Next Article in Journal
On Analogies in Proton-Transfers for Pyrimidine Bases in the Gas Phase (Apolar Environment)—Cytosine Versus Isocytosine
Previous Article in Journal
Heterogeneous Catalytic and Non-Catalytic Supercritical Water Oxidation of Organic Pollutants in Industrial Wastewaters Effect of Operational Parameters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Artwork Rental System Based on Blockchain Technology

1
Department of Computer Science and Engineering, National Chung-Hsing University, Taichung 40227, Taiwan
2
Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan
3
School of Information Engineering, Changchun Sci-Tech University, Changchun 130600, China
*
Authors to whom correspondence should be addressed.
Symmetry 2023, 15(2), 341; https://doi.org/10.3390/sym15020341
Submission received: 25 December 2022 / Revised: 22 January 2023 / Accepted: 23 January 2023 / Published: 26 January 2023
(This article belongs to the Section Computer)

Abstract

:
In recent years, due to the slowdown of the global economy and the instability of the stock market and real estate market, the art market has gradually become the third-largest investment market after the former two. As more and more funds flow into the art market, the two seemingly unrelated industries, art, and finance have increasingly close cooperation due to the growing prosperity of the art market. As a very important part of the process of art financialization, the development of art banks has also received extensive attention from all walks of life. In addition, blockchain, as a technology to jointly maintain reliable databases through trustlessness and decentralization, has grown rapidly in recent years, and is gradually applied in various fields. The advantages of blockchain technology are decentralization, anonymity, immutability, and traceability of stored information. The proposed scheme applies the characteristics of blockchain technology to Art Bank’s art rental system, and will have the following advantages: the use of Hyperledger technology, various art banks being merged into an alliance, and information among alliance members being shared, which is convenient for tenants to comprehensively query a single item. Using blockchain technology, in an environment where there is no central authority, under the premise of preventing the tampering of artwork-related information, ensures that the detailed information of the artwork is shared. Traditional leasing agreements can be compiled into smart contract leasing contracts to automatically run and manipulate data. The proposed protocol satisfies the following security requirements: identities’ mutual authentication, non-repudiation between every two parties, and other major security requirements based on blockchain. When a dispute arises, our proposed scheme also has an arbitration mechanism to clarify responsibilities.

1. Introduction

1.1. Background

An art bank refers to a professional bank that invests in artworks. It is a financial investment institution with art investment as its core asset. The main business of Art Bank is to realize investment income through the use of the art trading market. From the origin of art banks, it is inevitable.
First, there is huge financial support. Driven by financial liberalization, internationalization, and financial innovation in the international market, a large amount of hot money has emerged. Every day, nearly USD 1000 billion in hot money is seeking a home in the world market. If the government uses part of the national savings to invest in art, it is also a huge sum of money, which can provide huge financial support to the art bank [1,2].
Second, there is a wide range of social needs. To date, many businesses and entrepreneurs have increasingly favored the use of art investment as a business strategy due to art investment with a very strong advertising effect. In the eyes of the public, the palace of art is sacred, and elegant investments can leave a deep impression on the hearts of consumers.
In addition, art investment is conducive to the construction of spiritual civilization and the development of social welfare undertakings. Thus, it is easily spread by the news media, and its publicity effect is not only an advertisement, but is better than an advertisement. It can be seen that the use of art investment as a business strategy can not only establish a good cultural image for enterprises and show strong economic strength to society but also promote the popularization and development of art. It will also bring good economic benefits to the enterprise through good social benefits [3,4].
Finally, an art collection can maintain and increase its value. The world-famous oil painting “Mona Lisa” was bought by King Francis of France in 1517 for 492 taels of gold (equivalent to USD 270,000) and is now worth hundreds of millions of dollars. In the international art market, the works of artists recognized by connoisseurs generally increase in value by 30% to 50%, and some even as high as several hundred percent [5].
Therefore, it is often referred to as “soft gold” around the world. With the development of the social economy, the demand for artworks will continue to increase, and artworks are generally scarce and irreplaceable, and price increases become inevitable.
Another important function of the art bank is to absorb and make profits through the bank’s operating model. First of all, the art bank formed by shareholder investors’ equity participation and investment, absorbs the works of many art collectors in the society to the art bank and then uses the methods of selling and leasing artworks to make profits. The absorption of artworks from individuals or legal entities in society can be achieved through various channels, such as purchasing artworks with value-added potential from individuals and legal entities in society to achieve the purpose of increasing capital. For individuals or legal entities who are willing to deposit their artworks in art banks, a certain interest rate is granted to art collectors to maintain the number of collections, so that they can lease artworks to enterprises and government departments for display and collect rent [6,7].
Through the explanation of the above content, we can realize that the current generation is an information age, where information has a very high value. The current world is a society where the big ones are always big. When a company has a leading position in a certain field, it may become the dominant company in that field. Before discussing art rentals, let us try to discuss housing rentals. When a housing rental company has a large enough inventory, it may become a seller-led state. Leasing companies are free to change rental prices and control or even monopolize the housing rental market [8,9,10].
In the existing housing rental environment, the Internet usually only provides a basic introduction to housing and cannot fully record the rental process. If the lessee is interested in a certain house item, he/she will contact the landlord and sign a lease contract with the landlord to protect each other’s rights and interests. When the lessee pays the rent to the landlord, it is also possible to use a third-party payment tool, which cannot achieve an irreversible transaction process and cannot completely preserve the transaction records generated during the lease period. Therefore, in the existing housing rental environment, it is inevitable that there will be lease disputes between the landlord and the tenant. These conditions that exist in the housing rental environment also exist in the rental environment of high-priced artworks [11,12,13,14].
In recent years, the emerging technology of blockchain has been shown to resolve the shortcomings of the current leasing environment (whether it is art or housing). Being centralized and controlled by large leasing companies means that the leasing process cannot be open and transparent. Blockchain uses peer-to-peer technology, which can provide the advantage of decentralization. The workload proof of blockchain technology can ensure that the information stored in each block will not be easily tampered with. In addition, blockchain technology also extends the application of smart contracts. A smart contract is a program script suitable for the decentralized architecture of the blockchain. When a specific condition in the smart contract is triggered, subsequent related programs will automatically be executed to complete the overall script [15,16,17,18]. For research on the application of blockchain technology in the business environment, Chen et al. also proposed related research [19] based on blockchain for the anti-switch package issue of commercial transactions.
The proposed scheme applies the characteristics of blockchain technology to Art Bank’s artwork rental system, and obtains the following advantages [20,21,22,23,24]:
  • Using the Hyperledger technology, the various art banks are combined into a single alliance, and information among alliance members can be shared, which facilitates the integrated query of a single entry by the renter.
  • Use blockchain technology to ensure that the details of artwork information are shared under the premise of preventing the tampering of artwork-related information in an environment without a central authority.
  • Compile traditional lease agreements into smart contract lease contracts to automatically run and operate data.
  • When a lease dispute occurs, a third-party arbitration institution can conduct a fair arbitration judgment based on the information stored in the blockchain.

1.2. Problem Formulation

This research will apply blockchain technology, combined with smart contracts for automatic script control, and propose an art rental system. Like lots of blockchain-related studies proposed by researchers in the past [25,26,27,28,29,30,31,32,33,34,35], the architecture and communication protocols proposed in this study must meet the following goals:
(1)
Decentralization and information sharing: Under the decentralized environment framework of the blockchain, all nodes in the environment have the same rights and obligations, and can store and share information. Therefore, data errors or failure shutdowns of a few nodes in the environment will not affect the operation of the entire blockchain network.
(2)
Openness: The blockchain has a public key system. We can use the private key to encrypt private information, and allow others to query and verify the correctness of the open blockchain data through the public key. In the blockchain environment, blockchain data will be open and transparent, reducing public distrust caused by information asymmetry. Through the open data of the blockchain architecture, the related applications of big data and cloud computing can be improved.
(3)
Privacy and access control: Even with the application of blockchain technology, extremely high levels of privacy can be achieved. Blockchain technology can also combine public key encryption and access control. Only allowed members can access and verify data. This is the concept of a consortium chain or private chain. Different from the public chain, through the alliance chain or private chain, only members in the chain can access the data and combine it with smart contracts for automatic script control.
(4)
Mutual authentication: Mutual authentication is a basic security verification condition in the field of information security. This is used to confirm whether a certain framework or communication protocol can verify the legitimacy of the identities of the communication parties. In the related research of researchers, Burrows–Abadi–Needham (BAN) logic proof is often used to judge whether the architecture or communication protocol has realized the mutual authentication of the communication parties.
(5)
Verifiable: Verifiability refers to a certain architecture or communication protocol. During the communication process, the message sent by the sender will be signed by the sender’s private key. After the message is sent to the receiver, the receiver can use the sender’s public key to verify that the sender’s signature is authentic.
(6)
Integrity and forgery: In related research, to guarantee the integrity of a certain framework or communication protocol during information transmission, a public key system is usually used to ensure that the transmitted information has not been tampered with by malicious persons.
(7)
Traceable: The use of blockchain technology means that information transmission is equal, and all participating nodes in the system have equal rights and obligations, so all nodes can cross-check transaction information on the system. In addition, due to the decentralized nature of blockchain technology, the change records of a certain node on the system will be saved by other nodes, achieving traceability.
(8)
Non-repudiation: The blockchain system has undeniable characteristics. After the information transmitted in the system is verified by a certain role and transmitted to the blockchain, the information will be permanently stored. In addition to verifying the correctness of the original message, this information also records the recording time of the message. If we want to change a message on the blockchain, we must change the content of more than half of the nodes in the system at the same time, which will be difficult to achieve under the open system architecture.
(9)
Resist man-in-the-middle attack: A man-in-the-middle attack means that an attacker can intercept a message during sending, and modify or resend an illegal message to the receiver. Under the framework of the blockchain, the message sent by the sender will be signed with its private key, and the attacker cannot obtain the private key of the message sender, so it will be difficult for the attacker to implement a man-in-the-middle attack.
After the background introduction of this study, we organize the rest of the content as follows. The relevant preliminary knowledge to facilitate the understanding of this study will be introduced in Section 2. The detailed architecture and communication protocol proposed in this research will be introduced in Section 3. For the communication protocol proposed in this research, we analyzed the characteristics and security of the blockchain, which will be introduced in Section 4. For the communication protocol proposed in this study, the analysis of the related computational cost and the related communication cost, and the comparison with the existing blockchain research related to leasing, will be introduced in Section 5. Last, the conclusion of this research and future work will be presented in Section 6.

2. Preliminary

2.1. Smart Contract

In 1996, Nick Szabo [36,37] proposed a smart contract, which is a program script for realizing intelligent automatic control in blockchain technology. Smart contracts are controlled by program logic, triggering program codes through specific conditions in the system, and automatically executing the complete program content under the conditions. Through smart contracts, both roles in a transaction can complete a traceable and irreversible transaction without the intervention of a third party. Smart contracts can also support an automatic verification mechanism. When both parties want to verify the transaction, they can also trigger the smart contract to execute the program content of specific conditions to implement a transparent and reliable transaction verification mechanism.

2.2. ECDSA

Vanstone [38,39] proposed the Elliptic Curve Digital Signature Algorithm (ECDSA) in 1992. It is a derivative of the Digital Signature Algorithm (DSA) using Elliptic Curve Cryptography (ECC). The characteristics of ECC make ECDSA require a significantly smaller key size and the same security level, thereby providing faster calculations and less storage space. The security of the elliptic curve digital signature algorithm (ECDSA) is based on the discrete logarithm problem.
Next, we briefly describe the three phases of ECDSA key generation for verification:
Key generation phase: We assume that any participant must apply to our blockchain center for public and private keys, the key generation with ECDSA is as follows: Q x = d x G , where x is the participant ID, Q x is the public key, d x is the private key, and G is a generating point based on the elliptic curve. The public key Q x and private key d x are sent to the participant and stored. Q x will also be stored in the blockchain center.
Signature phase: Assume that there is a message needed to be sent by participant x to y. x chooses a random number k between 1 and n-1, and calculates a point on the curve as follows ( x , y ) = k × G . Then r x = x mod n is calculated. Next, x signs message m as follows: s i g x = k 1 ( h ( m ) + r x d x ) , sending ( m , r x , s i g x ) to y. Verification phase: When y receives ( m , r x , s i g x ) , calculated parameters are as follows: ( x , y ) = ( h ( m ) s i g x 1 mod n ) G + ( r x s i g x 1 mod n ) Q x . Then, x = ? r x mod n is verified to determine if the signature is valid.

2.3. BAN Logic

BurrowsAbadiNeedham (BAN) logic [40,41] was proposed by Burrows et al. in 1990. BAN logic is belief logic, and the purpose of BAN logic is to analyze authentication protocols by deriving beliefs. Therefore, it is suitable to define and analyze whether the communication parties have reached mutual authentication during the communication process.

2.4. Hyperledger Fabric

Blockchains are mainly divided into public blockchains, private blockchains, and consortium blockchains. The data of the public chain is completely open, and all participating nodes can obtain the data, which is not suitable for private transactions; the private chain is too centralized and only suitable for the internal data management of a single organization; and the alliance chain is the most flexible one, and as long as the participating nodes can form a consortium, the data will only circulate in this alliance, and Hyperledger Fabric is a kind of alliance chain blockchain. Hyperledger Fabric is an open-source system. This project was created and managed by the Linux Foundation, which is committed to creating a transparent, secure, and decentralized enterprise-level blockchain solution [42,43,44]. Compared with public chains and private chains, Hyperledger Fabric has lower computing costs, high efficiency, architectural flexibility, scalability, and confidentiality.

3. The Proposed Scheme

3.1. System Architecture

This research proposed an artwork rental system based on blockchain technology. The main roles of the framework include Certificate Authority, Blockchain Center, Art Bank, Insurance Company, Bank, and Licensee. The system architecture is shown in Figure 1.
Step 1: Certificate Authority (CA), Art Bank (AB), Insurance Company (IC), Bank (BK), and Licensee (LE) must first register with the Blockchain Center to obtain the public and private keys for information encryption and decryption, and also Elliptic Curve Digital Signature Algorithm (ECDSA) signature key.
Step 2: A large number of Art Banks form a consortium for resource exchange and sharing. The licensee finds the collection that he/she wants to rent through an integrated query, and then contacts the Art Bank. The licensee informs of the artwork to be rented, as well as the time and place of display, and Art Bank replies with the value certificate and rent of the artwork, as well as the payment account to the licensee. All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 3: The licensee informs the Insurance Company that he/she wants to rent artwork from Art Bank and provides the value certificate of the artwork. After the Insurance Company confirms, it informs the insurance amount that can be provided, insurance cost, and payment account number. All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 4: The licensee pays through the bank, which includes the rent paid to Art Bank and the insurance fee paid to the Insurance Company. The bank will send the relevant payment receipt back to the licensee. All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 5: The licensee informs Art Bank that the rent and insurance fees have been paid, and provides relevant payment receipts. Art Bank verifies whether the payment receipt provided by the licensee is consistent with the information in the Blockchain Center, and if confirmed, will rent the artwork in accordance with the licensee’s requirements. All relevant information is uploaded to the Blockchain Center through Certificate Authority.

3.2. Notation

The following is the notation of this research:
qA k-bit prime number
GF(q)A finite group q
EAn elliptic curve that is defined on the finite group q
GA generating point that is based on the elliptic curve E
PKxAn asymmetric public key of role x
SKxAn asymmetric private key of role x
IDxA name that represents identity x
kx-yA random value which on the elliptic curve of x to y
(rx-y, sx-y)An elliptic curve signature value of x to y
Mx-yA message that is transmitted from x to y
IDBCAn index value of the blockchain information
BCx-yBlockchain information of x to y
TSx-yA timestamp message of x to y
Δ T Checks that if the difference between two timestamps is less than a specified timestamp
E P K x ( M ) Encrypt an information M using the asymmetric public key of x
D S K x ( M ) Decrypt an information M using the asymmetric private key of x
Encx-yEncrypted information that uses the asymmetric key of x to y
CertxA certificate of role x that conforms to the X.509 standard
BKxA bank account of role x
RTxA payment receipt of role x
ABxAn artwork rent contract of role x
ABTIDA transaction number that is issued by an art bank
ICxAn artwork insurance contract of role x
ICTIDA transaction number which is issued by an insurance company
h(.)A hash function
A = ? B A judgmental that verifies whether A is equal to B

3.3. Registration Phase

The system role X can represent the Certificate Authority (CA), Licensee (LE), Art Bank (AB), Insurance Company (IC), and Bank (BK). These parties are registered with the Blockchain Center (BCC), which then obtain a digital certificate of identity and a relative public/private key pair from the BCC via a secure channel. The flowchart of the registration phase is shown in the following Figure 2.
Step 1: An identity I D X is generated by role X, and is sent to the blockchain center.
Step 2: An ECDSA private key d X , which is based on role X, is generated by the blockchain center, and
Q X = d X G
is calculated. Then, IDx,Certx,PKx,SKx,(dx,Qx) will be transmitted to role X by the blockchain center.
Step 3: Finally, (Certx,PKx,SKx,dx,Qx) is stored by role X.

3.4. Smart Contract Initialization

In our proposed architecture, we apply blockchain technology. During the authentication and authorization process, some key information is saved and verified through the BCC. Also, in the smart contract, we define the key information in the blockchain. The blockchain smart contract structure for the proposed scheme is shown in the following Figure 3.
In our proposed smart contract, we develop some key information that is stored in the blockchain. In each smart contract, we present the basic fields of ID (identification), certificate, transaction detail, and timestamp. The artwork rental contract is added in the AB_LEinf/LE_BKinf/LE_ABinf smart contract, while the artwork insurance contract is added in the IC_LEinf/LE_BKinf/LE_ABinf smart contract. At last, the payment receipt is shown in the BK_LEinf/LE_ABinf smart contract. The public and private key pairs for all roles are also issued by the blockchain center in the registration phase.

3.5. ECDSA Authentication Process

In our proposed scheme, before the beginning of the communication, system role A and role B must first verify the legitimacy of each other’s identities through the ECDSA mechanism. System role A or role B can represent the Certificate Authority (CA), Licensee (LE), Art Bank (AB), Insurance Company (IC), and Bank (BK). The flowchart of the ECDSA authentication process is shown in the following Figure 4. The ECDSA signature process is shown in the following Algorithm 1, and the ECDSA verification process is shown in the following Algorithm 2.
Step 1: A random value k α β is generated by role A,
t o k e n = h ( I D α , M α β , T S α β )
is calculated, ( t o k e n , k α β , d α ) is passed to the signature process of Algorithm 1, and ( r α β , s α β ) is obtained.
E n c α β = E P K β ( I D α , M α β , T S α β )
is calculated, and I D α , E n c α β , ( r α β , s α β ) is sent to role B.
Algorithm 1. Role A and role B’s ECDSA signature process
str   t o k e n , k α β , d α ;
func   signature   process   ( t o k e n , k α β , d α )
z α β = t o k e n ;
( x α β , y α β ) = k α β G ;
r α β = x α β mod n ;
s α β = k α β 1 ( z α β + r α β d α ) mod n ;
rtn   ( r α β , s α β ) ;
Step 2:
( I D A , M A B , T S A B ) = D S K B ( E n c A B )
is first calculated by role B, T S N O W T S α β Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D α , M α β , T S α β )
is calculated, the verification process by ( t o k e n , r α β , s α β , Q α ) as Algorithm 2 is called, and a result of valid/invalid is obtained.
Algorithm 2. Role A and role B’s ECDSA verification process
str   t o k e n , r α β , s α β , Q α ;
func   verification   process   ( t o k e n , r α β , s α β , Q α )
z α β = t o k e n ;
u α β 1 = z α β s α β 1 mod n ;
u α β 2 = r α β s α β 1 mod n ;
  ( x α β , y α β ) = u α β 1 G + u α β 2 Q α ;
chk   if   x α β = r α β mod n ;
rtn   Valid / Invalid ;
A random value k β α is generated by role B, and
t o k e n = h ( I D β , M β α , T S β α )
is calculated, ( t o k e n , k β α , d β ) is sent to the signature process, and ( r β α , s β α ) is obtained.
E n c β α = E P K α ( I D β , M β α , T S β α )
is calculated, and I D β , E n c β α , ( r β α , s β α ) sent to role A.
Step 3:
( I D β , M β α , T S β α ) = D S K α ( E n c β α )
is first calculated by role A, T S N O W T S β α Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D β , M β α , T S β α )
is calculated, the ( t o k e n , r β α , s β α , Q β ) is passed to the verification process, and a result of valid/invalid is obtained.

3.6. CA Communication Process

The Hyperledger blockchain architecture is applied in our proposed method, increasing the role of CA, which allows more flexible access control, and also reduces the burden of BCC. The data will be sent to their respective CA after verifying communication between each role, and then the blockchain data will be transmitted to the BCC through each CA. For example, all Art Banks have their own CA, which can ensure the data sharing of each CA member, as well as cross-CA access control, taking into account privacy and efficiency. A different member of Art Banks can be represented by the Access Party (AP). The flowchart of the CA communication process is shown in the following Figure 5.
Step 1: A random value k A P C A is generated by AP,
t o k e n = h ( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C )
is calculated, the ECDSA signature process by ( t o k e n , k A P C A , d A P ) is called, and ( r A P C A , s A P C A ) is obtained.
E n c A P C A = E P K C A ( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C )
is calculated, and I D A P , E n c A P C A , ( r A P C A , s A P C A ) sent to CA.
Step 2:
( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C ) = D S K C A ( E n c A P C A )
is first calculated by CA, T S N O W T S A P C A Δ T is used to confirm whether the timestamp is valid, C e r t A P is verified with P K A P , and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C )
is calculated, the verification process by ( t o k e n , r A P C A , s A P C A , Q A P ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from AP will be received by CA and the smart contracts AP_CAins and AP_CAchk will be triggered. Algorithm 3 is presented as follows:
Algorithm 3. The proposed scheme’s smart contract AP_CAins and AP_CAchk
func ins SC AP_CAins (str APid, str APdetail, str APcert, str APtsp) {
  cnt ++;
  AP[cnt].id = id;
  AP[cnt].detail = detail;
  AP[cnt].cert = cert;
  AP[cnt].tsp = tsp;
}
sign str APkey (APid, APdetail, APcert, APtsp);
verify str APkey (APid, APdetail, APcert, APtsp);
func chk SC AP_CAchk (str APid, str APdetail, str APcert, str APtsp) {
  rtn APid.exist;
  rtn APdetail.exist;
  rtn APcert.exist;
  rtn APtsp.exist;
}
B C A P C A = h ( r A P C A , s A P C A )
is calculated by CA, ( I D B C , B C A P C A ) and will also be uploaded to the blockchain center. Then, a random value k C A A P is generated by CA, and
t o k e n = h ( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C )
is calculated, the ECDSA signature process by ( t o k e n , k C A A P , d C A ) is called and ( r C A A P , s C A A P ) is obtained.
E n c C A A P = E P K A P ( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C )
is calculated, and I D C A , E n c C A A P , ( r C A A P , s C A A P ) is sent to AP.
Step 3:
( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C ) = D S K A P ( E n c C A A P )
is first calculated by AP, T S N O W T S C A A P Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C )
is calculated, the verification process by ( t o k e n , r C A A P , s C A A P , Q C A ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from AP will be received by CA and the smart contracts CA_APins and CA_APchk will be triggered. Algorithm 4 is presented as follows:
Algorithm 4. The proposed scheme’s smart contract CA_APins and CA_APchk
func ins SC CA_APins (str CAid, str CAdetail, str CAcert, str CAtsp) {
  cnt ++;
  CA[cnt].id = id;
  CA[cnt].detail = detail;
  CA[cnt].cert = cert;
  CA[cnt].tsp = tsp;
}
sign str CAkey (CAid, CAdetail, CAcert, CAtsp);
verify str CAkey (CAid, CAdetail, CAcert, CAtsp);
func chk SC CA_APchk (str CAid, str CAdetail, str CAcert, str CAtsp) {
  rtn CAid.exist;
  rtn CAdetail.exist;
  rtn CAcert.exist;
  rtn CAtsp.exist;
}
B C C A A P = h ( r C A A P , s C A A P )
is calculated by AP, and ( I D B C , B C C A A P ) will also be uploaded to the blockchain center.

3.7. Artwork Rental Phase

The licensee (LE) finds the collection that he/she wants to rent through an integrated query, and then contacts the Art Bank (AB). The LE informs AB which artwork is to be rented, as well as the time and place of display. The AB will first verify the identity of the LE and replies with the value certificate and rent of the artwork, as well as the payment account to the LE. The LE should then apply for insurance from the insurance company, and pay the artwork rent and insurance costs through the bank. We present the flowchart of the artwork rental phase in Figure 6.
Step 1: A random value k L E A B is generated by LE,
t o k e n = h ( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C )
is calculated, the signature process by ( t o k e n , k L E A B , d L E ) is called ( r L E A B , s L E A B ) is obtained,
E n c L E A B = E P K A B ( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C )
is calculated, and I D L E , E n c L E A B , ( r L E A B , s L E A B ) is sent to AB.
Step 2:
( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C ) = D S K A B ( E n c L E A B )
is first calculated by AB, T S N O W T S L E A B Δ T is used to confirm whether the timestamp is valid, C e r t L E is verified with P K L E , and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C )
is calculated, the verification process by ( t o k e n , r L E A B , s L E A B , Q L E ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from LE will be received by AB, and the smart contracts LE_ABins and LE_ABchk will be triggered. Algorithm 5 is presented as follows:
Algorithm 5. The proposed scheme’s smart contract LE_ABins and LE_ABchk
func ins SC LE_ABins (str LEid, str LEdetail, str LEcert, str LEtsp) {
  cnt ++;
  LE[cnt].id = id;
  LE[cnt].detail = detail;
  LE[cnt].cert = cert;
  LE[cnt].tsp = tsp;
}
sign str LEkey (LEid, LEdetail, LEcert, LEtsp);
verify str LEkey (LEid, LEdetail, LEcert, LEtsp);
func chk SC LE_ABchk (str LEid, str LEdetail, str LEcert, str LEtsp) {
  rtn LEid.exist;
  rtn LEdetail.exist;
  rtn LEcert.exist;
  rtn LEtsp.exist;
}
B C L E A B = ( r L E A B , s L E A B )
is calculated by AB, ( I D B C , B C L E A B ) and will also be uploaded to the blockchain center. Then, a random value k A B L E is generated by AB, and
t o k e n = h ( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C )
is calculated, the signature process by ( t o k e n , k A B L E , d A B ) is called, and ( r A B L E , s A B L E ) is obtained.
E n c A B L E = E P K L E ( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C )
is calculated, the CA communication process is called, and I D A B , E n c A B L E , ( r A B L E , s A B L E ) is sent to LE.
Step 3:
( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C ) = D S K L E ( E n c A B L E )
is first calculated by LE, T S N O W T S A B L E Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C )
is calculated, the verification process by ( t o k e n , r A B L E , s A B L E , Q L E ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from AB will be received by LE and the smart contracts AB_LEins and AB_LEchk will be triggered. Algorithm 6 is presented as follows:
Algorithm 6. The proposed scheme’s smart contract AB_LEins and AB_LEchk
func ins SC AB_LEins (str ABid, str ABdetail, str ABcert, str AB_LEABtid, str ABtsp) {
  cnt ++;
  AB[cnt].id = id;
  AB[cnt].detail = detail;
  AB[cnt].cert = cert;
  AB[cnt].LEABtid = LEABtid;
  AB[cnt].tsp = tsp;
}
sign str ABkey (ABid, ABdetail, ABcert, AB_LEABtid, ABtsp);
verify str ABkey (ABid, ABdetail, ABcert, AB_LEABtid, ABtsp);
func chk SC AB_LEchk (str ABid, str ABdetail, str ABcert, str AB_LEABtid, str ABtsp) {
  rtn ABid.exist;
  rtn ABdetail.exist;
  rtn ABcert.exist;
  rtn AB_LEABtid.exist;
rtn ABtsp.exist;
}
B C A B L E = ( r A B L E , s A B L E )
is calculated by LE, and ( I D B C , B C A B L E ) will also be uploaded to the blockchain center.

3.8. Insurance Insured Phase

After the licensee (LE) and art bank (AB) negotiate an artwork rental contract, the LE must ensure the artwork from the insurance company (IC). The IC will confirm the rent contract between the LE and AB, and inform the LE of the insurance content and the insurance fees that need to be paid. We present the flowchart of the insurance insured phase in Figure 7.
Step 1: A random value k L E I C is generated by the LE,
t o k e n = h ( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C )
is calculated, the signature process by ( t o k e n , k L E I C , d L E ) is called, and ( r L E I C , s L E I C ) is obtained.
E n c L E I C = E P K I C ( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C )
is calculated, and I D L E , E n c L E I C , ( r L E I C , s L E I C ) is sent to the IC.
Step 2:
( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C ) = D S K I C ( E n c L E I C )
is first calculated by the IC, T S N O W T S L E I C Δ T is used to confirm whether the timestamp is valid, C e r t L E is verified with P K L E , and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C )
is calculated, the verification process by ( t o k e n , r L E I C , s L E I C , Q L E ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from the LE will be received by the IC, and the smart contracts LE_ICins and LE_Icchk are triggered. Algorithm 7 is presented as follows:
Algorithm 7. The proposed scheme’s smart contract LE_Icins and LE_Icchk
func ins SC LE_Icins (str Leid, str Ledetail, str Lecert, str Letsp) {
  cnt ++;
  LE[cnt].id = id;
  LE[cnt].detail = detail;
  LE[cnt].cert = cert;
  LE[cnt].tsp = tsp;
}
sign str Lekey (Leid, Ledetail, Lecert, Letsp);
verify str Lekey (Leid, Ledetail, Lecert, Letsp);
func chk SC LE_Icchk (str Leid, str Ledetail, str Lecert, str Letsp) {
  rtn Leid.exist;
  rtn Ledetail.exist;
  rtn Lecert.exist;
  rtn Letsp.exist;
}
B C L E I C = ( r L E I C , s L E I C )
Is calculated by the IC, and ( I D B C , B C L E I C ) will also be uploaded to the blockchain center. Then, a random value k I C L E is generated by the IC, and
t o k e n = h ( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C )
is calculated. The signature process by ( t o k e n , k I C L E , d I C ) is called, ( r I C L E , s I C L E ) is obtained,
E n c I C L E = E P K L E ( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C )
is calculated, the CA communication process is called, and I D I C , E n c I C L E , ( r I C L E , s I C L E ) is sent to LE.
Step 3:
( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C ) = D S K L E ( E n c I C L E )
is first calculated by the LE, T S N O W T S I C L E Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C )
is calculated, the verification process by ( t o k e n , r I C L E , s I C L E , Q I C ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from the IC will be received by LE, and the smart contracts IC_LEins and IC_Lechk will be triggered. Algorithm 8 is presented as follows:
Algorithm 8. The proposed scheme’s smart contract IC_Leins and IC_Lechk
func ins SC IC_Leins (str Icid, str Icdetail, str Iccert, str IC_LEICtid, str Ictsp) {
  cnt ++;
  IC[cnt].id = id;
  IC[cnt].detail = detail;
  IC[cnt].cert = cert;
  IC[cnt].LEICtid = LEICtid;
  IC[cnt].tsp = tsp;
}
sign str Ickey (Icid, Icdetail, Iccert, IC_LEICtid, Ictsp);
verify str Ickey (Icid, Icdetail, Iccert, IC_LEICtid, Ictsp);
func chk SC IC_Lechk (str Icid, str Icdetail, str Iccert, str IC_LEICtid, str Ictsp) {
  rtn Icid.exist;
  rtn Icdetail.exist;
  rtn Iccert.exist;
  rtn IC_LEICtid.exist;
  rtn Ictsp.exist;
}
B C I C L E = ( r I C L E , s I C L E )
is calculated by LE, and ( I D B C , B C I C L E ) will also be uploaded to the blockchain center.

3.9. Bank Payment Phase

After the licensee (LE) and art bank (AB) negotiate an artwork rental contract, the LE also completes the insurance of the artwork with the insurance company (IC). The LE then pays through the Bank (BK), which includes the rent paid to the AB and the insurance fee paid to the IC. The BK will send the relevant payment receipt back to the LE. We present the flowchart of the bank payment phase in Figure 8.
Step 1: A random value k L E B K is generated by the LE,
t o k e n = h ( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C )
is calculated, the signature process by ( t o k e n , k L E B K , d L E ) is called, ( r L E B K , s L E B K ) is obtained,
E n c L E B K = E P K B K ( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C )
is calculated, and I D L E , E n c L E B K , ( r L E B K , s L E B K ) is sent to the BK.
Step 2:
( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C ) = D S K B K ( E n c L E B K )
is first calculated by the BK, T S N O W T S L E B K Δ T is used to confirm whether the timestamp is valid, C e r t L E is verified with P K L E , and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C )
is calculated, the verification process by ( t o k e n , r L E B K , s L E B K , Q L E ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from the LE will be received by the BK, and the smart contracts LE_BKins and LE_BKchk are triggered. Algorithm 9 is presented as follows:
B C L E B K = ( r L E B K , s L E B K )
is calculated by the BK, and ( I D B C , B C L E B K ) will also be uploaded to the blockchain center. Then, a random value k B K L E is generated by the BK, and
t o k e n = h ( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C )
is calculated, the signature process by ( t o k e n , k B K L E , d B K ) is called, ( r B K L E , s B K L E ) is got,
E n c B K L E = E P K L E ( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C )
is calculated, the CA communication process is called, and I D B K , E n c B K L E , ( r B K L E , s B K L E ) is sent to the LE.
Algorithm 9. The proposed scheme’s smart contract LE_BKins and LE_BKchk
func ins SC LE_BKins (str LEid, str LEdetail, str LEcert, str LE_LEABtid, str LE_LEICtid, str LEtsp) {
  cnt ++;
  LE[cnt].id = id;
  LE[cnt].detail = detail;
  LE[cnt].cert = cert;
  LE[cnt].LEABtid = LEABtid;
  LE[cnt].LEICtid = LEICtid;
  LE[cnt].tsp = tsp;
}
sign str LEkey (LEid, LEdetail, LEcert, LE_LEABtid, LE_LEICtid, LEtsp);
verify str LEkey (LEid, LEdetail, LEcert, LE_LEABtid, LE_LEICtid, LEtsp);
func chk SC LE_BKchk (str LEid, str LEdetail, str LEcert, str LE_LEABtid, str LE_LEICtid, str LEtsp) {
  rtn LEid.exist;
  rtn LEdetail.exist;
  rtn LEcert.exist;
  rtn LE_LEABtid.exist;
  rtn LE_LEICtid.exist;
  rtn LEtsp.exist;
}
Step 3:
( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C ) = D S K L E ( E n c B K L E )
is first calculated by the LE, T S N O W T S B K L E Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C )
is calculated, the verification process by ( t o k e n , r B K L E , s B K L E , Q B K ) is called, and a result of valid/invalid is obtained. If the verification is passed, the message from the BK will be received by the LE, and the smart contracts BK_LEins and BK_LEchk will be triggered. Algorithm 10 is presented as follows:
B C B K L E = ( r B K L E , s B K L E )
is calculated by LE, and ( I D B C , B C B K L E ) will also be uploaded to the blockchain center.

3.10. Contract Fulfillment Phase

After the licensee (LE) pays through the Bank (BK),the relevant payment receipt from the BK is obtained. The LE then informs the Art Bank (AB) that the rent and insurance fees have been paid, and provides relevant payment receipts. The AB verifies whether the payment receipt provided by the LE is consistent with the information in the Blockchain Center, and if it is confirmed, the artwork will be rented in accordance with the licensee’s requirements. We present the flowchart of the bank payment phase in Figure 9.
Algorithm 10. The proposed scheme’s smart contract BK_LEins and BK_LEchk
func ins SC BK_LEins (str BKid, str BKdetail, str BKcert, str BK_LErt, str BKtsp) {
  cnt ++;
  BK[cnt].id = id;
  BK[cnt].detail = detail;
  BK[cnt].cert = cert;
  BK[cnt].LErt = LErt;
  BK[cnt].tsp = tsp;
}
sign str BKkey (BKid, BKdetail, BKcert, BK_LErt, BKtsp);
verify str BKkey (BKid, BKdetail, BKcert, BK_LErt, BKtsp);
func chk SC BK_LEchk (str BKid, str BKdetail, str BKcert, str BK_LErt, str BKtsp) {
  rtn BKid.exist;
  rtn BKdetail.exist;
  rtn BKcert.exist;
  rtn BK_LErt.exist;
  rtn BKtsp.exist;
}
Step 1: A random value k L E A B is generated by the LE,
t o k e n = h ( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C )
is calculated, the signature process by ( t o k e n , k L E A B , d L E ) is called, ( r L E A B , s L E A B ) is got,
E n c L E A B = E P K A B ( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C )
is calculated, and I D L E , E n c L E A B , ( r L E A B , s L E A B ) is sent to the AB.
Step 2:
( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C ) = D S K A B ( E n c L E A B )
is first calculated by the AB, T S N O W T S L E A B Δ T is used to confirm whether the timestamp is valid, C e r t L E is verified with P K L E , and then the correctness of the ECDSA signature is verified.
t o k e n = h ( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C )
is calculated, the verification process by ( t o k e n , r L E A B , s L E A B , Q L E ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from the LE will be received by the AB, and the smart contracts LE_ABins and LE_ABchk are triggered. Algorithm 11 is presented as follows:
B C L E A B = ( r L E A B , s L E A B )
is calculated by the AB, and ( I D B C , B C L E A B ) will also be uploaded to the blockchain center. Then, a random value k A B L E is generated by the AB, and
t o k e n = h ( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C )
is calculated, the signature process is called by ( t o k e n , k A B L E , d A B ) , ( r A B L E , s A B L E ) is obtained,
E n c A B L E = E P K L E ( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C )
is calculated, the CA communication process is called, and then I D A B , E n c A B L E , ( r A B L E , s A B L E ) is sent to the LE.
Step 3:
( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C ) = D S K L E ( E n c A B L E )
is first calculated by the LE, T S N O W T S A B L E Δ T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified,
t o k e n = h ( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C )
is calculated, the verification process by ( t o k e n , r A B L E , s A B L E , Q A B ) is called, and then a result of valid/invalid is obtained. If the verification is passed, the message from the AB will be received by the LE, and the smart contracts AB_LEins and AB_LEchk will be triggered. Algorithm 12 is presented as follows:
Algorithm 11. The proposed scheme’s smart contract LE_ABins and LE_ABchk
func ins SC LE_ABins (str LEid, str LEdetail, str LEcert, str LE_LErt, str LE_LEABtid, str LE_LEICtid, str LEtsp) {
  cnt ++;
  LE[cnt].id = id;
  LE[cnt].detail = detail;
  LE[cnt].cert = cert;
  LE[cnt].LErt = LErt;
  LE[cnt].LEABtid = LEABtid;
  LE[cnt]. LEICtid = LEICtid;
  LE[cnt].tsp = tsp;
}
sign str LEkey (LEid, LEdetail, LEcert, LE_LErt, LE_LEABtid, LE_LEICtid, LEtsp);
verify str LEkey (LEid, LEdetail, LEcert, LE_LErt, LE_LEABtid, LE_LEICtid, LEtsp);
func chk SC LE_ABchk (str LEid, str LEdetail, str LEcert, str LE_LErt, str LE_LEABtid, str LE_LEICtid, str LEtsp) {
  rtn LEid.exist;
  rtn LEdetail.exist;
  rtn LEcert.exist;
  rtn LE_LErt.exist;
  rtn LE_LEABtid.exist;
  rtn LE_LEICtid.exist;
  rtn LEtsp.exist;
}
Algorithm 12. The proposed scheme’s smart contract AB_LEins and AB_LEchk
func ins SC AB_LEins (str ABid, str ABdetail, str ABcert, str ABtsp) {
  cnt ++;
  AB[cnt].id = id;
  AB[cnt].detail = detail;
  AB[cnt].cert = cert;
  AB[cnt].tsp = tsp;
}
sign str ABkey (ABid, ABdetail, ABcert, ABtsp);
verify str ABkey (ABid, ABdetail, ABcert, ABtsp);
func chk SC AB_LEchk (str ABid, str ABdetail, str ABcert, str ABtsp) {
  rtn ABid.exist;
  rtn ABdetail.exist;
  rtn ABcert.exist;
  rtn ABtsp.exist;
}
B C A B L E = ( r A B L E , s A B L E )
is calculated by the LE, and ( I D B C , B C A B L E ) will also be uploaded to the blockchain center.

3.11. Arbitration Mechanism Phase

When there is an argument between the AB, IC, BK, and LE, disputes can be resolved through arbitration. The LE will have appealed to the AI and obtained permission to lease the artwork from the AB, who will have obtained insurance from the IC, and paid the rent and premium, but AB did not provide the artwork as agreed. When the LE requests arbitration from the AI, the AI compares blockchain messages through the signature information to confirm the lease contract. We present the arbitration mechanism verification phase in Figure 10.
Step 1: The certificate, signature, and blockchain data of the package through I D B C can all be downloaded by the AI, and then
B C L E A B = ? ( r L E A B , s L E A B )
and
B C A B L E = ? ( r A B L E , s A B L E )
are verified by the AI. If the verification fails, there is no lease application from the LE to the AB, so AB does not need to provide artwork to the LE.
Step 2: If the signature between the LE and AB, and the blockchain data are all verified and valid, then
B C L E I C = ? ( r L E I C , s L E I C )
and
B C I C L E = ? ( r I C L E , s I C L E )
will be verified by the AI. If the verification fails, the LE is shown to not have purchased insurance from the IC. After the AB comprehensively assesses LE’s financial and credit status and the value of the artwork, the AB has the right to reject the application for the lease of artwork that is not insured. If the LE has paid the rent, the AB shall refund the rent to the LE.
Step 3: If the signature between the LE and the IC, and the blockchain data are all verified and valid, then
B C L E B K = ? ( r L E B K , s L E B K )
and
B C B K L E = ? ( r B K L E , s B K L E )
will be verified by the AI. If the verification fails, the LE has applied to the AB for the lease of artwork, and has also applied for insurance from the IC, but has not paid the rent and premium, so the AB does not need to provide the artwork to the LE.
Step 4: If the signature between the LE and the BK, and the blockchain data are verified and valid, then the blockchain data are fully verified. The LE has applied to the AB for the lease of artwork, and has also applied for insurance from the IC, and completed the payment of rent and insurance. Therefore, the AB should provide the artwork to the LE in accordance with the lease.

4. Analysis of Advantage and Threat Model

4.1. Decentralization and Information Sharing

In our proposed architecture and communication protocol, messages transmitted in the system will be computed by each role and signed with the role’s private key. The blockchain environment of this study is also defined as the Hyperledger consortium chain environment. Under the framework of the Hyperledger consortium chain, all members in the blockchain must be registered before they can share information. For members in the same Hyperledger consortium chain, the transmission of all node information is open and transparent, that is, a single node in the alliance cannot deceive other nodes. Through such an operation mechanism, we will be able to realize the trust relationship between nodes. Therefore, the scheme proposed in this study has indeed realized the decentralization and information sharing of alliance members.

4.2. Openness

In the architecture and communication protocol proposed in this study, the public key cryptosystem is adopted. Through the public key cryptography system, combined with the operating environment of the consortium chain, information that can be publicly queried and verified can be generated on the chain. When applied to the art leasing environment, information related to art leasing will be open and transparent, reducing information asymmetry and reducing public distrust. In addition, through open and transparent open information, the related applications of big data and cloud computing can also be improved, and the price of art rental will be more reasonable and accurate.

4.3. Privacy and Access Control

This study adopts the alliance chain architecture of blockchain technology and has a public key cryptosystem and access control, which can fully protect the privacy of members. This framework is applied to the art leasing environment. The key art leasing contract will only be eligible to be viewed by both parties to the lease, and other members of the alliance will not be able to access these privacy-protected messages. The query and modification records of the art leasing contract will also be completely stored on the blockchain, which not only protects privacy but also satisfies the relevant characteristics of the blockchain.

4.4. Mutual Authentication

At each communication stage of our proposed scheme, the main purpose of the scheme is to authenticate the private keys of party X and party Y, which includes the Licensee (LE), Bank (BK), Insurance Company (IC), Art Bank (AB), and Certificate Authority (CA).
G1 : X | X x Y X Y
G2 : X | Y | X x Y X Y
G3 : Y | X x X Y Y
G4 : Y | X | X x X Y Y
G5 : X | I D Y
G6 : X | Y | I D Y
G7 : Y | I D X
G8 : Y | X | I D X
Applying the BAN logic to the scheme proposed in this study, the following idealized form is derived:
M1 : ( < I D X , k X Y , T S X Y > P K Y , < H ( I D X , k X Y , T S X Y ) > x X Y )
M2 : ( < I D Y , k Y X , T S Y X > P K X , < H ( I D Y , k Y X , T S Y X ) > x Y X )
We analyze the proposed scheme by making the following assumptions:
A1 : X | # ( k X Y )
A2 : Y | # ( k X Y )
A3 : X | # ( k Y X )
A4 : Y | # ( k Y X )
A5 : X | Y | X x Y X Y
A6 : Y | X | X x X Y Y
A7 : X | Y | I D Y
A8 : Y | X | I D X
According to the assumptions and rules of the BAN logic in each communication stage, the main proof is as follows:
a.
Party Y confirms party X.
We conduct the following declaration through M1 and the seeing rule:
Y ( < I D X , k X Y , T S X Y > P K Y , < H ( I D X , k X Y , T S X Y ) > x X Y )
We conduct the following declaration through A2 and the freshness rule:
Y | # ( < I D X , k X Y , T S X Y > P K Y , < H ( I D X , k X Y , T S X Y ) > x X Y )
We conduct the following declaration through (66), A4, and the message meaning rule:
Y | X | ~ ( < I D X , k X Y , T S X Y > P K Y , < H ( I D X , k X Y , T S X Y ) > x X Y )
We conduct the following declaration through (67), (68), and the nonce verification rule:
Y | X | ( < I D X , k X Y , T S X Y > P K Y , < H ( I D X , k X Y , T S X Y ) > x X Y )
We conduct the following declaration through (69) and the belief rule:
Y | X | X x X Y Y
We conduct the following declaration through (70), A6, and the jurisdiction rule:
Y | X x X Y Y
We conduct the following declaration through (71) and the belief rule:
Y | X | I D X
We conduct the following declaration through (72), A8, and the jurisdiction rule:
Y | I D X
b.
Party X confirms party Y.
We conduct the following declaration through M2 and the seeing rule:
X ( < I D Y , k Y X , T S Y X > P K X , < H ( I D Y , k Y X , T S Y X ) > x Y X )
We conduct the following declaration through A1 and the freshness rule:
X | # ( < I D Y , k Y X , T S Y X > P K X , < H ( I D Y , k Y X , T S Y X ) > x Y X )
We conduct the following declaration through (74), A3, and the message meaning rule:
X | Y | ~ ( < I D Y , k Y X , T S Y X > P K X , < H ( I D Y , k Y X , T S Y X ) > x Y X )
We conduct the following declaration through (75), (76), and the nonce verification rule:
X | Y | ( < I D Y , k Y X , T S Y X > P K X , < H ( I D Y , k Y X , T S Y X ) > x Y X )
We conduct the following declaration through (77) and the belief rule:
X | Y | X x Y X Y
We conduct the following declaration through (78), A5, and the jurisdiction rule:
X | X x Y X Y
We conduct the following declaration through (79) and the belief rule:
X | Y | I D Y
We conduct the following declaration through (80), A7, and the jurisdiction rule:
X | I D Y
In our proposed scheme, party X and party Y authentication has been proved through (71), (73), (79), and (81). Furthermore, the proposed scheme can verify the private keys of party X and party Y, which is also provable.
In our proposed scheme, we choose the artwork rental phase for example. The licensee is authenticated by the art bank through x L E A B = ? r L E A B mod n . The legality of the licensee is confirmed by the art bank if the verification has been passed. The art bank is authenticated by the licensee through x A B L E = ? r A B L E mod n . The legality of the art bank is confirmed by the licensee if the verification has been passed. Mutual authentication between the art bank and the licensee is guaranteed in the artwork rental phase of our proposed scheme.

4.5. Verifiable

Digital certificate verification can be publicly used to verify the identity of each role, and authorization information is also public. The openness and transparency of blockchain information can make the art rental field professional and efficient.
Let’s take the message transmitted by the LE and IC as an example. When LE sends a message signed by ECDSA to the IC, the IC first verifies the correctness of the timestamp and signature, then generates blockchain data B C L E I C = ( r P T I C , s P T I C ) , and uses I D B C as an index to upload the blockchain data to the Certificate Authority. In other words, after verifying the correctness of the timestamp and signature of each role receiving the message, the correctness of the blockchain data generated by the previous role is also verified. Thus, the proposed method achieves the characteristics of public verification through the technology of blockchain and the digital signature of ECDSA.

4.6. Integrity and Unforgery

Using a timestamp and signature mechanism, a string of random numbers and letters is irreversibly generated for the data placed in each block. The original text cannot be inferred from the string, which effectively solves the trust problem. After the hash function operation, the message is described as follows.
t o k e n = h ( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C )
t o k e n = h ( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C )
t o k e n = h ( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C )
t o k e n = h ( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C )
t o k e n = h ( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C )
t o k e n = h ( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C )
t o k e n = h ( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C )
t o k e n = h ( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C )
t o k e n = h ( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C )
t o k e n = h ( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C )
The hash value cannot be reversely restored to the original content, so this protocol implements the feature that the message cannot be tampered with.

4.7. Traceable

In the blockchain technology combined with the alliance chain architecture proposed in this research, when the transmitted message is uploaded to the blockchain through the CA, the message will be permanently stored on the blockchain and cannot be tampered with, so it can be applied to follow-up tracking. For example: when we want to verify and trace whether the blockchain data between the LE and BK is legal in the bank payment phase, we can compare and verify B C L E B K = ( r L E B K , s L E B K ) and B C B K L E = ( r B K L E , s B K L E ) . When we want to verify and trace whether the blockchain data between the LE and AB is legal in the contract fulfillment phase, we can compare and verify B C L E A B = ( r L E A B , s L E A B ) and B C A B L E = ( r A B L E , s A B L E ) .

4.8. Non-repudiation

The framework and communication protocol proposed in this research adopts the public key cryptosystem. The sender of the message in the system signs the message with his/her private key. After receiving the message, the receiver of the message will use the sender’s public key to authenticate the message. If the receiver successfully authenticates the message sent by the sender, the sender can no longer deny the message. These messages will also be uploaded to the blockchain for permanent storage. If an attacker wants to modify the content, he/she needs to control more than half of the system nodes, which will be very difficult. An undeniable description of each role in the proposed scheme is shown in the following Table 1.

4.9. Resist Man-in-the-Middle Attack

In the architecture and communication protocol proposed in this study, the public key cryptosystem is adopted, which can effectively prevent man-in-the-middle attacks. All the content transmitted by the sender will be signed with its private key and encrypted with the receiver’s public key. When a malicious person modifies the content transmitted by the sender, because the sender’s private key cannot be used to sign it, the receiver will judge it as an invalid message and successfully block the man-in-the-middle attack.
Scenario: The content from the sender to the receiver is intercepted and tampered with by the attacker before sending it to the receiver.
Analysis: The attacker will fail due to the proposed solution using a public key to encrypt content as follows.
E n c A P C A = E P K C A ( I D A P , M A P C A , C e r t A P , T S A P C A , I D B C )
E n c C A A P = E P K A P ( I D C A , M C A A P , C e r t C A , T S C A A P , I D B C )
E n c L E A B = E P K A B ( I D L E , M L E A B , C e r t L E , T S L E A B , I D B C )
E n c A B L E = E P K L E ( I D A B , M A B L E , C e r t A B , A B T I D , A B L E , T S A B L E , I D B C )
E n c L E I C = E P K I C ( I D L E , M L E I C , C e r t L E , A B L E , T S L E I C , I D B C )
E n c I C L E = E P K L E ( I D I C , M I C L E , C e r t I C , I C T I D , I C L E , T S I C L E , I D B C )
E n c L E B K = E P K B K ( I D L E , M L E B K , C e r t L E , B K L E , A B T I D , I C T I D , T S L E B K , I D B C )
E n c B K L E = E P K L E ( I D B K , M B K L E , C e r t B K , R T L E , A B T I D , I C T I D , T S B K L E , I D B C )
E n c L E A B = E P K A B ( I D L E , M L E A B , C e r t L E , R T L E , A B T I D , I C T I D , T S L E A B , I D B C )
E n c A B L E = E P K L E ( I D A B , M A B L E , C e r t A B , T S A B L E , I D B C )
Malicious attackers do not have the correct private key; thus, they will not be able to obtain the encrypted data. The attacker cannot decrypt and tamper with the message even if he/she intercepts the message. Thus, the attacker cannot modify the message and send it to the receiver in this study.

5. Discussions

5.1. Computation Cost Analysis

In Table 2, the computational costs of each phase are analyzed. The asymmetrical, comparison, hash function, and multiplication operations are applied as the basis for calculating the cost.

5.2. Communication Performance Analysis

In Table 3, the communication performance at each stage is analyzed. The maximum transmission speed is 100 Mbps in a 4G environment, while the maximum transmission speed is 20 Gbps [45] in a 5G environment.

5.3. Efficiency Quantitative Analysis and Estimation

We provide two other research papers by other scholars, one of which conducts quantitative analysis of transactions per second and latency time between Ethereum 1.5.8 and Hyperledger Fabric 0.6, and the other conducts the quantitative analysis of transactions per second and latency time between Hyperledger Fabric 0.6 and Hyperledger Fabric 1.0. The efficiency quantitative analysis and estimation surveys are in Table 4.
According to the performance analysis of 5.1 to 5.3 above, our system will adopt the Hyperledger Fabric 2.0 environment, of which the performance is expected to be greatly improved.

5.4. Characteristic Comparison

In this section, our proposed scheme and existing commerce-related decentralized blockchain surveys are compared in Table 5.

6. Conclusions and Future Work

In recent years, the rise of blockchain technology has completely changed people’s traditional life and thinking patterns, and has spawned many new blockchains, and business models. Blockchain technology will have a major impact and change in all walks of life, including leasing-related industries. This study proposes the complete application of blockchain technology in the field of art leasing, with blockchain technology expected to continue to shine at a higher level in the future.
Through this study, the following goals have been achieved:
(1)
Lease items and prices are open and transparent:
The art banks will form a consortium to jointly register and maintain the information on the artworks. The types of artwork and rental information are open and transparent. The renters can use reasonable rents to rent their favorite artworks, which will increase the renters’ willingness to rent.
(2)
Public investment for mutual benefit and common prosperity:
Usually, the price of art is extremely expensive. Art banks do not have enough funds to buy a large amount of art. At this time, people can be open to investing and subscribing to art. If the art is successfully rented out, the investing public can get profit dividends. Through the non-tampering feature of the blockchain and investors’ trust in the Art Bank is also improved.
(3)
Positive circulation and sustainable operation:
Through blockchain technology, renters can quickly find their favorite artworks due to the convenient search mechanism. Due to the open and transparent rental price, the renters’ willingness to rent will be greatly increased. Investors can check the lease status of the artwork they invest in at any time, and the dividend information is open and transparent, which improves investors’ willingness to invest. Such a positive cycle between the two parties will ensure the sustainable operation of the Art Bank.
Art banks can promote the awakening of art investment awareness and the prosperity of the art market, and the development of the art market will strengthen art investment awareness, thereby promoting the development of art banks. It can be expected that in this interactive relationship between the art bank and the art market, the art bank will go all the way.
The framework and protocols proposed in this article are not only applicable to art leasing, but also housing leasing, and even other leasing-related issues. However, all roles need to register in the blockchain center and obtain the public-private key pair of elliptic curve signatures to use the system in our proposed scheme. In addition, there needs to be an artwork information-sharing platform planned by the government or businesses in the environment.

Author Contributions

D.-C.H., L.-C.L., Y.-Y.D. and C.-L.C. contributed to the study’s conception and design. Material preparation, data collection, and analysis were performed by D.-C.H., L.-C.L., Y.-Y.D. and C.-L.C. The first draft of the manuscript was written by L.-C.L. and Y.-Y.D. and D.-C.H., L.-C.L., Y.-Y.D. and C.-L.C. commented on previous versions of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Ministry of Science and Technology, Taiwan, R.O.C., under contract MOST 111-2218-E-305-001–MBK and contract MOST 110-2410-H-324-004-MY2.

Institutional Review Board Statement

This study is only based on theoretical basic research. It is not involving humans.

Informed Consent Statement

This study is only based on theoretical basic research. It is not involving humans.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Parry, R. Recoding the Museum: Digital Heritage and the Technologies of Change; Routledge: London, UK, 2007; pp. 58–81. [Google Scholar]
  2. Chiou, S.-C.; Wang, Y.-C. The example application of a genetic algorithm for the framework of cultural and creative brand design in Tamsui Historical Museum. Soft Comput. 2018, 22, 2527–2545. [Google Scholar] [CrossRef]
  3. Chang, C.-W.; Wang, S.-I.; Yang, C.-J.; Shao, K.-T. Fish fauna in subtidal waters adjacent to the National Museum of Marine Biology and Aquarium. P1atax 2011, 8, 41–51. [Google Scholar]
  4. Triet, T.M.; Due, D.A. Applying the psychoacoustic audio watermarking technique in internet digital traditional music museum in Vietnam. In Proceedings of the 38th Annual 2004 International Carnahan Conference on Security Technology, Albuquerque, NM, USA, 11–14 October 2004; pp. 285–288. [Google Scholar]
  5. Chen, C.-T.; Lin, K.-D.; Wu, Y.-C.; Lee, K.-L. An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments. In Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, 8–11 October 2006; Volume 3, pp. 1871–1878. [Google Scholar]
  6. Yu, Y.; Dong, Y.; Guo, X. Pricing for sales and per-use rental services with vertical differentiation. Eur. J. Oper. Res. 2018, 270, 586–598. [Google Scholar] [CrossRef]
  7. Yuan, Y.; Wang, F.-Y. Blockchain: The State of the Art and Future Trends. Acta Autom. Sin. 2016, 42, 481–494. [Google Scholar]
  8. Kim, H.; Laskowski, M. A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value Exchange; Social Science Electronic Publishing: Rochester, NY, USA, 2018; pp. 1–6. [Google Scholar]
  9. Cong, W.; He, Z. Blockchain Disruption and Smart Contracts; Social Science Electronic Publishing: Rochester, NY, USA, 2018; pp. 7–10. [Google Scholar]
  10. Li, R.; Shen, W.; Yang, Y.; Zhou, L.; Wang, Y. Design and implementation of housing rental distribution system based on blockchain. Softw. Guide 2019, 18, 111–116. [Google Scholar]
  11. Chen, Q.-L.; Ye, R.-H.; Lin, F.-L. A Blockchain-based Housing Rental System. In Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2019), Xiamen, China, 15–17 March 2019; pp. 184–190. [Google Scholar]
  12. Xue, Q.; Hou, Z.; Ma, H.; Zhu, H.; Ju, X.; Sun, Y. Housing rental system based on blockchain Technology. IoTAIMA 2021, 1948, 012058. [Google Scholar] [CrossRef]
  13. Huang, Z.; Su, B. Research on hierarchical blockchain architecture based on Ethereum. Comput. Appl. Softw. 2020, 37, 16–19. [Google Scholar]
  14. Hong, W.; Wang, Q. Construction and analysis of intelligent contract framework for maritime industry based on blockchain. Logist. Technol. 2020, 43, 97–101. [Google Scholar]
  15. Fu, X.; Wang, H.; Shi, P. A survey of Blockchain consensus algorithms: Mechanism, design and applications. Sci. China Inf. Sci. 2020, 64, 121101. [Google Scholar] [CrossRef]
  16. Pan, J.; Han, D.; Guo, F.; Zheng, W.; Yu, J.; Chen, W. A visual exploration method for bitcoin trading network topology. Software J. 2019, 30, 3017–3025. [Google Scholar]
  17. Pan, W.; Huang, X. Identity management and authentication model based on smart contract. Comput. Eng. Des. 2020, 41, 915–919. [Google Scholar]
  18. Li, F.; Li, J.; Zhen, S.; Zhang, L.-L.; Lu, Y. Market oriented trading model and algorithm of multi microgrid based on smart contract. J. Netw. Inf. Secur. 2020, 6, 56–66. [Google Scholar]
  19. Chen, C.-L.; Deng, Y.-Y.; Weng, W.; Zhou, M.; Sun, H. A blockchain-based intelligent anti-switch package in tracing logistics system. J. Supercomput. 2021, 77, 7791–7832. [Google Scholar] [CrossRef]
  20. Chen, C.-L. A secure and traceable E-DRM system based on mobile device. Expert Syst. Appl. 2008, 35, 878–886. [Google Scholar] [CrossRef]
  21. Chen, C.-L. An all-in-one mobile DRM system design. Int. J. Innov. Comput. Inf. Control 2010, 6, 897–911. [Google Scholar]
  22. Chen, C.-L.; Tsaur, W.-J.; Chen, Y.-Y.; Chang, Y.-C. A secure mobile DRM system based on cloud architecture. Comput. Sci. Inf. Syst. 2014, 11, 925–941. [Google Scholar] [CrossRef]
  23. Zhao, B.; Fang, L.; Zhang, H.; Ge, C.; Meng, W.; Liu, L.; Su, C. Y-DWMS: A digital watermark management system based on smart contracts. Sensors 2019, 19, 3091. [Google Scholar] [CrossRef] [Green Version]
  24. Ma, Z.; Jiang, M.; Gao, H.; Wang, Z. Blockchain for digital rights management. Future Gener. Comput. Syst. 2018, 89, 746–764. [Google Scholar] [CrossRef]
  25. Vishwa, A.; Hussain, F.-K. A blockchain based approach for multimedia privacy protection and provenance. In Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence (SSCI), Bengaluru, India, 18–21 November 2018; pp. 1941–1945. [Google Scholar]
  26. Ma, Z.; Huang, W.; Bi, W.; Gao, H.; Wang, Z. A master-slave blockchain paradigm and application in digital rights management. China Commun. 2018, 15, 174–188. [Google Scholar] [CrossRef]
  27. Lu, Z.; Shi, Y.; Tao, R.; Zhang, Z. Blockchain for digital rights management of design works. In Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 18–20 October 2019; pp. 596–603. [Google Scholar]
  28. Ma, Z. Digital rights management: Model, technology and application. China Commun. 2017, 14, 156–167. [Google Scholar]
  29. Du Toit, J. Protecting private data using digital rights management. J. Inf. Warf. 2018, 17, 64–77. [Google Scholar]
  30. Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
  31. Han, W.; Zhu, Z. An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2014, 27, 1173–1185. [Google Scholar] [CrossRef]
  32. Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Springer: Heidelberg/Berlin, Germany, 2001; pp. 514–532. [Google Scholar]
  33. Chen, C.-L.; Yang, T.-T.; Chiang, M.-L.; Shih, T.-F. A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 2014, 38, 143. [Google Scholar] [CrossRef] [PubMed]
  34. Chen, C.-L.; Yang, T.-T.; Shih, T.-F. A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 2014, 38, 112. [Google Scholar] [CrossRef] [PubMed]
  35. Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1998; pp. 127–144. [Google Scholar]
  36. Szabo, N. Smart contracts: Building blocks for digital markets. Extropy J. Transhumanist Thought 1996, 18, 16. [Google Scholar]
  37. Szabo, N. The Idea of Smart Contracts. 1997. Available online: http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_idea.html (accessed on 25 January 2023).
  38. Vanstone, S. Responses to NIST’s proposal. Commun. ACM 1992, 35, 50–52. [Google Scholar]
  39. Johnson, D.; Menezes, A.; Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
  40. Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
  41. Sierra, J.-M.; Hernández, J.-C.; Alcaide, A.; Torres, J. Validating the Use of Ban Logic; Springer: Berlin/Heidelberg, Germany, 2004; pp. 851–858. [Google Scholar]
  42. Hyperledger Fabric Docs. Available online: https://hlf.readthedocs.io/en/v2.2.0 (accessed on 25 January 2023).
  43. Foschini, L.; Gavagna, A.; Martuscelli, G.; Montanari, R. Hyperledger Fabric Blockchain: Chaincode Performance Analysis. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  44. Uddin, M. Blockchain Medledger: Hyperledger fabric enabled drug traceability system for counterfeit drugs in pharmaceutical industry. Int. J. Pharm. 2021, 597, 120235. [Google Scholar] [CrossRef]
  45. Marcus, M.J. 5G and IMT for 2020 and beyond. IEEE Wirel. Commun. 2015, 22, 2–3. [Google Scholar] [CrossRef]
  46. Pongnumkul, S.; Siripanpornchana, C.; Thajchayapong, S. Performance Analysis of Private Blockchain Platforms in Varying Workloads. In Proceedings of the 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada, 31 July–3 August 2017. [Google Scholar] [CrossRef]
  47. Nasir, Q.; Qasse, I.A.; Talib, M.A.; Nassif, A.B. Performance Analysis of Hyperledger Fabric Platforms. Secur. Commun. Netw. Hindawi 2018, 2018, 3976093. [Google Scholar] [CrossRef] [Green Version]
Figure 1. System architecture diagram.
Figure 1. System architecture diagram.
Symmetry 15 00341 g001
Figure 2. Registration phase.
Figure 2. Registration phase.
Symmetry 15 00341 g002
Figure 3. Smart contract structure of the proposed scheme.
Figure 3. Smart contract structure of the proposed scheme.
Symmetry 15 00341 g003
Figure 4. ECDSA authentication process.
Figure 4. ECDSA authentication process.
Symmetry 15 00341 g004
Figure 5. CA communication process.
Figure 5. CA communication process.
Symmetry 15 00341 g005
Figure 6. Artwork rental phase.
Figure 6. Artwork rental phase.
Symmetry 15 00341 g006
Figure 7. Insurance Insured Phase.
Figure 7. Insurance Insured Phase.
Symmetry 15 00341 g007
Figure 8. Bank payment phase.
Figure 8. Bank payment phase.
Symmetry 15 00341 g008
Figure 9. Contract fulfilment phase.
Figure 9. Contract fulfilment phase.
Symmetry 15 00341 g009
Figure 10. The arbitration mechanism verification phase.
Figure 10. The arbitration mechanism verification phase.
Symmetry 15 00341 g010
Table 1. Non-repudiation of the proposed scheme.
Table 1. Non-repudiation of the proposed scheme.
ItemSignatureSenderReceiverSignature Verification
Phase
CA communication process ( r A P C A , s A P C A ) APCA x A P C A = ? r A P C A mod n
( r C A A P , s C A A P ) CAAP x C A A P = ? r C A A P mod n
Artwork rental phase ( r L E A B , s L E A B ) LEAB x L E A B = ? r L E A B mod n
( r A B L E , s A B L E ) ABLE x A B L E = ? r A B L E mod n
Insurance insured phase ( r L E I C , s L E I C ) LEIC x L E I C = ? r L E I C mod n
( r I C L E , s I C L E ) ICLE x I C L E = ? r I C L E mod n
Bank payment phase ( r L E B K , s L E B K ) LEBK x L E B K = ? r L E B K mod n
( r B K L E , s B K L E ) BKLE x B K L E = ? r B K L E mod n
Contract fulfillment phase ( r L E A B , s L E A B ) LEAB x L E A B = ? r L E A B mod n
( r A B L E , s A B L E ) ABLE x A B L E = ? r A B L E mod n
Table 2. Computation costs of the proposed scheme.
Table 2. Computation costs of the proposed scheme.
PartyLEABICBK
Phase
Artwork rental phase 2 T a s y + 2 T c m p + 2 T h + 7 T m u l 2 T a s y + 2 T c m p + 2 T h + 7 T m u l N / A N / A
Insurance insured phase 2 T a s y + 2 T c m p + 2 T h + 7 T m u l N / A 2 T a s y + 2 T c m p + 2 T h + 7 T m u l N / A
Bank payment phase 2 T a s y + 2 T c m p + 2 T h + 7 T m u l N / A N / A 2 T a s y + 2 T c m p + 2 T h + 7 T m u l
Contract fulfillment phase 2 T a s y + 2 T c m p + 2 T h + 7 T m u l 2 T a s y + 2 T c m p + 2 T h + 7 T m u l N / A N / A
Notes: Tasy: An asymmetrical signature/verifying a signature’s time is required. Tcmp: A comparison of the operation’s time is required. Th: A one-way hash function’s time is required. Tmul: A multiplication operation’s time is required.
Table 3. Communication cost of the proposed scheme.
Table 3. Communication cost of the proposed scheme.
PartyMessage LengthRound4G (100 Mbps)5G(20Gbps)
Phase
CA communication process2Tsig + 2Tasy + 5Tohter =
2*384 + 2*1024 +
2*160 = 3136 bits
23136/102,400 = 0.031 ms3136/20,480,000 = 0.15 us
Artwork rental phase2Tsig + 2Tasy + 5Tohter =
2*384 + 2*1024 +
2*160 = 3136 bits
23136/102,400 = 0.031 ms3136/20,480,000 = 0.15 us
Insurance insured phase2Tsig + 2Tasy + 5Tohter
= 2*384 + 2*1024 +
2*160 = 3136 bits
23136/102,400 = 0.031 ms3136/20,480,000 = 0.15 us
Bank payment phase2Tsig + 2Tasy + 5Tohter =
2*384 + 2*1024 +
2*160 = 3136 bits
23136/102,400 = 0.031 ms3136/20,480,000 = 0.15 us
Contract fulfillment phase2Tsig + 2Tasy + 5Tohter =
2*384 + 2*1024 +
2*160 = 3136 bits
23136/102,400 = 0.031 ms3136/20,480,000 = 0.15 us
Notes: Tsig: To transmit an ECDSA signature’s (384 bits) time required. Tasy: To transmit an asymmetric message’s (1024 bits) time required. Tohter: To transmit information’s (160 bits) time required.
Table 4. Efficiency quantitative analysis and estimation surveys.
Table 4. Efficiency quantitative analysis and estimation surveys.
AuthorsYearItemSystemTransactions per Block/Second
10100100010,000
Pongnumkul et al. [46]2017ThroughputEthereum 1.5.827.4938.9334.4020.60
Hyperledger Fabric 0.668.02299.85251.02159.76
LatencyEthereum 1.5.80.242.1525.95484.78
Hyperledger Fabric 0.60.110.171.9934.08
Nasir et al. [47]2018ThroughputHyperledger Fabric 0.6116.69183.86155158.25
Hyperledger Fabric 1.044174185169
LatencyHyperledger Fabric 0.60.0840.525.1846.147
Hyperledger Fabric 1.00.0220.2051.3710.97
Table 5. Comparison of the proposed and existing commerce-related decentralized blockchain surveys.
Table 5. Comparison of the proposed and existing commerce-related decentralized blockchain surveys.
AuthorsYearObjective123456
Chen et al. [11]2019Proposed a blockchain-based housing rental systemYNAYNAYNA
Chen et al. [19]2020Proposed a blockchain-based intelligent anti-switch package in tracing logistics systemYNAYYYY
Xue et al. [12]2021Proposed a housing rental system based on blockchain technologyYNANANAYNA
Our scheme2022Proposed an artwork rental system based on blockchain technologyYYYYYY
Notes: 1: Blockchain-focused scheme, 2: Arbitration mechanism ready, 3: Detail protocol proposed, 4: Defend against attacks, 5: Identity is traceable, 6: Security analysis proposed. NA: Not Available, Y: Yes.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, D.-C.; Liu, L.-C.; Deng, Y.-Y.; Chen, C.-L. An Artwork Rental System Based on Blockchain Technology. Symmetry 2023, 15, 341. https://doi.org/10.3390/sym15020341

AMA Style

Huang D-C, Liu L-C, Deng Y-Y, Chen C-L. An Artwork Rental System Based on Blockchain Technology. Symmetry. 2023; 15(2):341. https://doi.org/10.3390/sym15020341

Chicago/Turabian Style

Huang, Der-Chen, Ling-Chun Liu, Yong-Yuan Deng, and Chin-Ling Chen. 2023. "An Artwork Rental System Based on Blockchain Technology" Symmetry 15, no. 2: 341. https://doi.org/10.3390/sym15020341

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop