Next Article in Journal
Improving Soil Properties by Sand Application in the Saline-Alkali Area of the Middle and Lower Reaches of the Yellow River, China
Previous Article in Journal
Ecodesign for Industrial Furnaces and Ovens: A Review of the Current Environmental Legislation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Impact of Blockchain on Enterprises Sharing Real Data Based on Dynamic Evolutionary Game Analysis

School of Finance and Information, Ningbo University of Finance and Economics, Ningbo 315000, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work and should be considered co-first authors.
Sustainability 2023, 15(12), 9439; https://doi.org/10.3390/su15129439
Submission received: 30 January 2023 / Revised: 4 June 2023 / Accepted: 8 June 2023 / Published: 12 June 2023

Abstract

:
The use of blockchain technology can ensure that data remains untampered with once it is on the chain. However, it doesn’t guarantee the authenticity of data before it enters the chain. In this study, we developed a three-party dynamic evolutionary game model involving core enterprises, small and medium-sized enterprises (SMEs), and financial institutions. Our findings indicate that a blockchain supply chain (BSC) generates more economic benefits than a traditional supply chain (TSC). We then built a dynamic evolutionary game model between core enterprises and SMEs, which revealed that SMEs are influenced by core enterprises and tend to adopt the action strategies of the latter. Additionally, we developed a dynamic evolutionary game model between core enterprises and financial institutions and compared the reward and punishment mechanisms with the synergy payoff mechanism. In the reward and punishment mechanisms, the game is a zero-sum game, where one party’s gains come at the expense of the other party. This mechanism has certain limitations and must meet specific conditions to improve the willingness of enterprises to share data. On the other hand, the synergy payoff mechanism enhances the authenticity of shared data by increasing the payoff for participants. When core enterprises play games with SMEs, the probability of core enterprises uploading real data and the distribution ratio of synergy payoff show an inverted U-shape. Similarly, core enterprises and financial institutions have comparable results in allocating synergy payoff. To leverage the synergy payoff mechanism, the distribution proportion of players participating in the synergy payoff should be considered fair. Finally, we validated our findings by simulating the models. If we can use blockchain technology to enhance the mutual trust between enterprises and banks, both banks and enterprises can achieve sustainable development.

1. Introduction

Within the supply chain, two types of enterprises exist: core enterprises and small and medium-sized enterprises (SMEs). Core enterprises possess high industry status, significant market influence, robust economic strength, and integrity. Consequently, financial institutions, such as banks, identify them as high-quality customers. In contrast, SMEs refer to independent enterprises with fewer than 50 employees, although the definition varies across countries and regions. For most enterprises, the upper limit is around 250 people, while in the United States, SMEs consist of no more than 500 employees. Typically, SMEs have low industry status, weak economic strength, and limited financial transparency, making them high-risk customers for financial institutions such as banks. In the supply chain, SMEs often rely on core enterprises to conduct business and have limited independence [1,2].
The traditional Internet suffers from several shortcomings when it comes to data sharing. Firstly, the dispersion of data across various organizations, coupled with the absence of standardized data formats and protocols, poses challenges for the circulation and sharing of data. Secondly, variations in data sources, collection methods, and processing stages result in differing data quality among organizations, making it arduous to share data effectively. This issue becomes particularly problematic when attempting to share data between different sources. Thirdly, the sensitive and valuable nature of data necessitates consideration of privacy and security concerns during the sharing process. Any data leak or misuse can lead to severe losses for both organizations and individuals. Lastly, a lack of mutual trust between organizations acts as a deterrent to data sharing. Many organizations are reluctant to share their data with others due to concerns that it may undermine their competitive advantage [3].
To address these challenges and ensure the security and reliability of data, blockchain technology can be employed in the following ways: Firstly, decentralized storage allows for the distribution of data across multiple nodes instead of relying on a central authority, ensuring both decentralization and data security. Secondly, a distributed ledger created using blockchain technology enables multiple participants to record transactions involving shared data. This approach guarantees data transparency and authenticity and prevents tampering and data leakage. Thirdly, smart contracts can be utilized to establish rules and conditions that grant access and usage rights exclusively to authorized users. By automating contract execution and minimizing manual intervention, smart contracts mitigate risks and reduce operational costs. Lastly, encryption algorithms can be employed to encrypt data, ensuring privacy and data security. Access to and decryption of data are restricted to users with appropriate permissions. In summary, blockchain technology offers a more secure, decentralized, and reliable means of sharing data. However, it is important to note that data-sharing solutions leveraging blockchain technology must strike a balance between multiple factors such as cost, efficiency, scalability, and more [4].
Blockchain technology can ensure the quality of shared data, but if the data shared by enterprises itself is false, it is difficult for blockchain technology to effectively play a role. There is little literature on the authenticity of shared data. Blockchain technology has transformed transaction methods and improved financing efficiency [5]. By sharing data in the supply chain, costs can be reduced and the transaction scale can be expanded [6,7]. If the shared data is authentic, blockchain technology can foster trust between enterprises and build a good business environment. However, enterprises do not necessarily upload real data since blockchain technology is not mature. Hack attacks on the blockchain platform may also result in user data leakage, leading to huge losses for enterprises. Therefore, enterprises tend to forge data to hide their real behavior. Thus, improving the quality of uploaded data is vital in practice. In the transaction process, if the information of the enterprise is completely mastered by the other party, the enterprise will be at a disadvantage.
If we can use blockchain technology to enhance the mutual trust between enterprises and banks, both banks and enterprises can achieve sustainable development. Core enterprises, SMEs, and banks share data with each other, reducing financing costs. The enterprise has obtained sufficient funds to expand its scale of reproduction. Banks have also improved their efficiency by providing high-quality services. Therefore, our research on the impact of blockchain technology on data sharing is of great significance for the sustainable development of the financial industry.
We have focused on the above issues and provided a new research perspective for studying data sharing. We build a dynamic evolutionary game model for core enterprises, SMEs, and financial institutions. We analyze the factors that affect enterprises uploading of real data. From the perspective of theoretical modeling and numerical simulation, we have analyzed the impact of the reward and punishment mechanisms and synergy benefits on the authenticity of the enterprise’s online data. The results show that SMEs are greatly influenced by core enterprises and often choose to follow the action strategies of the core enterprises. Financial institutions reward enterprises for uploading real data and punish them for uploading false data. However, the effectiveness of the reward and punishment mechanisms depends on certain conditions that need to be met to incentivize enterprises to upload real data. Improving the synergy payoff and making reasonable distributions can effectively increase the willingness of enterprises to upload real data.
In terms of the advancement of knowledge, our study compared the different impacts of blockchain technology and traditional technology on data sharing. We have found that blockchain technology can reduce the cost of shared data and increase the benefits of shared data, which is beneficial for the promotion of blockchain technology in reality. Our research also points out that the collaborative benefit mechanism is superior to the reward and punishment mechanisms. In order to enhance the willingness of enterprises to share real data, we need to create a better environment to popularize the use of blockchain technology. When collaborative benefits increase, both supply chain enterprises and financial institutions will benefit, and the willingness of enterprises to share real data will increase. Our research has also gained some beneficial insights in the field of allocation. Our research indicates that the distribution ratio of collaborative benefits and willingness to cooperate satisfy the inverted U-shaped form. Our research can calculate the critical point of the distribution ratio, which is conducive to the rational distribution of benefits in reality.
The innovation of this paper is as follows: First, few studies in the literature have studied the authenticity of data shared by enterprises in the context of blockchain. Our research conclusions expand the theoretical scope of the authenticity of shared data. Second, the influence of core enterprises on SMEs is generally ignored in the existing literature’s modeling process. We characterize the impact of core enterprises on SMEs as the effect of core enterprises on SMEs’ business income, thereby expanding the scope of theoretical research. Third, compared to the previous literature that emphasizes the role of reward and punishment mechanisms, we point out that improving synergy payoff is more effective in promoting enterprises to upload real data. At the same time, we have studied the impact of the distribution proportion of synergy payoff on the equilibrium results, which has significant practical implications. Fourth, we discussed the impact of changes in the distribution ratio on the equilibrium results, highlighting the importance of fairness.
This paper is organized as follows: In Section 2, we reviewed the application of blockchain in data sharing and the research methods of dynamic evolutionary games. In Section 3, we build four dynamic evolutionary game models. We first prove that financial institutions, core enterprises, and SMEs prefer to use blockchain supply chain (BSC) compared with traditional supply chain (TSC). We build a game between core enterprises and SMEs. Theoretical results show that SMEs follow the action strategy of following the core enterprises. Then we build a game between core enterprises and financial institutions to analyze the impact of the two mechanisms on the sharing of real data. In Section 4, we use a numerical simulation to verify the conclusions of Section 3. In Section 5, we conducted a sensitivity analysis for the numerical simulation. In Section 6, we have prepared a corresponding summary and discussion. In Section 7, We have summarized the entire text and pointed out the theoretical significance and practical application of the paper.

2. Theoretical Background

2.1. Advantages and Disadvantages of Data Sharing

In the supply chain, data sharing promotes overall efficiency by enabling organic integration of information resources [8,9]. For example, in healthcare, sharing patient data among healthcare providers can lead to better coordination of care, reduced medical errors, and improved treatment outcomes. Extensive information integration and data sharing positively affect supply chain performance, such as increased cooperation and reduced inventory [10,11]. Sharing data helps address information asymmetry by providing more comprehensive and accurate information to all stakeholders. This can promote fairness, transparency, and trust in various domains, such as supply chain management and financial transactions. Data sharing facilitates collaboration and knowledge exchange among individuals, organizations, and sectors. It allows for a broader understanding of trends, patterns, and insights derived from shared data, leading to improved decision-making and innovation. Data sharing can lead to societal benefits by enabling the development of innovative solutions such as smart cities, personalized services, and data-driven policymaking. It can also help address societal challenges such as public health crises or environmental issues.
However, data sharing also has some disadvantages that should be considered. Sharing data can raise concerns about privacy and security. Sensitive or personally identifiable information, if mishandled or accessed by unauthorized parties, can lead to privacy breaches or identity theft. Safeguarding data and ensuring appropriate data protection measures are crucial when sharing information [12]. Shared data may vary in quality, accuracy, and reliability. Inadequate data governance practices, data entry errors, or incomplete datasets can compromise the value and usefulness of shared information. Ensuring data quality and maintaining data standards are essential to mitigate these issues [13]. Sharing proprietary or confidential data may raise concerns about intellectual property rights. Organizations may be hesitant to share valuable data assets for fear of losing a competitive advantage or unauthorized use by others. Balancing the benefits of data sharing with intellectual property protection is a complex challenge [14]. Data sharing often involves compliance with various legal and regulatory frameworks, such as data protection regulations (e.g., GDPR) and industry-specific requirements. Ensuring compliance with these regulations can be complex and resource-intensive, adding complexity to data sharing initiatives. Establishing trust and fostering collaboration among data sharing partners can be challenging. Concerns about data misuse, competition, or differing incentives may hinder the willingness to share data. Building trust, establishing clear data sharing agreements, and addressing governance issues are critical for successful data sharing collaborations [15].
Although data sharing can generate numerous benefits, there are large differences in the income distribution between members of the supply chain [16]. According to rational assumptions, they tend to share information only on the premise of ensuring enterprises’ interests. Otherwise, the enthusiasm of enterprises to implement information sharing will weaken, which in turn will lead to a reduction in supply chain revenue [17,18,19,20]. Data ownership, data risk, the cost of sharing, and other issues still restrict further improvement of data sharing [21,22,23]. The sharing of data in different solutions within the supply chain requires additional costs [24]. This is where blockchain technology can help increase data flow between different solutions. Blockchain technology can authorize and quickly access distributed data to avoid a single point of failure and enable real-time data supervision [25]. Therefore, blockchain technology is helpful for data sharing. However, the question of how to improve the quality of data sharing by enterprises in the supply chain remains unanswered.

2.2. How Blockchain Technology Affects Data Sharing

Blockchain technology has several significant effects on data sharing. Blockchain is a decentralized, distributed ledger where data is maintained and verified by multiple participants. This decentralized nature enables more democratic and open data sharing, allowing participants to share data directly with each other without relying on intermediaries or third-party platforms. This eliminates trust issues in traditional data sharing and provides greater transparency and verifiability in data sharing [26]. Blockchain technology also enables the management of data access and usage permissions through smart contracts. Participants can define data ownership and control within smart contracts, specifying access conditions and usage rules. This grants data owners greater control, enhances privacy protection, and safeguards business secrets [27].
Blockchain employs cryptography and consensus algorithms to ensure data security and integrity. Once data is recorded on the blockchain, it is nearly impossible to tamper with or delete. This immutability enhances the credibility of data sharing, particularly in scenarios where data authenticity and tamper resistance are critical, such as supply chain management and intellectual property protection [28]. Traditional data sharing often involves complex intermediary processes, including data transformation, verification, and authorization. Blockchain technology can simplify these processes by enabling peer-to-peer direct data exchange. Participants can automatically execute data exchange and verification logic through smart contracts, reducing manual intervention and processing time, thus enhancing the efficiency of data sharing [29]. Blockchains can incentivize data sharing through token-based economic models. Participants can earn tokens as rewards for sharing their data, which can be used to access other participants’ data or other services. This incentive mechanism encourages data owners to actively engage in data sharing and promotes the development of data ecosystems [30].
It is important to note that while blockchain technology offers potential advantages for data sharing, there are also challenges and limitations. For instance, scalability and performance issues in blockchain still need to be addressed, especially when dealing with large-scale data and high-concurrency transactions. Additionally, data privacy and compliance concerns require attention and resolution. Therefore, the practical application of blockchain in data sharing requires careful consideration of the specific use case and the associated technical and regulatory considerations.

2.3. Dynamic Evolutionary Game Applied to Data Sharing

Data sharing has become increasingly important in various domains, such as healthcare, finance, supply chain management, and social networks [31]. The decision to share data is a complex process influenced by multiple factors, including incentives, trust, and the evolving value of data. Traditional static game theory, which assumes rational actors, may not capture the complexity and dynamics of real-world data sharing scenarios. To address this limitation, researchers have turned to dynamic evolutionary game theory, which provides a more accurate representation of decision-making processes in the context of data sharing [32].
Dynamic evolutionary game theory introduces concepts from biology, such as adaptation and evolution, to study strategic interactions among individuals or organizations over time [33]. Unlike the static game theory assumption of perfect rationality, dynamic evolutionary games account for bounded rationality, recognizing that decision-makers have limited information and cognitive capacities. This framework allows for the study of how individuals or organizations adapt and learn from their own experiences and the behavior of others in a constantly changing environment.
By employing dynamic evolutionary game models, researchers can analyze the strategic decision-making processes in data sharing scenarios [34,35]. These models capture the dynamic nature of data sharing, where participants continually adjust their strategies based on the outcomes of previous interactions. Through this adaptation, the models provide a more realistic depiction of the evolving landscape of data sharing.
Moreover, dynamic evolutionary game theory enables the exploration of trust decision problems in data sharing [36,37]. Trust plays a crucial role in data sharing, as participants must weigh the benefits of sharing data against potential risks and uncertainties. The inclusion of reputation systems, reward-punishment mechanisms, and adaptive strategies in dynamic evolutionary game models allows for a deeper understanding of how trust can be established and maintained in data-sharing networks.
Furthermore, the impact of emerging technologies such as blockchain on data sharing can also be studied using dynamic evolutionary game theory [38]. Blockchain technology provides opportunities to enhance trust, security, and incentivization in data sharing. Dynamic evolutionary game models can shed light on the effects of blockchain technology on data sharing behaviors, exploring how it mitigates default risks, enhances trust, and promotes cooperative behaviors among participants. With the dynamic evolutionary game, the change in the quantity and value of data affects enterprises’ decisions to share data. Then, a reward-punishment mechanism is introduced to solve the trust decision problem [39,40]. Using the dynamic evolutionary game model, scholars found that blockchain technology can mitigate the default risk of supply chain finance [41,42,43].

3. Model

Compared with TSC, blockchain technology uses encryption algorithms to ensure the security of data transmission, and the characteristics of smart contracts expand the transaction scale. This part will first use the three-party evolutionary game model to prove that financial institutions, core enterprises, and SMEs prefer to use the BSC. The use of blockchain technology has enabled enterprises and financial institutions to expand their scale and achieve sustainable development. In the context of BSC, we then explore the factors that influence data sharing between the three parties. In the supply chain, core enterprises often occupy the leading position because of their large scale and sufficient funds. Financial institutions, such as banks, tend to cooperate with core enterprises. On the other hand, SMEs are difficult to obtain bank loans for and therefore rely on core enterprises for transactions. On the basis of this observation, we construct a dynamic evolutionary game model between core enterprises and SMEs. On this basis, we study the game theory between core enterprises and financial institutions. Under specific conditions, core enterprises and financial institutions benefit from cooperation and achieve sustainable development.

3.1. BSC vs. TSC in a Three-Party Dynamic Evolutionary Game Model

(1) Model Hypotheses
Hypothesis 1:
The players in this model are core enterprises H , the SMEs J , and financial institution E . The three parties are participants in bounded rationality, and strategy selection gradually evolves and stabilizes to the optimal strategy over time.
Hypothesis 2:
The strategy space for the core enterprises and SMEs is L = l 1 , l 2 = {upload real data, upload false data}. The probability that the core enterprise chooses action l 1 is x , and the probability of choosing action l 2 is 1 x . Similarly, y and 1 y are probabilities that SMEs choose action l 1 and l 2 , respectively. The strategy space for the financial institution is N = { n 1 , n 2 } = {BSC, TSC}. The probability that the financial institution chooses action n 1 is v , and the probability of choosing action n 2 is 1 v .
Hypothesis 3:
In the TSC, the payoffs of core enterprises, SMEs, and financial institutions are R 01 , R 02 , a n d   R 03 , respectively. In the BSC, the payoffs of core enterprises, SMEs, and financial institutions are R 1 , R 2 , a n d   R 3 , respectively. Compared to TSC, BSC has expanded the transaction scale and improved the payoff of all three parties, so R 01 < R 1 , R 02 < R 2 , R 03 < R 3 .
Hypothesis 4:
The number of data shared by core enterprises and SMEs is D 1 , D 2 , respectively. Data may be lost during transmission, resulting in poor quality shared data. In the TSC, after transmission is complete, the data shared by the core enterprises and SMEs are ρ D 1   a n d   ρ D 2 . Where, ρ represents the accuracy of data in the TSC. Blockchain technology improves the accuracy and security of data transmission. Therefore, we assume that after data transmission in the BSC, the data shared by core enterprises and SMEs are still D 1   a n d   D 2 .
Hypothesis 5:
If both core enterprises and SMEs upload real data, an additional synergy payoff will be generated. The value of the synergy payoff is P and P 0 in BSC and TSC, respectively. The synergy payoff is proportional to the sum of the uploaded data. Therefore, it is reasonable to suppose P = a D 1 + D 2 , P 0 = a ρ D 1 + ρ D 2 , a > 0 , and a is the coefficient of the synergy payoff. Core enterprises and SMEs share the synergy payoff. The proportion of core enterprises is λ , the proportion of SMEs is 1 λ , where 0 < λ < 1 . Because core enterprises and SMEs share real data, the transaction scale expands, and financial institutions obtain additional payoff T , T 0 in the BSC and TSC, respectively. In BSC, the supply chain expands the transaction scale and financial institutions gain more profits. Therefore, we assume that T > T 0 .
Hypothesis 6:
Uploading real data will bring risks, and the transaction’s counterparty will take the opportunity to lower the price after obtaining the real data. Thus, in the BSC, the risk cost for core enterprises and SMEs uploading real data is supposed as C 1 , C 2 , respectively. The cost of core enterprises is higher than that of SMEs, so C 1 > C 2 . Similarly, in the TSC, the risk cost for core enterprises and SMEs uploading real data is supposed as C 01 , C 02 , respectively, where C 01 > C 02 . Blockchain technology improves the security of data transmission and sharing. Therefore, we assume C 01 > C 1 , C 02 > C 2 .
Based on the above assumptions, the related symbols are further described in Table 1.
(2) Model Construction
From the above analysis, we can obtain the payoff matrix of the dynamic game between the core enterprises, the SMEs, and the financial institution, as shown in Table 2.
(3) Model analysis.
In this section, we analyze whether financial institutions choose BSC or TSC, so we calculate and compare the payoff of core enterprises, SMEs, and financial institutions in BSC or TSC, respectively.
We assume that the average payoffs of core enterprises in BSC and TSC are K 11 and K 12 , respectively. After the calculation, we obtain the following formula:
K 11 = x y R 1 + λ P C 1 + x 1 y R 1 C 1 + 1 x y R 1 + 1 x 1 y R 1
K 12 = x y R 01 + λ P 0 C 01 + x 1 y R 01 C 01 + 1 x y R 01 + 1 x 1 y R 01
The average payoffs of SMEs in BSC and TSC are K 21 and K 22 , respectively. After the calculation, we obtain the following formula.
K 21 = x y R 2 + ( 1 λ ) P C 2 + x 1 y R 2 + 1 x y ( R 2 C 2 ) + ( 1 x ) ( 1 y ) R 2
K 22 = x y [ R 02 + ( 1 λ ) P 0 C 02 ] + x 1 y R 02 + 1 x y ( R 02 C 02 ) + 1 x 1 y R 02
The average payoffs of financial institutions in BSC and TSC are K 31 and K 32 , respectively. After the calculation, we obtain the following formula.
K 31 = x y R 3 + T + x 1 y R 3 + 1 x y R 3 + 1 x 1 y R 3
K 32 = x y R 03 + T 0 + x 1 y R 03 + 1 x y R 03 + 1 x 1 y R 03
From (1) to (6), we obtain K 11 > K 12 , K 21 > K 22 , K 31 > K 32 . Therefore, financial institutions, core enterprises, and SMEs tend to choose BSC. In the subsequent analysis, we calculate and analyze in the context of blockchain by default.

3.2. Dynamic Game between Core Enterprises and SMEs in BSC

(1) Model Hypotheses
Hypothesis 1:
The players in this model are core enterprises H and the SMEs J , both of which are limited rational agents. The strategy space for the core enterprises and SMEs is L = { l 1 , l 2 } = {upload real data, upload false data}. The probability that the core enterprise chooses action l 1 is x , and the probability of choosing action l 2 is 1 x . Similarly, y and 1 y are probabilities that SMEs choose action l 1 and l 2 , respectively.
Hypothesis 2:
In BSC, the core enterprises and SMEs obtain payoff R 1 , R 2 respectively. The number of data shared by core enterprises and SMEs is D 1 , D 2 , respectively. If the two agents upload real data, an additional synergy payoff P is obtained. The synergy payoff is proportional to the sum of the uploaded data. Therefore, it is reasonable to suppose P = a D 1 + D 2 , a > 0 , and a is the coefficient of the synergy payoff. The core enterprises and the SMEs share the synergy payoff. The proportion of core enterprises is λ , the proportion of SMEs is 1 λ , where 0 < λ < 1 . Therefore, the synergy payoff obtained by core enterprises and SMEs are 1 λ P and λ P respectively.
Hypothesis 3:
Uploading real data will bring risks, and the transaction’s counterparty will take the opportunity to lower the price after obtaining the real data. Thus, the risk cost for the core enterprises and SMEs uploading real data is supposed as C 1 , C 2 respectively. The cost of core enterprises is higher than that of SMEs, so C 1 > C 2 . The total risk cost is proportional to the data on the chain, so C 1 = b 1 D 1 , C 2 = b 2 D 2 , b 1 > 0 , b 2 > 0 , where b 1 , b 2 is the risk coefficient for uploading data.
Hypothesis 4:
Core enterprises have a strong influence on SMEs. If an SME uploads false data, the core company will penalize the SME when it is discovered. For example, core enterprises may reduce or even cancel the contracts. The impact of SMEs uploading false data to core enterprises is negligible, but the penalties imposed on SMEs by core enterprises result in SMEs suffering huge losses. Assuming that the core enterprises penalize the SMEs after the SMEs upload false data, the SME’s loss is M , where M > 0 . Meanwhile, we assume that C 2 > M , since SMEs will lose core business (Table 3).
(2) Model Construction
From the above analysis, we can obtain the payoff matrix of the dynamic game between the core enterprises and the SMEs, as shown in Table 4.
(3) The replication dynamic equation
In the evolutionary game process, the core enterprises and SMEs continue to transfer stability strategies to the subsequent game process through learning and imitation. When x and y are equal to a certain value, both sides have a stable state. When the values of x and y change, the game strategy of both sides also changes.
According to Table 4, the expected payoff of the core enterprises H when adopting the strategies of “uploading real data” and “uploading false data” is V 11 , V 12 , respectively. The average payoff is V 1 . The following information can be obtained as follows:
V 11 = y R 1 + λ P C 1 + 1 y R 1 C 1 = λ P y + R 1 C 1
V 12 = y R 1 + 1 y R 1 = R 1 ,
V 1 = x V 11 + 1 x V 12 = λ P y C 1 x + R 1 .
The replication dynamic equation is a dynamic differential equation formed by simulating the replication dynamic mechanism process of the biological evolutionary game, which is used to describe the frequency of dominant strategies taken by game players. If V 11 > V 1 , core enterprises choose the action strategy of uploading real data, which can bring a higher payoff than the average payoff. At this time, the proportion x of core enterprises choosing to upload real data strategy will increase with time. If V 11 < V 1 , core enterprises choose the action strategy of uploading false data, which can bring a higher than average payoff. At this time, the proportion x of core enterprises choosing to upload false data strategy will increase with time. The replication dynamic equation of probability x for core enterprises to adopt the strategy of “uploading real data” is as follows.
F H x = d x d t = x V 11 V 1 = x 1 x λ P y C 1 .
The steady-state value describes the extent to which core enterprises will choose to upload real data through a dynamic evolutionary game. The steady-state values x * = 0 and x * = 1 can be solved from F H x = 0 .
Assume that the expected payoff of SMEs J when adopting the strategy of “uploading real data” and “uploading false data” is respectively V 21 , V 22 . The average payoff is V 2 . After the calculation, we obtain the following formula:
V 21 = x R 2 + ( 1 λ ) P C 2 + 1 x R 2 C 2 = 1 λ P x + R 2 C 2 ,
V 22 = x R 2 M + 1 x R 2 M = R 2 M ,
V 2 = y V 21 + 1 y V 22 = 1 λ P x + M C 2 y + R 2 M .
The replication dynamic equation of probability y for SMEs to adopt the strategy of “uploading real data” is as follows:
F J y = d y d t = y V 21 V 2 = y 1 y 1 λ P x + M C 2 .
The steady-state value describes the extent to which SMEs will choose to upload real data through a dynamic evolutionary game. The steady-state values y * = 0 and y * = 1 can be solved from F J y = 0 .
(4) The trend and stability of the core enterprise action strategy
According to the replication dynamic Equation (10), its derivative can be calculated as follows:
d F H y d y = ( 1 2 x ) ( λ P y C 1 )
When y = C 1 λ P , d F H x d x = 0 , that is, x [ 0 , 1 ] is always stable. At this time, the replication dynamic equation of the core enterprise is shown in Figure 1a. When SMEs choose the action strategy of uploading real data with the probability of C 1 λ P , there is no difference between the payoff of core enterprises choosing to upload real data or false data. That is, x [ 0 , 1 ] is the stable state of core enterprises.
When y > C 1 λ y , x * = 0 and x * = 1 are two possible stable points of x . Because d F H 1 d x < 0 , x * = 1 is an evolutionary stability strategy. The replication dynamics of the core enterprises are shown in Figure 1b. When the SMEs choose the action strategy of uploading real data with a probability higher than C 1 λ P , core enterprises will gradually change from uploading false data to uploading real data. At this time, uploading real data is the core enterprise’s evolutionary stability strategy.
When y < C 1 λ y , x * = 0 and x * = 1 are two possible stable points of x . Because d F H 0 d x < 0 , x * = 0 is an evolutionary stability strategy. The replication dynamics of the core enterprises are shown in Figure 1c. When the SMEs choose the action strategy of uploading real data with a probability lower than C 1 λ P , core enterprises will gradually change from uploading real data to uploading false data. At this time, uploading false data is the core enterprise’s evolutionary stability strategy.
(5) The trend and the stability of the SMEs action strategies
According to the replication dynamic Equation (14), its derivative can be calculated as follows:
d F J y d y = 1 2 y 1 λ P x + M C 2 .
When x = C 2 M ( 1 λ ) P , d F J y d y = 0 , that is, y [ 0 , 1 ] is always stable. When core enterprises choose the action strategy of uploading real data with the probability of C 2 M ( 1 λ ) P , there is no difference between the payoff of SMEs choosing to upload real data or false data. That is, y [ 0 , 1 ] is the stable state of SMEs.
When x > C 2 M ( 1 λ ) P , y * = 0 and y * = 1 are two possible stable points of y . Because d F J 1 d y < 0 , y * = 1 is an evolutionary stability strategy. When core enterprises choose the action strategy of uploading real data with a probability higher than C 2 M ( 1 λ ) P , SMEs will gradually change from uploading false data to uploading real data. At this time, uploading real data is the evolutionary stability strategy of SMEs.
When x < C 2 M ( 1 λ ) P , y * = 0 and y * = 1 are two possible stable points of y . Because d F J 0 d y < 0 , y * = 0 is an evolutionary stability strategy. When core enterprises choose the action strategy of uploading real data with a probability lower than C 2 M ( 1 λ ) P , SMEs will gradually change from uploading real data to uploading false data. At this time, uploading false data is the evolutionary stability strategy of SMEs.
(6) Equilibrium analysis of dynamic evolution
Core enterprises and SMEs have reached a stable state through continuous evolution. According to Equations (10) and (14), let F E x = 0 and F J y = 0 to obtain the five equilibrium points of the replicated dynamic equation, O 1 0,0 , I 1 0,1 ,   H 1 1,1 , G 1 1,0 , E 1 ( x 1 , y 1 ) , where x 1 = C 2 M / [ ( 1 λ ) P ] , y 1 = C 1 / ( λ P ) .
According to the replication dynamic equation of core enterprises and SMEs, the corresponding Jacobian matrix can be obtained as follows:
J 1 = F H ( x ) / x F H ( x ) / y F J ( y ) / x F J ( y ) / y .
The dynamic game solution space between core enterprises and SMEs is { ( x , y ) | 0 x 1,0 y 1 } , thus x 1 , y 1 ϵ [ 0,1 ] , 0 < C 2 M < ( 1 λ ) P , 0 < C 1 < λ P . According to the stability theorem of the differential equation, when the determinant ( D e t J ) of the Jacobian matrix of a local equilibrium point is greater than zero and the trace of the Jacobian matrix ( T r J ) is less than zero, the local equilibrium point is a stable strategy in an evolutionary game. The steady-state analysis of five local equilibrium points is shown in Table 5.
It can be seen in Table 5 that the two stable equilibrium points of the evolutionary game between core enterprises and SMEs are O 1 0,0 and H 1 1,1 . SMEs and core enterprises stay consistent in their action strategies and choose to upload real data or false data at the same time. I 1 0,1 and G 1 1,0 indicate that the action strategies of the core enterprises and the SMEs are inconsistent and are unstable points. E 1 ( x 1 , y 1 ) is a saddle point. The phase diagram of the dynamic evolution of core enterprises and SMEs is shown in Figure 2.
E 1 ( x 1 , y 1 ) is the key point where the replication dynamic curve tends to O 1 0,0 and H 1 1,1 . If the initial point of the game between core enterprises and SMEs is near E 1 , a slight disturbance will affect the trend of the replication dynamic curve. The point at which the curve ultimately tends to ultimately depends on the area S 1 of polygon O 1 I 1 E 1 G 1 and the area S 2 of polygon I 1 H 1 G 1 E 1 . If S 1 > S 2 , the copied dynamic curve will tend to O 1 ( 0,0 ) . Both core enterprises and SMEs tend to upload the evolution results of false data. If S 1 < S 2 , the replication dynamic curve will tend to H 1 1,1 . Both core enterprises and SMEs tend to upload the evolution results of real data. Analyze the factors that influence the tendency of both parties to upload real data. The key is to analyze the factors that affect S 2 changes. After calculation, the S 2 formula is as follows.
S 2 = 1 1 2 x 1 + y 1 = 1 1 2 λ C 2 M + 1 λ C 1 λ 1 λ P .
Proposition 1.
(i) The higher the synergy payoff between core enterprises and SMEs, the more likely both parties will upload real data. The greater the influence of the core enterprises on the SMEs, the more the parties tend to upload real data. (ii) The higher the risk cost of uploading data by core enterprises and SMEs, the more likely they are to upload false data. (iii) The proportion of real data uploaded by both parties and the distribution of collaboration payoff present an inverted U-shaped result. With the increase in the proportion of collaboration payoff allocated to core enterprises, both parties tend to upload real data. When the proportion of the distribution exceeds a certain threshold, with an increasing proportion of the distribution, both parties tend to upload false data.
(The proof of Proposition 1 is shown in Appendix A.)
It can be found from Proposition 1 that when the synergy payoff increases, the willingness of core enterprises and SMEs to share real data also increases. At the same time, the core enterprises have a strong influence on the SMEs, leading SMEs to adopt the action strategy of following the core enterprises. The risk costs of uploading data affect the authenticity of shared data. Only by taking various measures to reduce risk cost can the authenticity of shared data be effectively improved. The principle of “giving priority to efficiency and giving consideration to fairness” should be followed in the distribution of synergy payoff. Core enterprises play a greater role and should be appropriately inclined toward core enterprises when allocating synergy payoff. The reason is that the core enterprises have larger scale, more data, and greater influence in transactions. However, the principle of fairness should also be followed. When the interests of SMEs are seriously damaged, SMEs will take a non-cooperative attitude. Therefore, the principles of efficiency first and fairness at the same time should be taken into account in the distribution of synergy payoff.

3.3. Dynamic Game between Core Enterprises and Financial Institution under the Reward and Punishment Mechanisms in BSC

According to Proposition 1, SMEs adopt the action strategy of following the core enterprises. Therefore, the game between core enterprises and financial institutions becomes more important. If financial institutions can build a reasonable reward and punishment mechanism to encourage core enterprises to upload real data, SMEs will also upload real data, and the quality of shared data will improve.
(1) Model Hypotheses
Hypothesis 1:
The main players in this part are the core enterprises H and the financial institution E , both of which are limited in their rationality. The strategy space of the core enterprises is L = { l 1 , l 2 } = {upload real data, upload false data}. The probability that the core enterprise chooses action l 1 is x , and the probability of choosing action l 2 is 1 x . The strategy space of the financial institutions is W = { w 1 , w 2 } = {strict supervision, loose supervision}. The probability that the core enterprise chooses action w 1 is z , and the probability of choosing action w 2 is 1 z .
Hypothesis 2:
In BSC, core enterprises and financial institutions can obtain R 1 and R 3 in the initial state. Under the financial blockchain platform, the number of online data for core enterprises is D 1 . When financial institutions choose strict supervision, they can find out whether the data shared by the core enterprises are true. If the data for the core company are true, the financial institutions will reward the core company with the amount of α D 1 . Suppose the online data for the core enterprises is false. In that case, the core enterprises will receive punishment β D 1 . α and β are the reward and punishment coefficients of the core enterprises. Financial institutions will not be able to identify the authenticity of data when they choose loose regulation, so they will not reward and punish enterprises.
Hypothesis 3:
Enterprises upload real data, which is risky. Assume that the risk cost of uploading real data from core enterprises is C 1 , which is proportional to the total amount of data on-line. Therefore, assume that C 1 = b 1 D 1 , b 1 > 0 , and b 1 is the risk coefficient of core enterprises. When financial institutions adopt strict supervision, it will be more costly. Assuming that the cost of strict supervision is C 3 , and the cost of loose supervision is small, it is set to 0 for convenience. In reality, if data leaks, the core enterprises will suffer a heavy loss, which is much greater than the supervision cost of a financial institution, so it is assumed that C 1 > C 3 .
Hypothesis 4:
If financial institutions choose strict supervision and ultimately ensure that core enterprises upload real data, their achievements on the blockchain financial platform will be rewarded by the superior institutions with the amount of γ D 1 , where γ is the reward coefficient given to the financial institution (Table 6).
(2) Model Construction
From the above analysis, we can obtain the dynamic game payoff matrix between the core enterprises and financial institutions, as shown in Table 7:
(3) Model analysis
Similar to the research method in Section 3.2, the following conclusions can be drawn (see Appendix A for a detailed derivation).
Proposition 2.
(i) The more rewards the superior institution gives to financial institutions, the more financial institutions tend to be strictly supervised, and the core enterprises will choose to upload real data. (ii) The higher the risk cost of uploading data by the core enterprises, the more likely the core enterprises are to upload false data, and the financial institution chooses loose supervision. The higher the supervision cost of the financial institution, the more the financial institution tends to choose loose supervision, and the core enterprises will choose to upload false data.
(The proof of Proposition 2 is shown in Appendix A.)
It can be seen from Proposition 2 that the more financial institutions attach importance to the development of the blockchain financial platform, the more support they give to financial institutions, and the more they can promote financial institutions to choose strict supervision so as to improve the quality of the online data of core enterprises. As SMEs follow the action strategy of core enterprises, they also choose to upload real data in the background of the attention of higher authorities, thus improving the data quality of the blockchain financial platform as a whole. The reasonable and effective use of blockchain and other technologies can effectively promote enterprises to upload real data by improving regulatory efficiency, ensuring the security of blockchain financial platform data, and reducing regulatory and risk costs. The formula of the partial derivative ( S / α , S / β ) is too complex to determine the symbol. We analyze it in the simulation part.

3.4. Dynamic Game between Core Enterprises and Financial Institutions under the Synergy Payoff Mechanism in BSC

This part focuses on building new paths and methods to improve the authenticity of enterprise online data. That is, core enterprises upload real data, and financial institutions choose strict supervision to bring synergy payoffs to core enterprises and financial institutions. Strict supervision of financial institutions improves online data quality and reduces financial risks caused by false data. At the same time, the higher the online data quality of the core enterprises, the more widely the blockchain will be promoted, and more enterprises will tend to use the blockchain financial platform. As enterprises upload more real data, it will promote transaction scale and generate higher profits. At the same time, the use of blockchain technology can improve transaction efficiency and reduce transaction costs. The application of blockchain technology benefits both financial institutions and enterprises. That is, the improvement of the quality of shared data will increase the synergy payoff, which will benefit both players.
This part of the model explains how the size and division of the synergy payoff affect the quality of the data on the blockchain financial platform. The hypotheses in this part are basically consistent with those in Section 3.3. This part does not consider the reward or punishment of financial institutions for the core enterprises’ uplink data, nor the reward of superior institutions for financial institutions. Assuming that financial institutions are strictly supervised and core enterprises share real data, a synergy payoff Q will be generated. The core enterprises and financial institutions obtain ρ Q   a n d   ( 1 ρ ) Q , where 0 < ρ < 1 ,   ρ refers to the distribution proportion obtained by the core enterprises from the synergy payoff (Table 8).
From the above analysis, we can obtain the dynamic game payoff matrix between the main enterprises and financial institutions, as shown in Table 9. Similar to the research method in Section 3.1, the following conclusions can be drawn (see Appendix A for a detailed derivation).
Proposition 3.
(i) The greater the synergy payoff created by financial institutions and core enterprises, the more financial institutions tend to be strictly supervised, and core enterprises will choose to upload real data. (ii) With the increase in the proportion of synergy payoff allocated to core enterprises, financial institutions tend to be strictly supervised, and core enterprises tend to upload real data. However, when the distribution ratio exceeds a certain threshold, with an increasing distribution ratio, financial institutions tend to loosen supervision, and core enterprises tend to upload false data.
(The proof of Proposition 3 is shown in Appendix A.)
As seen in Proposition 3, the greater the synergy payoff created by financial institutions and core enterprises, the more it can promote financial institutions to choose strict supervision and core enterprises to choose to upload real data. As SMEs adopt the action strategy of following the core enterprises, improving the synergy payoff will improve the overall quality of shared data. Collaborating and sharing data between enterprises and financial institutions can effectively improve efficiency and promote sustainable development. Financial institutions should use blockchain technology to build a more powerful and complete financial platform that can not only ensure data security and reduce financial risks but also improve transaction scale and reduce transaction costs. The proportion of synergy payoff should be reasonably distributed to improve the enthusiasm of the core enterprises to upload real data. Financial institutions are service institutions, and core enterprises belong to the real economy. The proportion of synergy payoff should be appropriately inclined to core enterprises. In this way, core enterprises can be encouraged to upload real data and increase the scale of transactions. SMEs will follow the core enterprises’ strategy. At the same time, we should pay attention to the interests of financial institutions, rationally distribute the synergy payoff, and encourage financial institutions to serve the real economy better.
We use the three-party dynamic evolutionary game to analyze the reward and punishment mechanisms and the synergy payoff mechanism. We finally find that the conclusion is the same as Propositions 2 and 3. See Appendix A for a detailed calculation and demonstration steps.

4. Simulation

4.1. Dynamic Game Simulation between Core Enterprises and SMEs

We use MatlabR2019a to write simulation programs. This part verifies the impact of initial value changes on the evolution track of core enterprises and SMEs. We verify the conclusion of Proposition 1 through numerical simulation. The parameters selected for the numerical simulation in this part are as follows: D 1 = 600 , D 2 = 300 , C 1 = 300 , C 2 = 200 , P = 600 , M = 150 , a = 2 / 3 , λ = 0.7 . The evolutionary game curves of the core enterprises and SMEs are shown in Figure 3.
In Figure 3a, selecting different initial points will result in the curve converging to different stable points 0,0 , ( 1,1 ) . The simulation results show that the initial value affects the final results of the evolutionary game.
We discuss the impact of changes in the risk cost C 1 of core enterprises on evolutionary game equilibrium (SME risk cost C 2 has similar evolutionary results, as shown in Figure 3b). Due to C 1 < λ P = 420 , C 1 is taken as 200, 300, and 400, respectively. When the risk cost C 1 of core enterprises is 200, core enterprises and SMEs tend to upload real data. When C 1 increases to 300 or 400, core enterprises and SMEs finally tend to upload false data. The simulation results prove the conclusion of Proposition 1 that the lower the risk cost of core enterprises and SMEs, the more inclined both sides will be to upload real data. The inspiration for reality is that the government should strengthen investment in new infrastructure and maintain the development of the blockchain platform. When the security of the uplink data is guaranteed, the willingness of enterprises to upload real data will increase.
According to Section 3.2, P needs to meet the conditions P > C 1 / P and P > ( C 2 M ) / ( 1 λ ) , so P > 429 . We take P as 500, 600, and 700, respectively. Similarly, it can be seen from Figure 3c that the greater the synergy payoff P between core enterprises and the SMEs, the more it can promote core enterprises and the SMEs to upload real data. Because M > C 2 1 λ P = 20 , so we take M equal to 50 , 100 , a n d   150 , respectively. It can be seen in Figure 3d that the greater the influence of the core enterprises on SMEs, the more SMEs tend to follow the action strategies of the core enterprises. The government should create a reasonable business environment and improve the enthusiasm of enterprises to upload real data. At the same time, the government must fully harness the influence of core enterprises to drive economic development.
Figure 4 illustrates that when the proportion of synergy payoff allocated to core enterprises is small (40% and 50%), both core enterprises and SMEs eventually upload false data. When the proportion allocated to core enterprises is high (60%, 70%, and 80%), core enterprises and SMEs will eventually upload real data. However, when the proportion allocated to core enterprises is very high (90%), both core enterprises and SMEs eventually upload false data.
In order to promote enterprises to upload real data, the distribution of synergy payoff should be consistent with the status of enterprises. Core enterprises play an important role in the supply chain, and synergy payoff should be allocated to core enterprises in a higher proportion. At the same time, we should also consider fairness, and the proportion allocated to SMEs should not be too low. Otherwise, it will damage the enthusiasm of SMEs and ultimately lead to the breakdown of cooperation. In summary, the allocation of the proportion of synergy payoff should follow the principle of “giving priority to efficiency and giving consideration to fairness”.

4.2. Dynamic Game Simulation between Core Enterprises and Financial Institutions under the Reward and Punishment Mechanisms

The parameters selected in this part are as follows: D 1 = 600 , C 1 = 300 , C 3 = 250 , α = 0.2 , β = 0.35 , γ = 1.2 .The evolutionary game curve of the core enterprises and financial institutions is shown in Figure 4.
As can be seen in Figure 5a, the selection of different initial points will result in the evolution curve converging to different stable points (0, 0) and (1, 1). The simulation results show that the initial value affects the final results of the evolutionary game process. According to Section 3.3, C 1 / D 1 β < α < m i n   { γ β , γ C 3 / D 1 } , so 0.15 < α < 0.7 . We take α as 0.25, 0.30, and 0.35. In Figure 5b, when the core enterprises upload real data, the financial institution rewards the core enterprises, which will affect the evolutionary game process. Along with α, and with the increase in value, the evolution curve of the core enterprises and financial institutions changes upward at the initial stage but eventually converges to 0. That is, the financial enterprises finally choose to loosen supervision, and the core enterprises choose to upload false data. When changing the initial value or other parameter values for the sensitivity analysis, the increase of α value can promote core enterprises to upload real data in some cases.
According to Section 3.3, C 1 / D 1 α < β < C 3 / D 1 , so 0.3 < β < 0.5 . We take β as 0.35, 0.40, and 0.45, respectively. In Figure 5c, when core enterprises upload false data, the financial institution punishes them. The punishment mechanism affects the outcome of the evolutionary game process. With the increase of β value, financial institutions finally choose to loosen supervision, and the core enterprises choose to upload false data. When changing the initial value or other parameter values for sensitivity analysis, the increase of β value can promote core enterprises to upload real data in some cases. The simulation results show that the reward and punishment mechanisms does not always encourage the core enterprises to upload real data. Similarly, γ > C 3 / D 1 + α = 0.8 , so we take γ as 1.1, 1.2, and 1.3, respectively. In Figure 5d, the reward given by the superior institution to the financial institution affects the evolutionary game process. The higher the amount awarded by the superior institution, the more the financial institution is inclined to strict supervision and the more core enterprises are inclined to upload real data.

4.3. Simulation of a Dynamic Game between Core Enterprises and Financial Institutions under the Synergy Payoff Mechanism

The simulation results in Section 4.2 show that the reward and punishment mechanisms can only work if they meet certain conditions. This part is devoted to studying the impact of the synergy payoff generated by core enterprises and financial institutions on the dynamic evolutionary game process. The selected parameters are as follows: C 1 = 300 , C 3 = 250 , ρ = 0.3 , a n d   Q = 1200 .
In Figure 6a, selecting different initial points will result in the evolution curve converging to different stable points (0, 0) and (1, 1). The simulation results show that the initial value affects the final results of the evolutionary game. According to Section 3.4  0 < C 3 < 1 ρ Q = 840 . We take C 3 as 300, 400, and 500, respectively. In Figure 6b, we examine the impact of changes in the cost of financial institutions on the evolutionary game process. Optimizing the process and management of financial institutions through blockchain technology, reducing their operating costs, can effectively promote enterprises to upload real data.
Similarly, C 1 / Q < ρ < 1 C 3 / Q , so 0.25 < ρ < 0.75 . We take ρ as 0.3, 0.4, and 0.5, respectively. As shown in Figure 6c, we examine the impact of the change in the proportion of synergy payoff distribution on the evolutionary game process. When selecting different initial points and parameter values for the sensitivity analysis, the impact of the change in the ρ value on the evolutionary game process is inverted U-shaped. With the rise of ρ , core enterprises tend to upload real data. When ρ exceeds a certain threshold, core enterprises tend to upload false data. Financial institutions have similar conclusions. The enlightenment of the above conclusions to reality is that in order to promote the core enterprises to upload real data, the proportion of synergy payoff should be appropriately tilted to the core enterprises. However, the interests of financial institutions must be taken into account, and then financial institution can better serve the real economy.
In the same way, we can obtain Q > m a x   { C 1 / ρ , C 3 / ( 1 ρ ) } , so Q > 1000 . We take Q as 1100, 1200, and 1300, respectively. Figure 6d shows that the greater the synergy payoff, the more it can promote enterprises to upload real data. The choice of strict supervision by financial institutions can reduce financial risks and improve synergy payoff. The reward and punishment mechanisms can promote enterprises to upload real data under certain conditions, but sometimes it does not work. The reason is that the reward mechanism will reduce the payoff of financial institutions, and the punishment mechanism will reduce the payoff of core enterprises. When the reward and punishment mechanisms increase the economic interests of one player, it will inevitably reduce the economic interests of another player, so it does not always play a role. As long as the synergy payoff is large enough, the synergy payoff mechanism can always encourage enterprises to upload real data. The reward and punishment mechanisms are zero-sum games, while the synergy payoff mechanism is not a zero-sum game. The synergy benefit mechanism can increase the payoffs for both players. Thus, the synergy payoff mechanism is more effective than the reward and punishment mechanisms.

5. Sensitivity Analysis

In order to verify the accuracy of the numerical simulation results, we have performed the corresponding sensitivity analysis. For Section 3.2, we have performed a sensitivity analysis on the selection of the initial point and C 1 . Variables P can use the same method for sensitivity analysis. The parameters selected for the numerical simulation in this part are as follows: D 1 = 600 , D 2 = 300 , C 1 = 200 , 300   o r   400 , C 2 = 200 , P = 600 , M = 150 , a = 2 3 , a n d   λ = 0.7 . The results of the sensitivity analysis are shown in Figure 7. It can be seen in Figure 7a that different initial points will converge to the two steady-state equilibrium points (0, 0) and (1, 1). It can be seen from Figure 7b–d that the larger the C 1 , the slower the convergence speed of the dynamic evolution curve. Thus, the probability that core enterprises upload real data is inversely proportional to the risk cost C 1 . This conclusion is the same as that of Proposition 1.
For variable M , we chose another method for sensitivity analysis. The reason is that similar simulation results can be obtained using the method in Figure 7. According to Section 3.2, the greater the M value, the greater the influence of core enterprises on SMEs. Since 20 = C 2 1 λ P < M < C 2 = 200 , we take M = 30 as the initial value, the spacing is 10, and the final value is 190. The results of the sensitivity analysis of the variable M are shown in Figure 8. When the M value is small, SMEs converge on the strategy of uploading false data. When the M value gradually increases, SMEs converge on the strategy of uploading real data. It can also be seen from Figure 8 that SMEs always choose the same action strategy as core enterprises. The above conclusion is the same as Proposition 1.
For the reward and punishment mechanisms, we only conducted a sensitivity analysis of the reward coefficient because the punishment coefficient has similar results. According to Section 3.3  C 1 / D 1 β < α < m i n   { γ β , γ C 3 / D 1 } , so 0.15 < α < 0.7 . The sensitivity analysis of the reward coefficient is shown in Figure 9a–c. When the reward coefficient is small ( α = 0.2 ), core enterprises still tend to upload real data for different initial points. When the reward coefficient is large ( α = 0.6 ), the strategy of core enterprises to upload real data does not increase significantly. Therefore, incentive mechanisms do not always work. The same applies to the punishment mechanism.
For the synergy payoff mechanism, we performed a sensitivity analysis for different values of the synergy payoff Q . According to Section 3.4, Q > max   C 1 / ρ , C 3 / 1 ρ = 100 , we take Q = 1100 as the initial value, the spacing is 100, and the end value is 2000. The results of the sensitivity analysis of the variable Q are shown in Figure 9d. The greater the synergy payoff, the greater the probability that core enterprises choose to upload real data, and the faster the convergence speed of copying dynamic curves. The synergy payoff increases the payoff of both players, so the synergy payoff mechanism is better than the reward and punishment mechanisms.

6. Discussion of Results

This paper constructs a dynamic evolutionary game model for core enterprises, SMEs, and financial institutions. We compared the blockchain model with the traditional model, and found that the blockchain model reduces costs and improves efficiency. Enterprises and financial institutions are more inclined to use blockchain technology. In reality, SMEs are dependent on core enterprises. SMEs need to obtain orders from core enterprises in order to survive. Without orders from core enterprises, it will be difficult for SMEs to survive. Core enterprises promote SMEs to adopt the same action strategies as core enterprises through their own influence.
In the game between core enterprises and financial institutions, the reward and punishment mechanisms must meet certain conditions to play a role. In the reward and punishment mechanisms, the game is zero-sum. When one player benefits, the other player will suffer. Therefore, in the context of a zero-sum game, how the benefits are distributed will affect the company’s decision to share real data. Rewards from superior institutions can also promote the improvement of the quality of the data in the chain.
Compared to the reward and punishment mechanisms, the synergy payoff mechanism can more effectively promote enterprises to upload real data. The synergy payoff mechanism has broken through the category of zero-sum games. Under the reward and punishment mechanism, participants in the game are competitors, and benefiting one party means harming the other party’s interests. Under the synergy payoff mechanism, the participants in the game change from a competitive relationship to a cooperative relationship. The more synergy payoffs brought about by cooperation, the more inclined enterprises are to upload real data. Therefore, we need to build a good environment to promote cooperation between enterprises and financial institutions rather than disgusting competition. To promote the uploading of real data by core enterprises and SMEs, it is necessary to reasonably distribute the synergy payoff. With the increased synergy payoff allocated to core enterprises, both parties tend to upload real data. However, both parties tend to upload false data with an increasing allocation proportion if the allocation proportion exceeds a certain threshold. The game between core enterprises and financial institutions on the synergy payoff has similar results.

7. Conclusions

7.1. Academic Implications

Existing research generally explores the construction of reasonable patterns for sharing data, but neglects the willingness of enterprises to share real data. Our research provides a new perspective for sharing data. We analyzed the factors that constrain companies from sharing real data and found that the cost of sharing real data reduces the willingness of companies to share real data. Our research also found that if blockchain technology can improve the security of shared data and reduce hacker attack losses, it will increase the willingness of enterprises to share data.
Our research also focuses on the impact of a reasonable distribution of benefits on the sharing of real data. We calculated the function formula between the proportion of income distribution and the willingness to share real data. This formula indicates that the willingness to share real data exhibits an inverted U-shaped relationship with the proportion of income distribution. In order to promote cooperation among game players, the distribution of profits must be within a reasonable range. Excessive inclination of profits toward one party may lead to a breakdown of cooperation. Our research points out that focusing solely on the development of blockchain technology is not enough. Blockchain technology is an important tool, and the key to achieving a cooperative relationship depends on expanding profits and the distribution of interests among multiple parties in the game.

7.2. Practical Implications

This paper explores how to build a reasonable mechanism to improve the willingness of enterprises to upload real data. In practice, the following measures can be considered to improve the authenticity of the data: (i) Clarify the ownership of data. If the ownership of data cannot be clearly defined, the benefits generated by data sharing will also be unclear. Only after the property rights of the data are determined can the profits generated by the data be determined. Laws and regulations related to data property rights should be established as soon as possible to promote enterprises’ willingness to share real data. (ii) Improve the security of blockchain technology. The existing blockchain technology is not yet mature enough. Encryption algorithms and security measures still need to be strengthened. (iii) Establish reasonable incentive measures. Our research results indicate that the unreasonable distribution of the benefits generated by sharing data can lead to companies uploading false data. In order to enhance the willingness of enterprises to share real data, it is necessary to establish a reasonable allocation mechanism. Under a fair distribution mechanism, multiple parties in the game will construct a community of interests, thereby improving the quality of shared data. (iv) Enhance the level of trust between enterprises. Supply chain enterprises form a closed loop that can enhance mutual trust by sharing information. By integrating blockchain and the Internet, an anti-counterfeiting traceability scheme could be formed to verify the authenticity of the data. Supply chain enterprises and financial institutions sign a letter of commitment and pay a certain deposit to ensure the authenticity of the data.

Author Contributions

C.Z. formed the idea of the paper and completed the review of the literature. X.H. constructed a theoretical model and carried out a numerical simulation. Y.X. revised and improved the article and adjusted its structure. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by China’s Zhejiang philosophical and social science planning project under Grant No. 21NDJC168YB, Ningbo Natural Science Foundation No. 2023J061, the Recycling and Remanufacturing Network Organization and Its Governance under the Sharing Economy of China under Grant No. 18BGL184, the Financial Structure Governance of Supply Chain Based on Data Federation of China under Grant No. 21BGL088, the Zhejiang Provincial Natural Science Foundation of China under Grant No. LY20G030025, the Youth Fund for Humanities and Social Sciences Research of the Ministry of Education in Year 2022 under Grant No. 22YJC790077, and Major Humanities and Social Sciences Research Projects in Zhejiang higher education institutions under Grant No. 2023QN024.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1

Proof of Proposition 1.
(i)
According to Formula (18), S 2 P > 0 ; S 2 M > 0 ;
(ii)
According to Formula (18), S 2 C 1 > 0 ; S 2 C 2 > 0 ;
(iii)
According to Formula (18), S 2 λ = 1 2 P · C 2 M 1 λ 2 + C 1 λ 2 = C 1 C 2 + M λ 2 2 C 1 λ + C 1 2 P λ 2 ( 1 λ ) 2 .
Suppose f ( λ ) = ( C 1 C 2 + M ) λ 2 2 C 1 λ + C 1 , then the discriminant is Δ = 4 C 1 ( C 2 M ) > 0 . Assume f ( λ ) = 0 , According to the root formula, two roots can be obtained as follows: 0 < λ 1 = C 1 C 1 ( C 2 M ) C 1 C 2 + M < 1 , λ 2 = C 1 + C 1 ( C 2 M ) C 1 C 2 + M > 1 . Thus, when λ ( 0 , λ 1 ) , S 2 λ > 0 . When λ ( λ 1 , 1 ) , S 2 λ < 0 . That is, with the current distribution proportion λ in the interval ( 0 , λ 1 ) , core enterprises and SMEs tend to upload real data with the increase in distribution proportion. Current distribution proportion λ in the interval ( λ 1 , 1 ) , core enterprises and SMEs tend to upload false data with the increase in distribution proportion. □

Appendix A.2. Section 3.3 Model Analysis and Deduction

The replication dynamic equation of core enterprises and financial institutions is as follows:
U H x = d x d t = x 1 x α + β D 1 z C 1 ,
U W z = d z d t = z 1 z γ α β D 1 x + β D 1 C 3 .
Core enterprises and financial institutions have reached a stable state through continuous evolution. According to Equations (A1) and (A2), let U H x = 0 and U W z = 0 to obtain the five equilibrium points of the copied dynamic equation as O 2 0,0 , I 2 0,1 ,   H 2 1,1 , G 2 1,0 ,   E 2 ( x 2 , z 2 ) , where x 2 = C 3 β D 1 / [ ( γ α β ) D 1 ] , z 2 = C 1 / [ α + β D 1 ] .
According to the replication dynamic equation of core enterprises and SMEs, the corresponding Jacobian matrix can be obtained as follows:
J 2 = U H ( x ) / x U H ( x ) / z U W ( z ) / x U W ( z ) / z .
The solution space of the dynamic game between core enterprises and financial institutions is { ( x , z ) | 0 x 1,0 z 1 } ; thus, x 2 , z 2 ϵ [ 0,1 ] , 0 < C 1 < ( α + β ) D 1 , β D 1 < C 3 < γ α D 1 , γ > α + β . The steady-state analysis of five local equilibrium points is shown in Table A1.
Table A1. Stability analysis of the evolutionary game.
Table A1. Stability analysis of the evolutionary game.
Equilibrium Point D e t   ( J 1 ) Symbol T r ( J 1 ) SymbolEquilibrium State
O 2 ( 0,0 ) C 1 ( β D 1 C 3 ) + β D 1 C 3 C 1 ESS
I 2 ( 0,1 ) [ α + β D 1 C 1 ] C 3 β D 1 + α D 1 C 3 C 1 + Unstable point
H 2 ( 1,1 ) C 1 α + β D 1 [ α γ D 1 + C 3 ] + C 1 + C 3 ( β + γ ) D 1 ESS
G 2 ( 1,0 ) C 1 [ γ α D 1 C 3 ] + C 1 + ( γ α ) D 1 C 3 +Unstable point
E 2 ( x 2 , y 2 ) K+0 Saddle point
Note: K = α + β γ α β D 1 2 x 2 1 x 2 z 2 1 z 2 .
Table A1 shows that the two stable equilibrium points of the evolution game between core enterprises and financial institutions are O 2 0,0 and H 2 1,1 , that is the stable state is divided into two cases. When financial institutions chooses strict supervision, core enterprises upload real data. When financial institutions choose loose supervision, core enterprises upload false data. I 2 0 , 1 and G 2 1 , 0 indicate that the action strategies of core enterprises and financial institutions are inconsistent, and they are unstable points. E 2 ( x 2 , z 2 ) is a saddle point. Similar to the above analysis, the stable point to which the replication dynamic curve tends ultimately depends on the area S 3 of the polygon O 2 I 2 E 2 G 2 and the area S 4 of the polygon I 2 H 2 G 2 E 2 . If S 3 > S 4 , the replication dynamic curve will tend to O 2 0 , 0 , financial institutions will choose loose regulation, and core enterprises will choose to upload false data. If S 3 < S 4 , the replication dynamic curve will tend to H 2 1 , 1 , financial institutions will choose strict supervision, and core enterprises will choose to upload real data. After the calculation, the formula S 4 is as follows:
S 4 = 1 1 2 x 2 + z 2 = 1 1 2 C 3 β D 1 γ α β D 1 + C 1 α + β D 1 .
Proof of Proposition 2.
(i)
According to Formula (A3), ( S 4 ) / γ > 0.
(ii)
According to Formula (A4), S 4 C 1 < 0 ; S 4 C 3 < 0 . □

Appendix A.3. Section 3.4 Model Analysis and Deduction

The replication dynamic equation of core enterprises and financial institution is as follows:
G H x = d x d t = x 1 x ρ z Q C 1 ,
G W z = d z d t = z 1 z 1 ρ z Q C 3 .
Core enterprises and financial institutions have reached a stable state through continuous evolution. Similar to the above analysis, from Formulas (A5) and (A6), let G H x = 0 and G W z = 0 to obtain the five equilibrium points of the replicated dynamic equation as O 3 0 , 0 , I 3 0 , 1 , H 3 1 , 1 , G 3 1 , 0 , E 3 ( x 3 , z 3 ) , where x 3 = C 3 1 ρ Q , z 3 = C 1 ρ Q , 0 < C 1 < ρ Q , a n d   0 < C 3 < 1 ρ Q . The two stable equilibrium points of the evolution game between core enterprises and financial institution are O 3 0 , 0 and H 3 1 , 1 , that is, the stable state is divided into two cases. When financial institutions choose strict supervision, core enterprises upload real data, while when financial institutions choose loose supervision, core enterprises upload false data. I 2 0 , 1 and G 2 1 , 0 indicate that the action strategies of core enterprises and financial institutions are inconsistent, which are unstable points, and E 3 ( x 3 , z 3 ) is a saddle point. How the copied dynamic curve converges depends on the area S 5 of polygon O 3 I 3 E 3 G 3 and the area S 6 of polygon I 3 H 3 G 3 E 3 . After the calculation, the formula S 6 is as follows:
S 6 = 1 1 2 x 3 + z 3 = 1 1 2 C 3 1 ρ Q + C 1 ρ Q .
Proof of Proposition 3.
(i)
According to Formula (A7), S 6 Q > 0 .
(ii)
Let g ( ρ ) = ( C 1 C 3 ) ρ 2 2 C 1 ρ + C 1 , and the discriminant is Δ = 4 C 1 C 3 > 0 . From the root formula, we can obtain two roots: 0 < ρ 1 = C 1 C 1 C 3 C 1 C 3 < 1 , ρ 2 = C 1 + C 1 C 3 C 1 C 3 > 1 . Thus, when ρ ( 0 , ρ 1 ) , S 6 ρ > 0 ; When ρ ( ρ 1 , 1 ) , S 6 ρ < 0 . That is, the current distribution proportion ρ in the interval ( 0 , ρ 1 ) , with the increase of the distribution proportion, the equilibrium results of financial institutions and core enterprises converge (strict supervision, upload real data). The current distribution proportion ρ in the interval ( ρ 1 , 1 ) , with the increase of the distribution proportion, the equilibrium results of financial institutions and core enterprises converge (loose supervision, upload false data). □

Appendix A.4. Reward and Punishment Mechanisms under a Three-Party Dynamic Evolutionary Game

(1) Model Hypotheses
Hypothesis 1:
The players in this model are core enterprises H ,the SMEs J , and financial institutions E . The three parties are the limited rational agents, and the strategy selection gradually evolves and stabilizes to the optimal strategy over time.
Hypothesis 2:
The strategy space for the core enterprises and SMEs is L = { l 1 , l 2 } = {upload real data, upload false data}. The probability that the core enterprise chooses action l 1 is x , and the probability of choosing action l 2 is 1 x . Similarly, y and 1 y are probabilities that SMEs choose action l 1 and l 2 , respectively. The strategy space of the financial institution is W = { w 1 , w 2 } = {strict supervision, loose supervision}. The probability that the core enterprise chooses action w 1 is z , and the probability of choosing action w 2 is 1 z .
Hypothesis 3:
In the BSC, the payoffs of core enterprises, SMEs, and financial institutions are R 1 , R 2   a n d   R 3 , respectively. The number of data shared by core enterprises and SMEs is D 1 , D 2 , respectively. If the data of the core company and SMEs are true, the financial institution will reward the core company and SMES with the amount of α D 1 , α D 2 , respectively. Suppose the online data of the core enterprises and SMEs is false. In that case, the core enterprises and SMEs will receive punishment β D 1 , β D 2 , respectively. α and β are the reward and punishment coefficients of the core enterprises and SMEs. Financial institutions will not be able to identify the authenticity of data when they choose loose regulation, so they will not be rewarded or punished.
Hypothesis 4:
Uploading real data will bring risks, and the transaction’s counterparty will take the opportunity to lower the price after obtaining the real data. Thus, in the BSC, the risk cost for core enterprises and SMEs uploading real data is supposed as C 1 , C 2 , respectively. The cost of core enterprises is higher than that of SMEs, so C 1 > C 2 . Assuming that the cost of strict supervision is C 3 , and the cost of loose supervision is small, it is set to 0 for convenience. In reality, if data leaks, the core enterprises will suffer a heavy loss, which is much greater than the supervision cost of a financial institution, so it is assumed that C 1 > C 3 .
Hypothesis 5:
If a financial institution chooses strict supervision and ultimately ensures that core enterprises upload real data, the financial institution’s achievements on the blockchain financial platform will be rewarded by the superior institutions with the amount of γ D 1 , where γ is the reward coefficient given to the financial institution.
Hypothesis 6:
Core enterprises have a strong influence on SMEs. If an SME uploads false data, the core company will penalize the SME when it is discovered. For example, core enterprises may reduce or even cancel the contracts. The impact of SMEs uploading false data to core enterprises is negligible, but the penalties imposed on SMEs by core enterprises result in SMEs suffering huge losses. Assuming that the core enterprises penalize the SMEs after the SMEs upload false data, the SME’s loss is M , where M > 0 . Meanwhile, we assume that C 2 > M , since SMEs will lose core business.
Hypothesis 7:
If a financial institution chooses strict supervision and ultimately ensures that core enterprises and SMEs upload real data, the financial institution’s achievements on the blockchain financial platform will be rewarded by the superior institutions with the amount of γ ( D 1 + D 2 ) , where γ is the reward coefficient given to financial institution.
Table A2. Symbols under reward and punishment mechanisms in a three-party dynamic evolutionary game.
Table A2. Symbols under reward and punishment mechanisms in a three-party dynamic evolutionary game.
SymbolDefinition
x Probability of core enterprises uploading real data
y Probability of SMEs uploading real data
z Probability of a financial institution choosing strict supervision
α When core enterprises and SMEs upload real data, the reward coefficient given by financial institutions to enterprises
β When core enterprises and SMEs upload false data, the penalty coefficient given by financial institutions to enterprises
γ Reward coefficient of superior institutions to financial institutions
M When SMEs upload false data, the penalty value of core enterprises to SMEs
R 1 , R 2 , R 3 Payoffs of core enterprises, SMEs, and financial institutions in BSC
D 1 , D 2 Number of data shared by core enterprises and SMEs, respectively
C 1 , C 2 In the BSC, the risk costs faced by core enterprises and SMEs when sharing real data
C 3 Cost of a financial institution choosing strict supervision
(2) Model Construction
From the above analysis, we can obtain the payoff matrix of the dynamic game between the core enterprises, the SMEs, and the financial institution, as shown in Table A3.
Table A3. The income matrix of a three-party dynamic evolutionary game under reward and punishment mechanisms.
Table A3. The income matrix of a three-party dynamic evolutionary game under reward and punishment mechanisms.
Financial Institution
Strict SupervisionLoose Supervision
Core enterprisesUpload real dataSMESUpload real data R 1 + α D 1 C 1 , R 2 + α D 2 C 2 , R 3 C 3 α D 1 + D 2 + γ D 1 + D 2 R 1 C 1 , R 2 C 2 , R 3
Upload false data R 1 + α D 1 C 1 , R 2 β D 2 M , R 3 C 3 α D 1 + β D 2 R 1 C 1 , R 2 M , R 3
Upload false dataSMESUpload real data R 1 β D 1 , R 2 + α D 2 C 2 , R 3 C 3 α D 2 + β D 1 R 1 , R 2 C 2 , R 3
Upload false data R 1 β D 1 , R 2 β D 2 M , R 3 C 3 + β ( D 1 + D 2 ) R 1 , R 2 M , R 3
(3) Model analysis
The expected income of core enterprises uploading real data or false data is E 11 , E 12 . The average expected income of core enterprises is E 1 .
E 11 = y z R 1 C 1 + α D 1 + y 1 z R 1 C 1 + 1 y z R 1 + α D 1 C 1 + 1 y 1 z R 1 C 1 ,
E 12 = y z R 1 β D 1 + y 1 z R 1 + 1 y z R 1 β D 1 + 1 y 1 z R 1 ,
E 1 = x E 11 + 1 x E 12 .
The dynamic replication equation of probability x for core enterprises to adopt the strategy of “uploading real data” is as follows:
F x = d x d t = x E 11 E 1 = x 1 x α + β z D 1 C 1 .
We can calculate the derivative of F ( x ) and define the G ( z ) function as follows:
d F ( x ) d x = 1 2 x α + β z D 1 C 1 ,
G z = α + β z D 1 C 1 .
According to the stability theorem of differential equations, the core enterprise needs to meet the following conditions when it chooses to upload real data in a stable state: F x = 0   a n d   d F ( x ) d x < 0 .
Let G ( z ) = 0 to obtain z * = C 1 α + β D 1 . G ( z ) is a monotonically increasing function of z . When z < z * , G z < 0 . At this time, x = 0 is the evolutionary stability strategy (ESS) for core enterprises to upload real data. When z > z * , G z > 0 . At this time, x = 1 is the evolutionary stability strategy (ESS) for core enterprises to upload real data.
The probability of core enterprises choosing to upload real data is V A 1 , the formula is as follows:
U 1 = 1 C 1 α + β 2 D 1 ,
According to (A14), the following formula can be obtained.
U 1 C 1 < 0 .
It can be seen from (A15) that the probability of core enterprises uploading real data is inversely proportional to the risk cost C 1 . The probability of core enterprises choosing to upload real data is not directly related to variables α and β . This conclusion is consistent with the conclusion of Proposition 2.
Similarly, we can calculate the replication dynamic equation and the corresponding probability of SMEs choosing to upload real data.
F y = d y d t = y 1 y α + β z D 2 C 2 + M ,
U 2 = 1 C 2 M α + β 2 D 2 .
According to (A17), the following formula can be obtained:
U 2 C 2 < 0 , U 2 M > 0 .
It can be seen from (A18) that the probability of SMEs uploading real data is inversely proportional to the risk cost C 2 , and is directly proportional to the penalty value M of core enterprises to SMEs. The probability of SMEs choosing to upload real data is not directly related to variables α and β . This conclusion is consistent with the conclusion of Proposition 2.
Similarly, we can calculate the replication dynamic equation of a financial institution choosing strict supervision and the probability of a financial institution choosing strict supervision.
F z = d z d t = z 1 z γ x y D 1 + D 2 α + β x D 1 α + β y D 2 + β D 1 + D 2 C 3 ,
U 3 = 1 C 3 ( α + β ) 2 ( D 1 + D 2 ) γ ( D 1 + D 2 ) 2
According to (A20), the following formula can be obtained:
U 3 C 3 < 0 , U 3 γ > 0 .
It can be seen from (A21) that the probability of a financial institution choosing strict supervision is inversely proportional to the cost of supervision and is directly proportional to the reward coefficient of the superior institutions. This conclusion is consistent with the conclusion of Proposition 2.

Appendix A.5. The Synergy Payoff Mechanism under a Three-Party Dynamic Evolutionary Game

(1) Model Hypotheses
Hypothesis 1:
The players in this model are core enterprises H , the SMEs J, and financial institutions E . The three parties are the limited rational agents, and the strategy selection gradually evolves and stabilizes to the optimal strategy over time.
Hypothesis 2:
The strategy space for the core enterprises and SMEs is L = { l 1 , l 2 } = {upload real data, upload false data}. The probability that the core enterprise chooses action l 1 is x , and the probability of choosing action l 2 is 1 x . Similarly, y and 1 y are probabilities that SMEs choose action l 1 and l 2 , respectively. The strategy space of a financial institution is W = { w 1 , w 2 } = {strict supervision, loose supervision}. The probability that the core enterprises choosing action w 1 is z , and the probability of choosing action w 2 is 1 z .
Hypothesis 3:
In the BSC, the payoffs of core enterprises, SMEs and financial institutions are R 1 , R 2 , a n d   R 3 , respectively. The number of data shared by core enterprises and SMEs is D 1 , D 2 , respectively.
Hypothesis 4:
Uploading real data will bring risks, and the transaction’s counterparty will take the opportunity to lower the price after obtaining the real data. Thus, in the BSC, the risk cost for core enterprises and SMEs uploading real data is supposed as C 1 , C 2 , respectively. The cost of core enterprises is higher than that of SMEs, so C 1 > C 2 . Assuming that the cost of strict supervision is C 3 , and the cost of loose supervision is small, it is set to 0 for convenience. In reality, if data leaks, the core enterprises will suffer a heavy loss, which is much greater than the supervision cost of a financial institution, so it is assumed that C 1 > C 3 .
Hypothesis 5:
Core enterprises have a strong influence on SMEs. If an SME uploads false data, the core company will penalize the SME when it is discovered. For example, core enterprises may reduce or even cancel the contracts. The impact of SMEs uploading false data to core enterprises is negligible, but the penalties imposed on SMEs by core enterprises result in SMEs suffering huge losses. Assuming that the core enterprises penalize the SMEs after the SMEs upload false data, the SME’s loss is M , where M > 0 . Meanwhile, we assume that C 2 > M , since SMEs will lose core business.
Hypothesis 6:
When financial institutions choose to strictly supervise and core enterprises and SMEs choose to upload real data, the cooperation of the three parties will generate a synergy payoff B . Assume that the proportion of synergy payoff allocated to core enterprises, SMEs and financial institutions is θ 1 , θ 2 , a n d   θ 3 . Where θ 1 + θ 2 + θ 3 = 1 , 0 < θ 1 , θ 2 , θ 3 < 1 . (The difference between Hypothesis 6 in Appendix A.5 and Section 3.4 is that, two parties (financial institutions and core enterprises) distribute synergy payoffs in Section 3.4. Hypothesis 6 in Appendix A.5 is that three parties (financial institutions, core enterprises, and SMEs) jointly distribute synergy payoffs. Therefore, the distribution proportion has been reset.)
Hypothesis 7:
If the risk cost of core enterprises and SMEs is greater than the synergy payoff obtained, core enterprises and SMEs tend not to upload real data. The same applies to financial institutions. Therefore, we assume that the risk cost is less than the synergy payoff. Where C 1 < θ 1 B , C 2 < θ 2 B , C 3 < θ 3 B . Based on the above assumptions, related symbols are further described in Table A4.
Table A4. Symbols under reward and punishment mechanisms in a three-party dynamic evolutionary game.
Table A4. Symbols under reward and punishment mechanisms in a three-party dynamic evolutionary game.
SymbolDefinition
x Probability of core enterprises uploading real data
y Probability of SMEs uploading real data
z Probability of a financial institution choosing strict supervision
θ 1 Proportion of synergy payoff allocated to core enterprises
θ 2 Proportion of synergy payoff allocated to SMEs
θ 3 Proportion of synergy payoff allocated to financial institutions
M When SMEs upload false data, the penalty value of core enterprises to SMEs
R 1 , R 2 , R 3 Payoffs of core enterprises, SMEs, and financial institutions in BSC
D 1 , D 2 Number of data shared by core enterprises and SMEs, respectively
C 1 , C 2 In the BSC, the risk costs faced by core enterprises and SMEs when sharing real data
C 3 Cost of a financial institution choosing strict supervision
(2) Model Construction
From the above analysis, we can obtain the payoff matrix of the dynamic game between the core enterprises, the SMEs, and the financial institutions, as shown in Table A5.
Table A5. The income matrix of a three-party dynamic evolutionary game under reward and punishment mechanisms.
Table A5. The income matrix of a three-party dynamic evolutionary game under reward and punishment mechanisms.
Financial Institution
Strict SupervisionLoose Supervision
Core enterprisesUpload real dataSMESUpload real data R 1 + θ 1 B C 1 , R 2 + θ 2 B C 2 , R 3 C 3 + θ 3 B R 1 C 1 , R 2 C 2 , R 3
Upload false data R 1 C 1 , R 2 M , R 3 C 3 R 1 C 1 , R 2 M , R 3
Upload false dataSMESUpload real data R 1 , R 2 M , R 3 C 3 R 1 , R 2 C 2 , R 3
Upload false data R 1 , R 2 M , R 3 C 3 R 1 , R 2 M , R 3
(3) Model analysis
We can calculate the replication dynamic equation and the corresponding probability of core enterprises choosing to upload real data.
F x = d x d t = x 1 x θ 1 y z B C 1 ,
V 1 = 1 + C 1 θ 1 B l n C 1 θ 1 B .
According to (A23), the following formula can be obtained.
U 1 C 1 < 0 , U 1 B > 0 .
It can be seen from Formula (A24) that the probability of core enterprises uploading real data is inversely proportional to the risk cost C 1 and is directly proportional to the value of synergy payoff B . This conclusion is consistent with the conclusion of Proposition 3.
Similarly, we can calculate the replication dynamic equation and the corresponding probability of SMEs choosing to upload real data.
F y = d y d t = y 1 y θ 2 x z B + M C 2 ,
V 2 = 1 + C 2 M θ 2 B l n C 2 M θ 2 B .
According to (A26), the following formula can be obtained:
U 2 C 2 < 0 , U 2 B > 0 , U 2 M > 0 .
It can be seen from (A27) that the probability of SMEs uploading real data is inversely proportional to the risk cost C 2 , and is directly proportional to the value of synergy payoff B , and the penalty value M of core enterprises to SMEs. This conclusion is consistent with the conclusion of Proposition 3.
Similarly, we can calculate the replication dynamic equation of a financial institution choosing strict supervision and the probability of a financial institution choosing strict supervision.
F z = d z d t = z 1 z ( θ 3 x y B C 3 ) ,
U 3 = 1 + C 3 θ 3 B l n C 3 θ 3 B
According to (A29), the following formula can be obtained:
U 3 C 3 < 0 , U 3 B > 0 .
It can be seen from (A30) that the probability of a financial institution choosing strict supervision is inversely proportional to the cost of supervision and is directly proportional to the value of the synergy payoff B . This conclusion is consistent with the conclusion of Proposition 3.
The research conclusions of the two-party game and the three-party game are the same because SMEs are dependent on the core enterprises to carry out production and sales activities. SMEs lack independence and need more help from the government and core enterprises.

References

  1. Forth, J.; Bewley, H.; Bryson, A. Small and Medium-Sized Enterprises; Department of Trade and Industry: London, UK, 2006.
  2. Abdulsaleh, A.M.; Worthington, A.C. Small and medium-sized enterprises financing: A review of literature. Int. J. Bus. Manag. 2013, 8, 36. [Google Scholar] [CrossRef] [Green Version]
  3. Acemoglu, D.; Makhdoumi, A.; Malekian, A.; Ozdaglar, A. Too much data: Prices and inefficiencies in data markets. Am. Econ. J. Microecon. 2022, 14, 218–256. [Google Scholar] [CrossRef]
  4. Li, Z.; Liang, F.; Hu, H. Blockchain-based and value-driven enterprise data governance: A collaborative framework. Sustainability 2023, 15, 8578. [Google Scholar] [CrossRef]
  5. Marsal-Llacuna, M.L. Future living framework: Is blockchain the next enabling network? Technol. Forecast. Soc. Chang. 2018, 128, 226–234. [Google Scholar] [CrossRef]
  6. Zhou, H.; Benton, W.C., Jr. Supply chain practice and information sharing. J. Oper. Manag. 2007, 25, 1348–1365. [Google Scholar] [CrossRef]
  7. Hofman, W.J. Data sharing requirements of supply-And logistics innovations-Towards a maturity model. In Proceedings of the International Conference on Information Systems, Logistics and Supply Chain, Bordeaux, France, 1–4 June 2016. [Google Scholar]
  8. Lee, H.L.; Padmanabhan, V.; Whang, S. Information distortion in a supply chain: The bullwhip effect. Manag. Sci. 1997, 43, 546–558. [Google Scholar] [CrossRef]
  9. Lee, H.L.; Padmanabhan, V.; Whang, S. The bullwhip effect in supply chains. Sloan Manag. Rev. 1997, 38, 93–102. [Google Scholar] [CrossRef]
  10. Cachon, G.P.; Fisher, M. Supply chain inventory management and the value of shared information. Manag. Sci. 2000, 46, 1032–1048. [Google Scholar] [CrossRef] [Green Version]
  11. Schloetzer, J.D. Process integration and information sharing in supply chains. Account. Rev. 2012, 87, 1005–1032. [Google Scholar] [CrossRef]
  12. Sarfaraz, A.; Chakrabortty, R.K.; Essam, D.L. The implications of blockchain-coordinated information sharing within a supply chain: A simulation study. Blockchain Res. Appl. 2023, 4, 100–110. [Google Scholar] [CrossRef]
  13. Behnke, K.; Janssen, M. Boundary conditions for traceability in food supply chains using blockchain technology. Int. J. Inf. Manag. 2020, 52, 101–112. [Google Scholar] [CrossRef]
  14. Hughes, L.; Dwivedi, Y.K.; Misra, S.K.; Rana, N.P.; Raghavan, V.; Akella, V. Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda. Int. J. Inf. Manag. 2019, 49, 114–129. [Google Scholar] [CrossRef]
  15. Hayrutdinov, S.; Saeed, M.S.R.; Rajapov, A. Coordination of supply chain under blockchain system-based product lifecycle information sharing effort. J. Adv. Transp. 2020, 2020, 1–10. [Google Scholar] [CrossRef]
  16. Seidmann, A.; Sunda, R. Sharing logistics information across organizations: Technology, competition and contracting. In Information Technology and Industrial Competitiveness; Springer: Boston, MA, USA, 1998; pp. 107–136. [Google Scholar]
  17. Heidl, R.A.; Steensma, H.K.; Phelps, C. Divisive faultlines and the unplanned dissolutions of multipartner alliances. Organ. Sci. 2014, 25, 1351–1371. [Google Scholar] [CrossRef] [Green Version]
  18. Du, T.C.; Lai, V.S.; Cheung, W.; Cui, X. Willingness to share information in a supply chain: A partnership-data-process perspective. Inf. Manag. 2012, 49, 89–98. [Google Scholar] [CrossRef]
  19. Fawcett, S.E.; Waller, M.A. Mitigating the myopia of dominant logics: On differential performance and strategic supply chain research. J. Bus. Logist. 2012, 33, 173–180. [Google Scholar] [CrossRef]
  20. Tran, T.H.; Childerhouse, P.; Deakins, E. Supply Chain information sharing: Challenges and risk mitigation strategies. J. Manuf. Technol. Manag. 2016, 27, 1102–1126. [Google Scholar] [CrossRef]
  21. Lee, H.L.; So, K.C.; Tang, C.S. The value of information sharing in a two-level supply chain. Manag. Sci. 2000, 46, 626–643. [Google Scholar] [CrossRef] [Green Version]
  22. Liang, F.; Yu, W.; An, D.; Yang, Q.; Fu, X.; Zhao, W. A survey on big data market: Pricing, trading and protection. IEEE Access 2018, 6, 15132–15154. [Google Scholar] [CrossRef]
  23. Wang, L.; Guo, S. Blockchain based data trust sharing mechanism in the supply chain. In Proceedings of the International Conference on Security with Intelligent Computing and Big-Data Services, Tokyo, Japan, 17 April 2018; Springer: Cham, Switzerland, 2018; pp. 43–53. [Google Scholar]
  24. Hofman, W.J. A methodological approach for development and deployment of data sharing in complex organizational supply and logistics networks with blockchain technology. IFAC-Pap. OnLine 2019, 52, 55–60. [Google Scholar] [CrossRef]
  25. Epiphaniou, G.; Pillai, P.; Bottarelli, M.; Al-Khateeb, H.; Hammoudesh, M.; Maple, C. Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. IEEE Trans. Eng. Manag. 2020, 67, 1059–1073. [Google Scholar] [CrossRef] [Green Version]
  26. Qian, X.; Papadonikolaki, E. Shifting trust in construction supply chains through blockchain technology. Eng. Constr. Archit. Manag. 2021, 28, 584–602. [Google Scholar] [CrossRef]
  27. Xu, X.; He, Y. Blockchain application in modern logistics information sharing: A review and case study analysis. Prod. Plan. Control. 2022, 55, 1–15. [Google Scholar] [CrossRef]
  28. Rejeb, A.; Keogh, J.G.; Simske, S.J.; Stafford, T.; Treiblmaier, H. Potentials of blockchain technologies for supply chain collaboration: A conceptual framework. Int. J. Logist. Manag. 2021, 32, 973–994. [Google Scholar] [CrossRef]
  29. Lee, D.; Lee, S.H.; Masoud, N.; Krishnan, M.S.; Li, V.C. Integrated digital twin and blockchain framework to support accountable information sharing in construction projects. Autom. Constr. 2021, 127, 103–114. [Google Scholar] [CrossRef]
  30. Xu, P.; Lee, J.; Barth, J.R.; Richey, R.G. Blockchain as supply chain technology: Considering transparency and security. Int. J. Phys. Distrib. Logist. Manag. 2021, 51, 305–324. [Google Scholar] [CrossRef]
  31. Wang, J.; Zhou, Z.; Botterud, A. An evolutionary game approach to analyzing bidding strategies in electricity markets with elastic demand. Energy 2011, 36, 3459–3467. [Google Scholar] [CrossRef]
  32. Wang, J.; Peng, X.; Du, Y.; Wang, F. A tripartite evolutionary game research on information sharing of the subjects of agricultural product supply chain with a farmer cooperative as the core enterprise. Manag. Decis. Econ. 2022, 43, 159–177. [Google Scholar] [CrossRef]
  33. Apaloo, J.; Brown, J.S.; Vincent, T.L. Evolutionary game theory: ESS, convergence stability, and NIS. Evol. Ecol. Res. 2009, 11, 489–515. [Google Scholar]
  34. Encarnação, S.; Santos, F.P.; Santos, F.C.; Blass, V.; Pacheco, J.M.; Portugali, J. Paths to the adoption of electric vehicles: An evolutionary game theoretical approach. Transp. Res. Part B Methodol. 2018, 113, 24–33. [Google Scholar] [CrossRef]
  35. Abram, W.C.; Noray, K. Political corruption and public activism: An evolutionary game-theoretic analysis. Dyn. Games Appl. 2018, 8, 1–21. [Google Scholar] [CrossRef]
  36. Jiang, Z.Z.; He, N.; Qin, X.; Ip, W.H.; Wu, C.H.; Yung, K.L. Evolutionary game analysis and regulatory strategies for online group-buying based on system dynamics. Co. Inf. Syst. 2018, 12, 695–713. [Google Scholar] [CrossRef]
  37. Luo, J.; Ma, B.; Zhao, Y.; Chen, T. Evolution model of health food safety risk based on prospect theory. J. Healthc. Eng. 2018, 10, 1–13. [Google Scholar] [CrossRef] [Green Version]
  38. Rong, J.; Zhu, L. Cleaner production quality regulation strategy of pharmaceutical with collusive behavior and patient feedback. Complexity 2020, 125, 1–15. [Google Scholar] [CrossRef]
  39. Pan, X.; Ma, J.; Wu, C. Decision game of data sharing in supply chain enterprises considering data value over time. J. Supercomput. 2020, 76, 3659–3672. [Google Scholar] [CrossRef]
  40. Chen, Y.; Sun, L. Trust strategy simulation of corporation–NPO cross alliance using evolutionary game theory. Kybernetes 2017, 46, 450–465. [Google Scholar] [CrossRef]
  41. Cheng, H.; Li, J.; Lu, J.; Lo, S.L.; Xiang, Z. Incentive-Driven Information Sharing in Leasing Based on a Consortium Blockchain and Evolutionary Game. J. Theor. Appl. Electron. Commer. Res. 2023, 18, 206–236. [Google Scholar] [CrossRef]
  42. Sun, R.; He, D.; Su, H. Evolutionary game analysis of blockchain technology preventing supply chain financial risks. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 2824–2842. [Google Scholar] [CrossRef]
  43. Zhu, Q.; Zong, R.; Xu, M. Three-Party Stochastic Evolutionary Game Analysis of Supply Chain Finance Based on Blockchain Technology. Sustainability 2023, 15, 3084. [Google Scholar] [CrossRef]
Figure 1. (a) When y = C 1 λ P , phase diagram of core enterprise replication dynamics. (b) When y > C 1 λ y , phase diagram of core enterprise replication dynamics. (c) When y < C 1 λ y , phase diagram of core enterprise replication dynamics.
Figure 1. (a) When y = C 1 λ P , phase diagram of core enterprise replication dynamics. (b) When y > C 1 λ y , phase diagram of core enterprise replication dynamics. (c) When y < C 1 λ y , phase diagram of core enterprise replication dynamics.
Sustainability 15 09439 g001
Figure 2. Phase diagram of the evolutionary game between core enterprises and SMEs.
Figure 2. Phase diagram of the evolutionary game between core enterprises and SMEs.
Sustainability 15 09439 g002
Figure 3. Process of dynamic evolution of core enterprises and SMEs.
Figure 3. Process of dynamic evolution of core enterprises and SMEs.
Sustainability 15 09439 g003
Figure 4. Impact of the change in the proportion of the synergy payoff on the dynamic evolutionary game.
Figure 4. Impact of the change in the proportion of the synergy payoff on the dynamic evolutionary game.
Sustainability 15 09439 g004
Figure 5. Process of dynamic evolution of core enterprises and financial institutions under the reward and punishment mechanisms.
Figure 5. Process of dynamic evolution of core enterprises and financial institutions under the reward and punishment mechanisms.
Sustainability 15 09439 g005
Figure 6. Process of dynamic evolution of core enterprises and financial institutions under the synergy payoff mechanism.
Figure 6. Process of dynamic evolution of core enterprises and financial institutions under the synergy payoff mechanism.
Sustainability 15 09439 g006
Figure 7. Sensitivity analysis of the initial point and C 1 in Section 3.2.
Figure 7. Sensitivity analysis of the initial point and C 1 in Section 3.2.
Sustainability 15 09439 g007
Figure 8. Sensitivity analysis of M in Section 3.2.
Figure 8. Sensitivity analysis of M in Section 3.2.
Sustainability 15 09439 g008
Figure 9. Sensitivity analysis of α in Section 3.3 and Q in Section 3.4.
Figure 9. Sensitivity analysis of α in Section 3.3 and Q in Section 3.4.
Sustainability 15 09439 g009
Table 1. Symbols in a three-party dynamic evolutionary game.
Table 1. Symbols in a three-party dynamic evolutionary game.
SymbolDefinition
x Probability of core enterprises uploading real data
y Probability of SMEs uploading real data
v Probability of a financial institution choosing blockchain
ρ The accuracy of data transmission in the TSC
λ Proportion of core enterprises’ share of synergy payoff
R 01 , R 02 , R 03 Payoffs of core enterprises, SMEs, and financial institutions in TSC
R 1 , R 2 , R 3 Payoffs of core enterprises, SMEs, and financial institutions in BSC
D 1 , D 2 Number of data shared by core enterprises and SMEs, respectively
P ,   P 0 The value of the synergy payoff in BSC and TSC, respectively
T , T 0 When core enterprises and SMEs both upload real data, financial institutions obtain additional benefits from BSC and TSC, respectively
C 01 , C 02 In the TSC, the risk costs faced by core enterprises and SMEs when sharing real data
C 1 , C 2 In the BSC, the risk costs faced by core enterprises and SMEs when sharing real data
Table 2. The payoff matrix of the three-party dynamic evolutionary game in BSC vs. TSC.
Table 2. The payoff matrix of the three-party dynamic evolutionary game in BSC vs. TSC.
Financial Institution
BSCTSC
Core enterprisesUpload real dataSMESUpload real data R 1 + λ P C 1 , R 2 + 1 λ P C 2 , R 3 + T R 01 + λ P 0 C 01 , R 02 + 1 λ P 0 C 02 , R 03 + T 0
Upload false data R 1 C 1 , R 2 , R 3 R 01 C 01 , R 02 , R 03
Upload false dataSMESUpload real data R 1 , R 2 C 2 , R 3 R 01 , R 02 C 02 , R 03
Upload false data R 1 , R 2 , R 3 R 01 , R 02 , R 03
Table 3. Symbols in the dynamic game between core enterprises and SMEs.
Table 3. Symbols in the dynamic game between core enterprises and SMEs.
SymbolDefinition
x Probability of core enterprises uploading real data
y Probability of SMEs uploading real data
a The coefficient of the synergy payoff
λ Proportion of core enterprises’ share of synergy payoff
b 1 , b 2 Risk coefficient of real data uploaded by core enterprises and SMEs
R 1 , R 2 Payoffs of core enterprises and SMEs in BSC
D 1 , D 2 Number of data shared by core enterprises and SMEs, respectively
C 1 , C 2 In the BSC, the risk costs faced by core enterprises and SMEs when sharing real data
M When SMEs upload false data, the penalty value of core enterprises to SMEs
P The value of the synergy payoff in BSC
Table 4. Dynamic game payoff matrix between core enterprises and SMEs.
Table 4. Dynamic game payoff matrix between core enterprises and SMEs.
SMEs
Upload Real DataUpload False Data
Core enterprisesUpload real data R 1 + λ P C 1 ,
R 2 + ( 1 λ ) P C 2
R 1 C 1 ,
R 2 M
Upload false data R 1 ,
R 2 C 2
R 1 ,
R 2 M
Table 5. Stability analysis of the evolutionary game.
Table 5. Stability analysis of the evolutionary game.
Equilibrium Point D e t   ( J 1 ) Symbol T r ( J 1 ) SymbolEquilibrium State
O 1 ( 0,0 ) M C 1 C 2 + C 1 M C 2 ESS
I 1 ( 0,1 ) M C 2 ( λ P C 1 ) + λ P C 1 + M C 2 + Unstable point
H 1 ( 1,1 ) C 1 λ P [ M C 2 ( 1 λ ) P ] + C 1 + M C 2 P ESS
G 1 ( 1,0 ) C 1 [ 1 λ P M C 2 ] + C 1 M C 2 + ( 1 λ ) P +Unstable point
E 1 ( x 1 , y 1 ) λ ( λ 1 ) P 2 x 1 ( 1 x 1 ) y 1 ( 1 y 1 ) +0 Saddle point
Table 6. Symbols in a dynamic game between core enterprises and financial institutions.
Table 6. Symbols in a dynamic game between core enterprises and financial institutions.
SymbolDefinition
x Probability of core enterprises uploading real data
z Probability of a financial institution choosing strict supervision
α When core enterprises upload real data, the reward coefficient of the financial institutions for core enterprises
β When the core enterprise uploads false data, the penalty coefficient of the financial institution applies to the core enterprise
γ Reward coefficient of superior institutions to financial institutions
b 1 Risk coefficient of real data uploaded by core enterprises
R 1 , R 3 Payoffs of core enterprises and financial institutions in BSC, respectively
D 1 Number of data shared by core enterprises
C 1 In the BSC, the risk costs faced by core enterprises when sharing real data
C 3 Cost of a financial institution choosing strict supervision
Table 7. Payoff matrix of dynamic games between core enterprises and financial institutions.
Table 7. Payoff matrix of dynamic games between core enterprises and financial institutions.
Financial Institution
Strict SupervisionLoose Supervision
Core enterprisesUpload real data R 1 C 1 + α D 1 ,
R 3 C 3 α D 1 + γ D 1
R 1 C 1 ,
R 3
Upload false data R 1 β D 1 ,
R 3 C 3 + β D 1
R 1 ,
R 3
Table 8. Symbols in a dynamic game between core enterprises and financial institutions.
Table 8. Symbols in a dynamic game between core enterprises and financial institutions.
SymbolDefinition
x Probability of core enterprises uploading real data
z Probability of a financial institution choosing strict supervision
ρ The distribution proportion obtained by the core enterprises from the synergy payoff
Q Synergy payoff is generated when core enterprises upload real data and financial institutions strictly supervise
R 1 , R 3 Payoffs of core enterprises and financial institutions in BSC, respectively
C 1 In the BSC, the risk costs faced by core enterprises when sharing real data
C 3 Cost of a financial institution choosing strict supervision
Table 9. Payoff matrix of dynamic games between core enterprises and financial institutions.
Table 9. Payoff matrix of dynamic games between core enterprises and financial institutions.
Financial Institution
Strict SupervisionLoose Supervision
Core enterprisesUpload real data R 1 C 1 + ρ Q ,
R 3 C 3 + ( 1 ρ ) Q
R 1 C 1 ,
R 3
Upload false data R 1 ,
R 3 C 3
R 1 ,
R 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, C.; Huang, X.; Xu, Y. The Impact of Blockchain on Enterprises Sharing Real Data Based on Dynamic Evolutionary Game Analysis. Sustainability 2023, 15, 9439. https://doi.org/10.3390/su15129439

AMA Style

Zheng C, Huang X, Xu Y. The Impact of Blockchain on Enterprises Sharing Real Data Based on Dynamic Evolutionary Game Analysis. Sustainability. 2023; 15(12):9439. https://doi.org/10.3390/su15129439

Chicago/Turabian Style

Zheng, Changjuan, Xu Huang, and Ying Xu. 2023. "The Impact of Blockchain on Enterprises Sharing Real Data Based on Dynamic Evolutionary Game Analysis" Sustainability 15, no. 12: 9439. https://doi.org/10.3390/su15129439

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop