunities. Renew. Sustain. Energy Rev. 2019, 100, 143–174. [Google Scholar] [CrossRef]
  24. Tandon, A.; Dhir, A.; Islam, A.K.M.N.; Mäntymäki, M. Blockchain in Healthcare: A Systematic Literature Review, Synthesizing Framework and Future Research Agenda. Comput. Ind. 2020, 122, 103290. [Google Scholar] [CrossRef]
  25. Leng, J.; Ruan, G.; Jiang, P.; Xu, K.; Liu, Q.; Zhou, X.; Liu, C. Blockchain-Empowered Sustainable Manufacturing and Product Lifecycle Management in Industry 4.0: A Survey. Renew. Sustain. Energy Rev. 2020, 132, 110112. [Google Scholar] [CrossRef]
  26. Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
  27. Loukil, F.; Abed, M.; Boukadi, K. Blockchain Adoption in Education: A Systematic Literature Review. Educ. Inf. Technol. 2021, 26, 5779–5797. [Google Scholar] [CrossRef]
  28. Wang, J.; Wu, P.; Wang, X.; Shou, W. The Outlook of Blockchain Technology for Construction Engineering Management. Front. Eng. Manag. 2017, 67–75. [Google Scholar] [CrossRef] [Green Version]
  29. Auer, S.; Nagler, S.; Mazumdar, S.; Mukkamala, R.R. Towards Blockchain-IoT Based Shared Mobility: Car-Sharing and Leasing as a Case Study. J. Netw. Comput. Appl. 2022, 200, 103316. [Google Scholar] [CrossRef]
  30. Faber, B.; Michelet, G.C.; Weidmann, N.; Mukkamala, R.R.; Vatrapu, R. BPDIMS: A Blockchain-Based Personal Data and Identity Management System. In Proceedings of the 52nd Hawaii International Conference on System Sciences, Maui, HI, USA, 8–11 January 2019; pp. 6855–6864. [Google Scholar]
  31. Obour Agyekum, K.O.-B.; Xia, Q.; Boateng Sifah, E.; Amofa, S.; Nketia Acheampong, K.; Gao, J.; Chen, R.; Xia, H.; Gee, J.C.; Du, X.; et al. V-Chain: A Blockchain-Based Car Lease Platform. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), HICSS, Halifax, NS, Canada, 30 July–3 August 2018; pp. 1317–1325. [Google Scholar]
  32. Zheng, K.; Zheng, L.J.; Gauthier, J.; Zhou, L.; Xu, Y.; Behl, A.; Zhang, J.Z. Blockchain Technology for Enterprise Credit Information Sharing in Supply Chain Finance. J. Innov. Knowl. 2022, 7, 100256. [Google Scholar] [CrossRef]
  33. Fiorentino, S.; Bartolucci, S. Blockchain-Based Smart Contracts as New Governance Tools for the Sharing Economy. Cities 2021, 117, 103325. [Google Scholar] [CrossRef]
  34. Delle Foglie, A.; Panetta, I.C.; Boukrami, E.; Vento, G. The Impact of the Blockchain Technology on the Global Sukuk Industry: Smart Contracts and Asset Tokenisation. Technol. Anal. Strateg. Manag. 2021, 1–15. [Google Scholar] [CrossRef]
  35. Wang, J.; Zhou, Z.; Botterud, A. An Evolutionary Game Approach to Analyzing Bidding Strategies in Electricity Markets with Elastic Demand. Energy 2011, 36, 3459–3467. [Google Scholar] [CrossRef]
  36. Wang, J.; Peng, X.; Du, Y.; Wang, F. A Tripartite Evolutionary Game Research on Information Sharing of the Subjects of Agricultural Product Supply Chain with a Farmer Cooperative as the Core Enterprise. Manag. Decis. Econ. 2022, 43, 159–177. [Google Scholar] [CrossRef]
  37. Apaloo, J.; Brown, J.S.; Vincent, T.L. Evolutionary Game Theory: ESS, Convergence Stability, and NIS. Evol. Ecol. Res. 2009, 11, 489–515. [Google Scholar]
  38. Chen, Y.; Zeng, Q.; Zheng, X.; Shao, B.; Jin, L. Safety Supervision of Tower Crane Operation on Construction Sites: An Evolutionary Game Analysis. Saf. Sci. 2022, 152, 105578. [Google Scholar] [CrossRef]
  39. Su, L.; Cao, Y.; Li, H.; Tan, J. Blockchain-Driven Optimal Strategies for Supply Chain Finance Based on a Tripartite Game Model. J. Theor. Appl. Electron. Commer. Res. 2022, 17, 67. [Google Scholar] [CrossRef]
  40. Tang, Q.; Zhang, Z.; Yuan, Z.; Li, Z. The Game Analysis of Information Sharing for Supply Chain Enterprises in the Blockchain. Supply Chain 2022, 2, 13. [Google Scholar] [CrossRef]
  41. Sun, R.; He, D.; Su, H. Evolutionary Game Analysis of Blockchain Technology Preventing Supply Chain Financial Risks. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 155. [Google Scholar] [CrossRef]
  42. Song, L.; Luo, Y.; Chang, Z.; Jin, C.; Nicolas, M. Blockchain Adoption in Agricultural Supply Chain for Better Sustainability: A Game Theory Perspective. Sustainability 2022, 14, 1470. [Google Scholar] [CrossRef]
  43. Figueroa-Lorenzo, S.; Añorga, J.; Arrizabalaga, S. Methodological Performance Analysis Applied to a Novel IIoT Access Control System Based on Permissioned Blockchain. Inf. Process. Manag. 2021, 58, 102558. [Google Scholar] [CrossRef]
  44. Xu, X.; Sun, G.; Luo, L.; Cao, H.; Yu, H.; Vasilakos, A.V. Latency Performance Modeling and Analysis for Hyperledger Fabric Blockchain Network. Inf. Process. Manag. 2021, 58, 102436. [Google Scholar] [CrossRef]
  45. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. arXiv 2018, arXiv:1801.10228. [Google Scholar]
  46. Rizzardi, A.; Sicari, S.; Miorandi, D.; Coen-Porisini, A. Securing the Access Control Policies to the Internet of Things Resources through Permissioned Blockchain. Concurr. Comput. Pract. Exp. 2022, 34, e6934. [Google Scholar] [CrossRef]
  47. Steinhoff, S.; Stathakopoulou, C.; Pavlovic, M.; Vukolić, M. BMS: Secure Decentralized Reconfiguration for Blockchain and BFT Systems. arXiv 2021, arXiv:210903913. [Google Scholar]
  48. Liu, Y.; Lu, Q.; Paik, H.-Y.; Xu, X.; Chen, S.; Zhu, L. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity. IEEE Softw. 2020, 37, 30–36. [Google Scholar] [CrossRef]
  49. Viriyasitavat, W.; Xu, L.D.; Sapsomboon, A.; Dhiman, G.; Hoonsopon, D. Building Trust of Blockchain-Based Internet-of-Thing Services Using Public Key Infrastructure. Enterp. Inf. Syst. 2022, 16, 2037162. [Google Scholar] [CrossRef]
  50. Kuhn, M.; Funk, F.; Zhang, G.; Franke, J. Blockchain-Based Application for the Traceability of Complex Assembly Structures. J. Manuf. Syst. 2021, 59, 617–630. [Google Scholar] [CrossRef]
  51. Herrera-Joancomartí, J.; Pérez-Solà, C. Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions. In Proceedings of the Modeling Decisions for Artificial Intelligence; Springer International Publishing: Cham, Switzerland, 2016; pp. 26–44. [Google Scholar]
  52. Miyachi, K.; Mackey, T.K. HOCBS: A Privacy-Preserving Blockchain Framework for Healthcare Data Leveraging an on-Chain and off-Chain System Design. Inf. Process. Manag. 2021, 58, 102535. [Google Scholar] [CrossRef]
  53. Solaiman, E.; Wike, T.; Sfyrakis, I. Implementation and Evaluation of Smart Contracts Using a Hybrid On-and Off-blockchain Architecture. Concurr. Comput. Pract. Exp. 2021, 33, e5811. [Google Scholar] [CrossRef]
  54. Wu, H.; Peng, Z.; Guo, S.; Yang, Y.; Xiao, B. VQL: Efficient and Verifiable Cloud Query Services for Blockchain Systems. IEEE Trans. Parallel Distrib. Syst. 2021, 33, 1393–1406. [Google Scholar] [CrossRef]
  55. Udokwu, C.; Norta, A. Deriving and Formalizing Requirements of Decentralized Applications for Inter-Organizational Collaborations on Blockchain. Arab. J. Sci. Eng. 2021, 46, 8397–8414. [Google Scholar] [CrossRef]
  56. Surjandari, I.; Yusuf, H.; Laoh, E.; Maulida, R. Designing a Permissioned Blockchain Network for the Halal Industry Using Hyperledger Fabric with Multiple Channels and the Raft Consensus Mechanism. J. Big Data. 2021, 8, 10. [Google Scholar] [CrossRef]
  57. Fu, W.; Wei, X.; Tong, S. An Improved Blockchain Consensus Algorithm Based on Raft. Arab. J. Sci. Eng. 2021, 46, 8137–8149. [Google Scholar] [CrossRef]
  58. Zhang, Y.; Zhang, L.; Liu, Y.; Luo, X. Proof of Service Power: A Blockchain Consensus for Cloud Manufacturing. J. Manuf. Syst. 2021, 59, 1–11. [Google Scholar] [CrossRef]
  59. Nechaev, A.S.; Zakharov, S.V.; Barykina, Y.N.; Vel’m, M.V.; Kuznetsova, O.N. Forming Methodologies to Improving the Efficiency of Innovative Companies Based on Leasing Tools. J. Sustain. Financ. Invest. 2022, 12, 536–553. [Google Scholar] [CrossRef]
  60. Li, Z.; Zhong, R.Y.; Tian, Z.-G.; Dai, H.-N.; Barenji, A.V.; Huang, G.Q. Industrial Blockchain: A State-of-the-Art Survey. Robot. Comput.-Integr. Manuf. 2021, 70, 102124. [Google Scholar] [CrossRef]
  61. Li, B.; Li, H.; Sun, Q.; Chen, X. Evolutionary Game Analysis between Businesses and Consumers under the Background of Internet Rumors. Concurr. Comput. Pract. Exp. 2022, 34, e5897. [Google Scholar] [CrossRef]
  62. Weibull, J.W. Evolutionary Game Theory; MIT Press: Cambridge, MA, USA, 1997; ISBN 0-262-73121-5. [Google Scholar]
  63. Xu, B.; Li, Q. Research on Supervision Mechanism of Big Data Discriminatory Pricing on the Asymmetric Service Platform—Based on SD Evolutionary Game Model. J. Theor. Appl. Electron. Commer. Res. 2022, 17, 63. [Google Scholar] [CrossRef]
  64. Kang, H.; Dai, T.; Jean-Louis, N.; Tao, S.; Gu, X. Fabzk: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric; IEEE: Piscataway, NJ, USA, 2019; pp. 543–555. [Google Scholar]
  65. Bhushan, B.; Sinha, P.; Sagayam, K.M.; Andrew, J. Untangling Blockchain Technology: A Survey on State of the Art, Security Threats, Privacy Services, Applications and Future Research Directions. Comput. Electr. Eng. 2021, 90, 106897. [Google Scholar] [CrossRef]
  66. Liu, J.; Zhang, H.; Zhen, L. Blockchain Technology in Maritime Supply Chains: Applications, Architecture and Challenges. Int. J. Prod. Res. 2021, 1–17. [Google Scholar] [CrossRef]
  67. Chang, V.; Baudier, P.; Zhang, H.; Xu, Q.; Zhang, J.; Arami, M. How Blockchain Can Impact Financial Services—The Overview, Challenges and Recommendations from Expert Interviewees. Technol. Forecast. Soc. Chang. 2020, 158, 120166. [Google Scholar] [CrossRef]
  68. Li, Q.; Wang, Y.; Li, K.; Chen, L.; Wei, Z. Evolutionary Dynamics of the Last Mile Travel Choice. Phys. Stat. Mech. Appl. 2019, 536, 122555. [Google Scholar] [CrossRef]
  69. Qiao, Y.; Lan, Q.; Zhou, Z.; Ma, C. Privacy-Preserving Credit Evaluation System Based on Blockchain. Expert Syst. Appl. 2022, 188, 115989. [Google Scholar] [CrossRef]
  70. Friedman, D. On Economic Applications of Evolutionary Game Theory. J. Evol. Econ. 1998, 8, 15–43. [Google Scholar] [CrossRef] [Green Version]
  71. Nowak, M.A.; Sigmund, K. Evolutionary Dynamics of Biological Games. Science 2004, 303, 793–799. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  72. Ritzberger, K.; Weibull, J.W. Evolutionary Selection in Normal-Form Games. Econom. J. Econom. Soc. 1995, 63, 1371–1399. [Google Scholar] [CrossRef]
  73. Kang, K.; Zhao, Y.; Zhang, J.; Qiang, C. Evolutionary Game Theoretic Analysis on Low-Carbon Strategy for Supply Chain Enterprises. J. Clean. Prod. 2019, 230, 981–994. [Google Scholar] [CrossRef]
  74. Yadav, S.; Singh, S.P. Blockchain Critical Success Factors for Sustainable Supply Chain. Resour. Conserv. Recycl. 2020, 152, 104505. [Google Scholar] [CrossRef]
  75. Jie, S.; Zhang, P.; Alkubati, M.; Yubin, B.; Ge, Y. Research Advances on Blockchain-as-a-Service: Architectures, Applications and Challenges. Digit. Commun. Netw. 2021, 8, 466–475. [Google Scholar]
  76. Mohril, R.S.; Solanki, B.S.; Lad, B.K.; Kulkarni, M.S. Blockchain Enabled Maintenance Management Framework for Military Equipment. IEEE Trans. Eng. Manag. 2021, 69, 3938–3951. [Google Scholar] [CrossRef]
  77. Zhu, S.; Cai, Z.; Hu, H.; Li, Y.; Li, W. ZkCrowd: A Hybrid Blockchain-Based Crowdsourcing Platform. IEEE Trans. Ind. Inform. 2019, 16, 4196–4205. [Google Scholar] [CrossRef]
  78. Holden, R.; Malani, A. Can Blockchain Solve the Hold-up Problem in Contracts? Cambridge University Press: Cambridge, UK, 2021; ISBN 1-00-900479-4. [Google Scholar]
  79. Natanelov, V.; Cao, S.; Foth, M.; Dulleck, U. Blockchain Smart Contracts for Supply Chain Finance: Mapping the Innovation Potential in Australia-China Beef Supply Chains. J. Ind. Inf. Integr. 2022, 30, 100389. [Google Scholar] [CrossRef]
  80. Oh, J.; Choi, Y.; In, J. A Conceptual Framework for Designing Blockchain Technology Enabled Supply Chains. Int. J. Logist. Res. Appl. 2022, 1–19. [Google Scholar] [CrossRef]
Figure 1. The architecture of CBLP with an on- and off-chain information storage mechanism.
Figure 1. The architecture of CBLP with an on- and off-chain information storage mechanism.
Jtaer 18 00012 g001
Figure 2. Transaction flow in Hyperledger Fabric with Raft consensus algorithm.
Figure 2. Transaction flow in Hyperledger Fabric with Raft consensus algorithm.
Jtaer 18 00012 g002
Figure 3. (a) The dynamic trend of the SME’s strategy in the case of y > y ; (b) The dynamic trend of the SME’s strategy in the case of y < y .
Figure 3. (a) The dynamic trend of the SME’s strategy in the case of y > y ; (b) The dynamic trend of the SME’s strategy in the case of y < y .
Jtaer 18 00012 g003
Figure 4. (a) The dynamic trend of the LF’s strategy in the case of x > x ; (b) The dynamic trend of the LF’s strategy in the case of x < x .
Figure 4. (a) The dynamic trend of the LF’s strategy in the case of x > x ; (b) The dynamic trend of the LF’s strategy in the case of x < x .
Jtaer 18 00012 g004
Figure 5. Dynamics evolution schematic diagram of the SME and the LF.
Figure 5. Dynamics evolution schematic diagram of the SME and the LF.
Jtaer 18 00012 g005
Figure 6. System dynamics model for the consortium blockchain-based leasing strategies.
Figure 6. System dynamics model for the consortium blockchain-based leasing strategies.
Jtaer 18 00012 g006
Figure 7. (a) The dynamic diagram to strategy (0,0); (b) the dynamic diagram to strategy (1,1); (c) the dynamic diagram to strategy of x = 0 ,   y = { 0.1 , 0.3 , 0.5 , 0.7 , 0.9 } . * Considering that d x / d t and d y / d t have to be explanatory, when performing the simulation, we take the initial state (x = 0.0001, y = 0.0001), which is close to 0. Similarly, the initial state (x = 0.9999, y = 0.9999) is set as 1.
Figure 7. (a) The dynamic diagram to strategy (0,0); (b) the dynamic diagram to strategy (1,1); (c) the dynamic diagram to strategy of x = 0 ,   y = { 0.1 , 0.3 , 0.5 , 0.7 , 0.9 } . * Considering that d x / d t and d y / d t have to be explanatory, when performing the simulation, we take the initial state (x = 0.0001, y = 0.0001), which is close to 0. Similarly, the initial state (x = 0.9999, y = 0.9999) is set as 1.
Jtaer 18 00012 g007
Figure 8. The dynamic diagram of SMEs and LFs.
Figure 8. The dynamic diagram of SMEs and LFs.
Jtaer 18 00012 g008
Figure 9. System evolution of 𝓏 i and u j : (a) system evolution of 𝓏 i = { 1 ,   3 ,   5 ,   7 ,   9 } ; (b) system evolution of u j = { 0.1 ,   0.3 ,   0.5 ,   0.7 ,   0.9 } .
Figure 9. System evolution of 𝓏 i and u j : (a) system evolution of 𝓏 i = { 1 ,   3 ,   5 ,   7 ,   9 } ; (b) system evolution of u j = { 0.1 ,   0.3 ,   0.5 ,   0.7 ,   0.9 } .
Jtaer 18 00012 g009aJtaer 18 00012 g009b
Figure 10. System evolution of Δ v c = { 1 ,   3 ,   5 ,   7 ,   9 } .
Figure 10. System evolution of Δ v c = { 1 ,   3 ,   5 ,   7 ,   9 } .
Jtaer 18 00012 g010
Figure 11. (a) System evolution of I = { 1.2 ,   2.4 ,   4.8 ,   7.2 ,   9.6 } ; (b) system evolution of p 2 = { 2 ,   4 ,   6 ,   8 ,   10 } .
Figure 11. (a) System evolution of I = { 1.2 ,   2.4 ,   4.8 ,   7.2 ,   9.6 } ; (b) system evolution of p 2 = { 2 ,   4 ,   6 ,   8 ,   10 } .
Jtaer 18 00012 g011
Figure 12. System evolution of ω = { 0.2 ,   0.4 ,   0.6 ,   0.8 ,   1 } .
Figure 12. System evolution of ω = { 0.2 ,   0.4 ,   0.6 ,   0.8 ,   1 } .
Jtaer 18 00012 g012
Table 1. Parameters. Explanation under the conventional/blockchain-based lease mode.
Table 1. Parameters. Explanation under the conventional/blockchain-based lease mode.
ModePartyNotationDefinition
Under the conventional lease modeSME (Org-lessee node A) R Total rental payments to the LF under the terms of the lease
r 1 Return rate of the SME on the lease
r 3 Reinvestment rate of the SME after the contract’s default
f Maintenance fee for the leased asset during the lease period
p 1 Default penalty of the SME under the conventional lease
σ Incentives of the SME given by the LFs due to LC compliance
LF (Org-lessor node B) r 2 Return rate of the LF on the lease
C t Marginal credit investigation costs of the LF
C 0 Original acquisition cost of the leased asset
C 1 Monitoring cost of asset’s operation under the conventional lease
v s Residual value of the leased asset at the end of the lease
ε Loss rate of the LF caused by the contract default
Under the blockchain-based lease modeSME (Org-lessee node A) C b Membership cost of the SME joining the consortium blockchain
Δ ν c Increased credit value of the SME due to LC compliance on-chain
IFixed reward when mining a block on-chain
p 2 Default penalties of the SME on-chain
𝓏 A Quantity of information shared by the SME on-chain
u A Relative computing power provided by the SME on-chain
LF (Org-lessor node B) g Synergy gain on the lease business empowered by the blockchain
C 2 Monitoring cost of asset’s operation under the blockchain-based lease
𝓏 B Quantity of information shared by the LF on-chain
u B Relative computing power provided by the LF on-chain
SME and LF φ Coefficient of information transmission efficiency on-chain
ω Validation cost coefficient of confirming transaction on-chain
λ Storage cost coefficient of information stored off-chain CSP/IPFS
η Security risk coefficient of sharing information on-chain
Table 2. Evolutionary game payoff matrix of the SME and LF.
Table 2. Evolutionary game payoff matrix of the SME and LF.
StrategyLF
(Org-Lessor Node B)
AccessNot-Access
SME (Org-lessee node A)Comply I + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] + R ( r 1 1 ) + σ + Δ v c f C b R ( r 1 1 ) + σ f
R ( r 2 + 1 ) + v s + [ ( φ ω λ η ) 𝓏 A + u B 𝓏 A ] + g C 0 C 2 C b R ( r 2 + 1 ) + v s C 0 C t C 1
Default R r 3 + v s + [ ( φ ω λ η ) 𝓏 A + u A 𝓏 B ] f p 2 C b R r 3 + v s f p 1
[ ( φ ω λ η ) 𝓏 B + u B 𝓏 A ] R ε C 0 C 2 C b R ε C 0 C t C 1
Table 3. The analysis table for judging the stability of equilibrium points.
Table 3. The analysis table for judging the stability of equilibrium points.
Equilibrium Point t r J d e t J
E 1 ( 0 , 0 ) [ ( r 1 r 3 1 )   R + σ + p 1 v s ] + [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ] [ ( r 1 r 3 1 )   R + σ + p 1 v s ] [ ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ]
E 2 ( 0 , 1 ) [ ( r 1 r 3 1 )   R + ( I + Δ v c + p 2 + σ v s ) ] + [ C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 ] [ ( r 1 r 3 1 )   R + ( I + Δ v c + p 2 + σ v s ) ] [ C b + C 2 ( φ ω λ η ) 𝓏 B u B 𝓏 A C t C 1 ]
E 3 ( 1 , 0 ) [ ( 1 + r 3 r 1 ) R + ( v s σ p 1 ) ] + [ g + ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ] [ ( 1 + r 3 r 1 ) R + ( v s σ p 1 ) ] [ g + ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ]
E 4 ( 1 , 1 ) [ ( I + Δ v c + p 2 + σ v s + ( r 1 r 3 1 ) R ) ] + [ ( g + ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ) ] [ ( I + Δ v c + p 2 + σ v s + ( r 1 r 3 1 ) R ) ] [ ( g + ( φ ω λ η ) 𝓏 B + u B 𝓏 A + C t + C 1 C 2 C b ) ]
E 5 ( x , y ) 0 H 1
1 H = x ( 1 x ) ( I + v c + p 2 p 1 ) y ( 1 y )
Table 4. The analysis of the evolutionary stability of the system equilibrium point.
Table 4. The analysis of the evolutionary stability of the system equilibrium point.
Equilibrium   Point   E i S y m b o l   o f   t r J S y m b o l   o f   d e t J Judgment
E 1 ( 0 , 0 ) <0>0ESS
E 2 ( 0 , 1 ) >0>0Unstable point
E 3 ( 1 , 0 ) >0>0Unstable point
E 4 ( 1 , 1 ) <0>0ESS
E 5 ( x , y ) 0+/-Saddle point
Table 5. Initial value of simulation parameters.
Table 5. Initial value of simulation parameters.
R r 1 r 2 r 3 f v s p 1 p 2 C b C t C 1 C 2 Δ v c
80.20.250.30.050.83640.080.60.41
I 𝓏 A 𝓏 B u A u B ε σ g φ ω λ η /
1.2530.50.50.1551.50.60.20.20.2/
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cheng, H.; Li, J.; Lu, J.; Lo, S.-L.; Xiang, Z. Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game. J. Theor. Appl. Electron. Commer. Res. 2023, 18, 206-236. https://doi.org/10.3390/jtaer18010012

AMA Style

Cheng H, Li J, Lu J, Lo S-L, Xiang Z. Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game. Journal of Theoretical and Applied Electronic Commerce Research. 2023; 18(1):206-236. https://doi.org/10.3390/jtaer18010012

Chicago/Turabian Style

Cheng, Hanlei, Jian Li, Jing Lu, Sio-Long Lo, and Zhiyu Xiang. 2023. "Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game" Journal of Theoretical and Applied Electronic Commerce Research 18, no. 1: 206-236. https://doi.org/10.3390/jtaer18010012

Article Metrics

Back to TopTop