An Artwork Rental System Based on Blockchain Technology

: In recent years, due to the slowdown of the global economy and the instability of the stock market and real estate market, the art market has gradually become the third-largest investment market after the former two. As more and more funds ﬂow into the art market, the two seemingly unrelated industries, art, and ﬁnance have increasingly close cooperation due to the growing prosperity of the art market. As a very important part of the process of art ﬁnancialization, the development of art banks has also received extensive attention from all walks of life. In addition, blockchain, as a technology to jointly maintain reliable databases through trustlessness and decentralization, has grown rapidly in recent years, and is gradually applied in various ﬁelds. The advantages of blockchain technology are decentralization, anonymity, immutability, and traceability of stored information. The proposed scheme applies the characteristics of blockchain technology to Art Bank’s art rental system, and will have the following advantages: the use of Hyperledger technology, various art banks being merged into an alliance, and information among alliance members being shared, which is convenient for tenants to comprehensively query a single item. Using blockchain technology, in an environment where there is no central authority, under the premise of preventing the tampering of artwork-related information, ensures that the detailed information of the artwork is shared. Traditional leasing agreements can be compiled into smart contract leasing contracts to automatically run and manipulate data. The proposed protocol satisﬁes the following security requirements: identities’ mutual authentication, non-repudiation between every two parties, and other major security requirements based on blockchain. When a dispute arises, our proposed scheme also has an arbitration mechanism to clarify responsibilities.


Introduction 1.Background
An art bank refers to a professional bank that invests in artworks.It is a financial investment institution with art investment as its core asset.The main business of Art Bank is to realize investment income through the use of the art trading market.From the origin of art banks, it is inevitable.
First, there is huge financial support.Driven by financial liberalization, internationalization, and financial innovation in the international market, a large amount of hot money has emerged.Every day, nearly USD 1000 billion in hot money is seeking a home in the world market.If the government uses part of the national savings to invest in art, it is also a huge sum of money, which can provide huge financial support to the art bank [1,2].
Second, there is a wide range of social needs.To date, many businesses and entrepreneurs have increasingly favored the use of art investment as a business strategy due to art investment with a very strong advertising effect.In the eyes of the public, the palace of art is sacred, and elegant investments can leave a deep impression on the hearts of consumers.
In addition, art investment is conducive to the construction of spiritual civilization and the development of social welfare undertakings.Thus, it is easily spread by the news media, and its publicity effect is not only an advertisement, but is better than an advertisement.It can be seen that the use of art investment as a business strategy can not only establish a good cultural image for enterprises and show strong economic strength to society but also promote the popularization and development of art.It will also bring good economic benefits to the enterprise through good social benefits [3,4].
Finally, an art collection can maintain and increase its value.The world-famous oil painting "Mona Lisa" was bought by King Francis of France in 1517 for 492 taels of gold (equivalent to USD 270,000) and is now worth hundreds of millions of dollars.In the international art market, the works of artists recognized by connoisseurs generally increase in value by 30% to 50%, and some even as high as several hundred percent [5].
Therefore, it is often referred to as "soft gold" around the world.With the development of the social economy, the demand for artworks will continue to increase, and artworks are generally scarce and irreplaceable, and price increases become inevitable.
Another important function of the art bank is to absorb and make profits through the bank's operating model.First of all, the art bank formed by shareholder investors' equity participation and investment, absorbs the works of many art collectors in the society to the art bank and then uses the methods of selling and leasing artworks to make profits.The absorption of artworks from individuals or legal entities in society can be achieved through various channels, such as purchasing artworks with value-added potential from individuals and legal entities in society to achieve the purpose of increasing capital.For individuals or legal entities who are willing to deposit their artworks in art banks, a certain interest rate is granted to art collectors to maintain the number of collections, so that they can lease artworks to enterprises and government departments for display and collect rent [6,7].
Through the explanation of the above content, we can realize that the current generation is an information age, where information has a very high value.The current world is a society where the big ones are always big.When a company has a leading position in a certain field, it may become the dominant company in that field.Before discussing art rentals, let us try to discuss housing rentals.When a housing rental company has a large enough inventory, it may become a seller-led state.Leasing companies are free to change rental prices and control or even monopolize the housing rental market [8][9][10].
In the existing housing rental environment, the Internet usually only provides a basic introduction to housing and cannot fully record the rental process.If the lessee is interested in a certain house item, he/she will contact the landlord and sign a lease contract with the landlord to protect each other's rights and interests.When the lessee pays the rent to the landlord, it is also possible to use a third-party payment tool, which cannot achieve an irreversible transaction process and cannot completely preserve the transaction records generated during the lease period.Therefore, in the existing housing rental environment, it is inevitable that there will be lease disputes between the landlord and the tenant.These conditions that exist in the housing rental environment also exist in the rental environment of high-priced artworks [11][12][13][14].
In recent years, the emerging technology of blockchain has been shown to resolve the shortcomings of the current leasing environment (whether it is art or housing).Being centralized and controlled by large leasing companies means that the leasing process cannot be open and transparent.Blockchain uses peer-to-peer technology, which can provide the advantage of decentralization.The workload proof of blockchain technology can ensure that the information stored in each block will not be easily tampered with.In addition, blockchain technology also extends the application of smart contracts.A smart contract is a program script suitable for the decentralized architecture of the blockchain.When a specific condition in the smart contract is triggered, subsequent related programs will automatically be executed to complete the overall script [15][16][17][18].For research on the application of blockchain technology in the business environment, Chen et al. also proposed related research [19] based on blockchain for the anti-switch package issue of commercial transactions.
Using the Hyperledger technology, the various art banks are combined into a single alliance, and information among alliance members can be shared, which facilitates the integrated query of a single entry by the renter.b.
Use blockchain technology to ensure that the details of artwork information are shared under the premise of preventing the tampering of artwork-related information in an environment without a central authority.c.
Compile traditional lease agreements into smart contract lease contracts to automatically run and operate data.d.
When a lease dispute occurs, a third-party arbitration institution can conduct a fair arbitration judgment based on the information stored in the blockchain.

Problem Formulation
This research will apply blockchain technology, combined with smart contracts for automatic script control, and propose an art rental system.Like lots of blockchain-related studies proposed by researchers in the past [25][26][27][28][29][30][31][32][33][34][35], the architecture and communication protocols proposed in this study must meet the following goals: (1) Decentralization and information sharing: Under the decentralized environment framework of the blockchain, all nodes in the environment have the same rights and obligations, and can store and share information.Therefore, data errors or failure shutdowns of a few nodes in the environment will not affect the operation of the entire blockchain network.(2) Openness: The blockchain has a public key system.We can use the private key to encrypt private information, and allow others to query and verify the correctness of the open blockchain data through the public key.In the blockchain environment, blockchain data will be open and transparent, reducing public distrust caused by information asymmetry.Through the open data of the blockchain architecture, the related applications of big data and cloud computing can be improved.(3) Privacy and access control: Even with the application of blockchain technology, extremely high levels of privacy can be achieved.Blockchain technology can also combine public key encryption and access control.Only allowed members can access and verify data.This is the concept of a consortium chain or private chain.Different from the public chain, through the alliance chain or private chain, only members in the chain can access the data and combine it with smart contracts for automatic script control.(4) Mutual authentication: Mutual authentication is a basic security verification condition in the field of information security.This is used to confirm whether a certain framework or communication protocol can verify the legitimacy of the identities of the communication parties.In the related research of researchers, Burrows-Abadi-Needham (BAN) logic proof is often used to judge whether the architecture or communication protocol has realized the mutual authentication of the communication parties.(5) Verifiable: Verifiability refers to a certain architecture or communication protocol.
During the communication process, the message sent by the sender will be signed by the sender's private key.After the message is sent to the receiver, the receiver can use the sender's public key to verify that the sender's signature is authentic.(6) Integrity and forgery: In related research, to guarantee the integrity of a certain framework or communication protocol during information transmission, a public key system is usually used to ensure that the transmitted information has not been tampered with by malicious persons.(7) Traceable: The use of blockchain technology means that information transmission is equal, and all participating nodes in the system have equal rights and obligations, so all nodes can cross-check transaction information on the system.In addition, due to the decentralized nature of blockchain technology, the change records of a certain node on the system will be saved by other nodes, achieving traceability.(8) Non-repudiation: The blockchain system has undeniable characteristics.After the information transmitted in the system is verified by a certain role and transmitted to the blockchain, the information will be permanently stored.In addition to verifying the correctness of the original message, this information also records the recording time of the message.If we want to change a message on the blockchain, we must change the content of more than half of the nodes in the system at the same time, which will be difficult to achieve under the open system architecture.(9) Resist man-in-the-middle attack: A man-in-the-middle attack means that an attacker can intercept a message during sending, and modify or resend an illegal message to the receiver.Under the framework of the blockchain, the message sent by the sender will be signed with its private key, and the attacker cannot obtain the private key of the message sender, so it will be difficult for the attacker to implement a man-in-the-middle attack.
After the background introduction of this study, we organize the rest of the content as follows.The relevant preliminary knowledge to facilitate the understanding of this study will be introduced in Section 2. The detailed architecture and communication protocol proposed in this research will be introduced in Section 3.For the communication protocol proposed in this research, we analyzed the characteristics and security of the blockchain, which will be introduced in Section 4. For the communication protocol proposed in this study, the analysis of the related computational cost and the related communication cost, and the comparison with the existing blockchain research related to leasing, will be introduced in Section 5. Last, the conclusion of this research and future work will be presented in Section 6.

Smart Contract
In 1996, Nick Szabo [36,37] proposed a smart contract, which is a program script for realizing intelligent automatic control in blockchain technology.Smart contracts are controlled by program logic, triggering program codes through specific conditions in the system, and automatically executing the complete program content under the conditions.Through smart contracts, both roles in a transaction can complete a traceable and irreversible transaction without the intervention of a third party.Smart contracts can also support an automatic verification mechanism.When both parties want to verify the transaction, they can also trigger the smart contract to execute the program content of specific conditions to implement a transparent and reliable transaction verification mechanism.

ECDSA
Vanstone [38,39] proposed the Elliptic Curve Digital Signature Algorithm (ECDSA) in 1992.It is a derivative of the Digital Signature Algorithm (DSA) using Elliptic Curve Cryptography (ECC).The characteristics of ECC make ECDSA require a significantly smaller key size and the same security level, thereby providing faster calculations and less storage space.The security of the elliptic curve digital signature algorithm (ECDSA) is based on the discrete logarithm problem.
Next, we briefly describe the three phases of ECDSA key generation for verification: Key generation phase: We assume that any participant must apply to our blockchain center for public and private keys, the key generation with ECDSA is as follows: Q x = d x G, where x is the participant ID, Q x is the public key, d x is the private key, and G is a generating point based on the elliptic curve.The public key Q x and private key d x are sent to the participant and stored.Q x will also be stored in the blockchain center.
Signature phase: Assume that there is a message needed to be sent by participant x to y. x chooses a random number k between 1 and n-1, and calculates a point on the curve as follows (x, y) = k × G. Then r x = xmodn is calculated.Next, x signs message m as follows: sig x = k −1 (h(m) + r x d x ), sending (m, r x , sig x ) to y. Verification phase: When y receives (m, r x , sig x ), calculated parameters are as follows: (x , y ) = (h(m)sig x −1 modn)G + (r x sig x −1 modn)Q x .Then, x ?= r x modn is verified to determine if the signature is valid.

BAN Logic
Burrows-Abadi-Needham (BAN) logic [40,41] was proposed by Burrows et al. in 1990.BAN logic is belief logic, and the purpose of BAN logic is to analyze authentication protocols by deriving beliefs.Therefore, it is suitable to define and analyze whether the communication parties have reached mutual authentication during the communication process.

Hyperledger Fabric
Blockchains are mainly divided into public blockchains, private blockchains, and consortium blockchains.The data of the public chain is completely open, and all participating nodes can obtain the data, which is not suitable for private transactions; the private chain is too centralized and only suitable for the internal data management of a single organization; and the alliance chain is the most flexible one, and as long as the participating nodes can form a consortium, the data will only circulate in this alliance, and Hyperledger Fabric is a kind of alliance chain blockchain.Hyperledger Fabric is an open-source system.This project was created and managed by the Linux Foundation, which is committed to creating a transparent, secure, and decentralized enterprise-level blockchain solution [42][43][44].Compared with public chains and private chains, Hyperledger Fabric has lower computing costs, high efficiency, architectural flexibility, scalability, and confidentiality.

System Architecture
This research proposed an artwork rental system based on blockchain technology.The main roles of the framework include Certificate Authority, Blockchain Center, Art Bank, Insurance Company, Bank, and Licensee.The system architecture is shown in Figure 1.Step 1: Certificate Authority (CA), Art Bank (AB), Insurance Company (IC), Bank (BK), and Licensee (LE) must first register with the Blockchain Center to obtain the public and private keys for information encryption and decryption, and also Elliptic Curve Digital Signature Algorithm (ECDSA) signature key.
Step 2: A large number of Art Banks form a consortium for resource exchange and sharing.The licensee finds the collection that he/she wants to rent through an integrated query, and then contacts the Art Bank.The licensee informs of the artwork to be rented, as well as the time and place of display, and Art Bank replies with the value certificate and rent of the artwork, as well as the payment account to the licensee.All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 3: The licensee informs the Insurance Company that he/she wants to rent artwork from Art Bank and provides the value certificate of the artwork.After the Insurance Company confirms, it informs the insurance amount that can be provided, insurance cost, and payment account number.All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 4: The licensee pays through the bank, which includes the rent paid to Art Bank and the insurance fee paid to the Insurance Company.The bank will send the relevant payment receipt back to the licensee.All relevant information is uploaded to the Blockchain Center through Certificate Authority.
Step 5: The licensee informs Art Bank that the rent and insurance fees have been paid, and provides relevant payment receipts.Art Bank verifies whether the payment receipt provided by the licensee is consistent with the information in the Blockchain Center, and if confirmed, will rent the artwork in accordance with the licensee's requirements.All relevant information is uploaded to the Blockchain Center through Certificate Authority.

Notation
The following is the notation of this research: A finite group q E An elliptic curve that is defined on the finite group q G A generating point that is based on the elliptic curve E PK x An asymmetric public key of role x SK x An asymmetric private key of role x ID x A name that represents identity x k x-y A random value which on the elliptic curve of x to y (r x-y , s x-y ) An elliptic curve signature value of x to y M x-y A message that is transmitted from x to y ID BC An index value of the blockchain information BC x-y

Blockchain information of x to y TS x-y
A timestamp message of x to y ∆T Checks that if the difference between two timestamps is less than a specified timestamp Encrypt an information M using the asymmetric public key of x D SK x (M) Decrypt an information M using the asymmetric private key of x Enc x-y Encrypted information that uses the asymmetric key of x to y Cert x A certificate of role x that conforms to the X.509 standard An artwork rent contract of role x AB TID A transaction number that is issued by an art bank IC x

An artwork insurance contract of role x IC TID
A transaction number which is issued by an insurance company h(.) A hash function A judgmental that verifies whether A is equal to B

Registration Phase
The system role X can represent the Certificate Authority (CA), Licensee (LE), Art Bank (AB), Insurance Company (IC), and Bank (BK).These parties are registered with the Blockchain Center (BCC), which then obtain a digital certificate of identity and a relative public/private key pair from the BCC via a secure channel.The flowchart of the registration phase is shown in the following Figure 2. Step 1: An identity ID X is generated by role X, and is sent to the blockchain center.
Step 2: An ECDSA private key d X , which is based on role X, is generated by the blockchain center, and is calculated.Then, ID x ,Cert x ,PK x ,SK x ,(d x ,Q x ) will be transmitted to role X by the blockchain center.
Step 3: Finally, (Cert x ,PK x ,SK x, d x ,Q x ) is stored by role X.

Smart Contract Initialization
In our proposed architecture, we apply blockchain technology.During the authentication and authorization process, some key information is saved and verified through the BCC.Also, in the smart contract, we define the key information in the blockchain.The blockchain smart contract structure for the proposed scheme is shown in the following Figure 3.
In our proposed smart contract, we develop some key information that is stored in the blockchain.In each smart contract, we present the basic fields of ID (identification), certificate, transaction detail, and timestamp.The artwork rental contract is added in the AB_LEinf/LE_BKinf/LE_ABinf smart contract, while the artwork insurance contract is added in the IC_LEinf/LE_BKinf/LE_ABinf smart contract.At last, the payment receipt is shown in the BK_LEinf/LE_ABinf smart contract.The public and private key pairs for all roles are also issued by the blockchain center in the registration phase.

ECDSA Authentication Process
In our proposed scheme, before the beginning of the communication, system role A and role B must first verify the legitimacy of each other's identities through the ECDSA mechanism.System role A or role B can represent the Certificate Authority (CA), Licensee (LE), Art Bank (AB), Insurance Company (IC), and Bank (BK).The flowchart of the ECDSA authentication process is shown in the following Figure 4.The ECDSA signature process is shown in the following Algorithm 1, and the ECDSA verification process is shown in the following Algorithm 2.
Step 1: A random value k α−β is generated by role A, is calculated, (token, k α−β , d α ) is passed to the signature process of Algorithm 1, and (r α−β , s α−β ) is obtained.
is calculated, and ID α ,   Step 2: is first calculated by role B, TS NOW − TS α−β ≤ ∆T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
is calculated, the verification process by (token, A random value k β−α is generated by role B, and is calculated, (token, k β−α , d β ) is sent to the signature process, and (r β−α , s β−α ) is obtained.
Step 3: is first calculated by role A, TS NOW − TS β−α ≤ ∆T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
is calculated, the (token, r β−α , s β−α , Q β ) is passed to the verification process, and a result of valid/invalid is obtained.

CA Communication Process
The Hyperledger blockchain architecture is applied in our proposed method, increasing the role of CA, which allows more flexible access control, and also reduces the burden of BCC.The data will be sent to their respective CA after verifying communication between each role, and then the blockchain data will be transmitted to the BCC through each CA.For example, all Art Banks have their own CA, which can ensure the data sharing of each CA member, as well as cross-CA access control, taking into account privacy and efficiency.A different member of Art Banks can be represented by the Access Party (AP).The flowchart of the CA communication process is shown in the following Figure 5.
Step 1: A random value k AP−CA is generated by AP, token = h(ID AP , M AP−CA , Cert AP , TS AP−CA , ID BC ) (10) is calculated, the ECDSA signature process by (token, k AP−CA , d AP ) is called, and (r AP−CA , s AP−CA ) is obtained.
is calculated, and ID AP , Enc AP−CA , (r AP−CA , s AP−CA ) sent to CA.
Step 2: is first calculated by CA, TS NOW − TS AP−CA ≤ ∆T is used to confirm whether the timestamp is valid, Cert AP is verified with PK AP , and then the correctness of the ECDSA signature is verified.
is calculated, the verification process by (token, r AP−CA , s AP−CA , Q AP ) is called, and then a result of valid/invalid is obtained.If the verification is passed, the message from AP will be received by CA and the smart contracts AP_CAins and AP_CAchk will be triggered.Algorithm 3 is presented as follows: is calculated by CA, (ID BC , BC AP−CA ) and will also be uploaded to the blockchain center.Then, a random value k CA−AP is generated by CA, and is calculated, the ECDSA signature process by (token, k CA−AP , d CA ) is called and (r CA−AP , s CA−AP ) is obtained.
is calculated, and ID CA , Enc CA−AP , (r CA−AP , s CA−AP ) is sent to AP.
Step 3: is first calculated by AP, TS NOW − TS CA−AP ≤ ∆T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
is calculated, the verification process by (token, r CA−AP , s CA−AP , Q CA ) is called, and then a result of valid/invalid is obtained.If the verification is passed, the message from AP will be received by CA and the smart contracts CA_APins and CA_APchk will be triggered.Algorithm 4 is presented as follows: is calculated by AP, and (ID BC , BC CA−AP ) will also be uploaded to the blockchain center.

Artwork Rental Phase
The licensee (LE) finds the collection that he/she wants to rent through an integrated query, and then contacts the Art Bank (AB).The LE informs AB which artwork is to be rented, as well as the time and place of display.The AB will first verify the identity of the LE and replies with the value certificate and rent of the artwork, as well as the payment account to the LE.The LE should then apply for insurance from the insurance company, and pay the artwork rent and insurance costs through the bank.We present the flowchart of the artwork rental phase in Figure 6.Step 1: A random value k LE−AB is generated by LE, is calculated, the signature process by (token, is calculated by AB, (ID BC , BC LE−AB ) and will also be uploaded to the blockchain center.Then, a random value k AB−LE is generated by AB, and token = h(ID AB , M AB−LE , Cert AB , AB TID , AB LE , TS AB−LE , ID BC ) (25) is calculated, the signature process by (token, k AB−LE , d AB ) is called, and (r AB−LE , s AB−LE ) is obtained.
is calculated, the CA communication process is called, and ID AB , Enc AB−LE , (r AB−LE , s AB−LE ) is sent to LE.
Step 3: is first calculated by LE, TS NOW − TS AB−LE ≤ ∆T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified.
is calculated, the verification process by (token, r AB−LE , s AB−LE , Q LE ) is called, and then a result of valid/invalid is obtained.If the verification is passed, the message from AB will be received by LE and the smart contracts AB_LEins and AB_LEchk will be triggered.Algorithm 6 is presented as follows: is calculated by LE, and (ID BC , BC AB−LE ) will also be uploaded to the blockchain center.

Insurance Insured Phase
After the licensee (LE) and art bank (AB) negotiate an artwork rental contract, the LE must ensure the artwork from the insurance company (IC).The IC will confirm the rent contract between the LE and AB, and inform the LE of the insurance content and the insurance fees that need to be paid.We present the flowchart of the insurance insured phase in Figure 7. Step is first calculated by the IC, TS NOW − TS LE−IC ≤ ∆T is used to confirm whether the timestamp is valid, Cert LE is verified with PK LE , and then the correctness of the ECDSA signature is verified.
is calculated, the verification process by (token, r LE−IC , s LE−IC , Q LE ) is called, and then a result of valid/invalid is obtained.If the verification is passed, the message from the LE will be received by the IC, and the smart contracts LE_ICins and LE_Icchk are triggered.Algorithm 7 is presented as follows: Is calculated by the IC, and (ID BC , BC LE−IC ) will also be uploaded to the blockchain center.Then, a random value k IC−LE is generated by the IC, and is calculated.The signature process by (token,

Bank Payment Phase
After the licensee (LE) and art bank (AB) negotiate an artwork rental contract, the LE also completes the insurance of the artwork with the insurance company (IC).The LE then pays through the Bank (BK), which includes the rent paid to the AB and the insurance fee paid to the IC.The BK will send the relevant payment receipt back to the LE.We present the flowchart of the bank payment phase in Figure 8.
Step 1: A random value k LE−BK is generated by the LE, is calculated, the signature process by (token, Step 3: is first calculated by the LE, TS NOW − TS BK−LE ≤ ∆T is used to confirm whether the timestamp is valid, and then the correctness of the ECDSA signature is verified. is calculated, the verification process by (token, r BK−LE , s BK−LE , Q BK ) is called, and a result of valid/invalid is obtained.If the verification is passed, the message from the BK will be received by the LE, and the smart contracts BK_LEins and BK_LEchk will be triggered.Algorithm 10 is presented as follows: is calculated by the LE, and (ID BC , BC AB−LE ) will also be uploaded to the blockchain center.

Arbitration Mechanism Phase
When there is an argument between the AB, IC, BK, and LE, disputes can be resolved through arbitration.The LE will have appealed to the AI and obtained permission to lease the artwork from the AB, who will have obtained insurance from the IC, and paid the rent and premium, but AB did not provide the artwork as agreed.When the LE requests arbitration from the AI, the AI compares blockchain messages through the signature information to confirm the lease contract.We present the arbitration mechanism verification phase in Figure 10.
Step 1: The certificate, signature, and blockchain data of the package through ID BC can all be downloaded by the AI, and then and are verified by the AI.If the verification fails, there is no lease application from the LE to the AB, so AB does not need to provide artwork to the LE.
Step 2: If the signature between the LE and AB, and the blockchain data are all verified and valid, then and will be verified by the AI.If the verification fails, the LE is shown to not have purchased insurance from the IC.After the AB comprehensively assesses LE's financial and credit status and the value of the artwork, the AB has the right to reject the application for the lease of artwork that is not insured.If the LE has paid the rent, the AB shall refund the rent to the LE.
Step 3: If the signature between the LE and the IC, and the blockchain data are all verified and valid, then and will be verified by the AI.If the verification fails, the LE has applied to the AB for the lease of artwork, and has also applied for insurance from the IC, but has not paid the rent and premium, so the AB does not need to provide the artwork to the LE.
Step 4: If the signature between the LE and the BK, and the blockchain data are verified and valid, then the blockchain data are fully verified.The LE has applied to the AB for the lease of artwork, and has also applied for insurance from the IC, and completed the payment of rent and insurance.Therefore, the AB should provide the artwork to the LE in accordance with the lease.

Analysis of Advantage and Threat Model 4.1. Decentralization and Information Sharing
In our proposed architecture and communication protocol, messages transmitted in the system will be computed by each role and signed with the role's private key.The blockchain environment of this study is also defined as the Hyperledger consortium chain environment.Under the framework of the Hyperledger consortium chain, all members in the blockchain must be registered before they can share information.For members in the same Hyperledger consortium chain, the transmission of all node information is open and transparent, that is, a single node in the alliance cannot deceive other nodes.Through such an operation mechanism, we will be able to realize the trust relationship between nodes.Therefore, the scheme proposed in this study has indeed realized the decentralization and information sharing of alliance members.

Openness
In the architecture and communication protocol proposed in this study, the public key cryptosystem is adopted.Through the public key cryptography system, combined with the operating environment of the consortium chain, information that can be publicly queried and verified can be generated on the chain.When applied to the art leasing environment, information related to art leasing will be open and transparent, reducing information asymmetry and reducing public distrust.In addition, through open and transparent open information, the related applications of big data and cloud computing can also be improved, and the price of art rental will be more reasonable and accurate.

Privacy and Access Control
This study adopts the alliance chain architecture of blockchain technology and has a public key cryptosystem and access control, which can fully protect the privacy of members.This framework is applied to the art leasing environment.The key art leasing contract will only be eligible to be viewed by both parties to the lease, and other members of the alliance will not be able to access these privacy-protected messages.The query and modification records of the art leasing contract will also be completely stored on the blockchain, which not only protects privacy but also satisfies the relevant characteristics of the blockchain.

Mutual Authentication
At each communication stage of our proposed scheme, the main purpose of the scheme is to authenticate the private keys of party X and party Y, which includes the Licensee (LE), Bank (BK), Insurance Company (IC), Art Bank (AB), and Certificate Authority (CA).
Applying the BAN logic to the scheme proposed in this study, the following idealized form is derived: We analyze the proposed scheme by making the following assumptions: According to the assumptions and rules of the BAN logic in each communication stage, the main proof is as follows: a.
Party Y confirms party X.
We conduct the following declaration through M1 and the seeing rule: We conduct the following declaration through A2 and the freshness rule: We conduct the following declaration through (66), A4, and the message meaning rule: We conduct the following declaration through (67), (68), and the nonce verification rule: We conduct the following declaration through (69) and the belief rule: We conduct the following declaration through (70), A6, and the jurisdiction rule: We conduct the following declaration through (71) and the belief rule: We conduct the following declaration through (72), A8, and the jurisdiction rule: b.
Party X confirms party Y.
We conduct the following declaration through M2 and the seeing rule: We conduct the following declaration through A1 and the freshness rule: We conduct the following declaration through (74), A3, and the message meaning rule: We conduct the following declaration through (75), (76), and the nonce verification rule: We conduct the following declaration through (77) and the belief rule: We conduct the following declaration through (78), A5, and the jurisdiction rule: the CA, the message will be permanently stored on the blockchain and cannot be tampered with, so it can be applied to follow-up tracking.For example: when we want to verify and trace whether the blockchain data between the LE and BK is legal in the bank payment phase, we can compare and verify BC LE−BK = (r LE−BK , s LE−BK ) and BC BK−LE = (r BK−LE , s BK−LE ).When we want to verify and trace whether the blockchain data between the LE and AB is legal in the contract fulfillment phase, we can compare and verify BC LE−AB = (r LE−AB , s LE−AB ) and BC AB−LE = (r AB−LE , s AB−LE ).

Non-repudiation
The framework and communication protocol proposed in this research adopts the public key cryptosystem.The sender of the message in the system signs the message with his/her private key.After receiving the message, the receiver of the message will use the sender's public key to authenticate the message.If the receiver successfully authenticates the message sent by the sender, the sender can no longer deny the message.These messages will also be uploaded to the blockchain for permanent storage.If an attacker wants to modify the content, he/she needs to control more than half of the system nodes, which will be very difficult.An undeniable description of each role in the proposed scheme is shown in the following Table 1.In the architecture and communication protocol proposed in this study, the public key cryptosystem is adopted, which can effectively prevent man-in-the-middle attacks.All the content transmitted by the sender will be signed with its private key and encrypted with the receiver's public key.When a malicious person modifies the content transmitted by the sender, because the sender's private key cannot be used to sign it, the receiver will judge it as an invalid message and successfully block the man-in-the-middle attack.
Scenario: The content from the sender to the receiver is intercepted and tampered with by the attacker before sending it to the receiver.
Analysis: The attacker will fail due to the proposed solution using a public key to encrypt content as follows.
Malicious attackers do not have the correct private key; thus, they will not be able to obtain the encrypted data.The attacker cannot decrypt and tamper with the message even if he/she intercepts the message.Thus, the attacker cannot modify the message and send it to the receiver in this study.

Computation Cost Analysis
In Table 2, the computational costs of each phase are analyzed.The asymmetrical, comparison, hash function, and multiplication operations are applied as the basis for calculating the cost.

Communication Performance Analysis
In Table 3, the communication performance at each stage is analyzed.The maximum transmission speed is 100 Mbps in a 4G environment, while the maximum transmission speed is 20 Gbps [45] in a 5G environment.

Efficiency Quantitative Analysis and Estimation
We provide two other research papers by other scholars, one of which conducts quantitative analysis of transactions per second and latency time between Ethereum 1.5.8 and Hyperledger Fabric 0.6, and the other conducts the quantitative analysis of transactions per second and latency time between Hyperledger Fabric 0.6 and Hyperledger Fabric 1.0.The efficiency quantitative analysis and estimation surveys are in Table 4.According to the performance analysis of 5.1 to 5.3 above, our system will adopt the Hyperledger Fabric 2.0 environment, of which the performance is expected to be greatly improved.

Characteristic Comparison
In this section, our proposed scheme and existing commerce-related decentralized blockchain surveys are compared in Table 5.

Conclusions and Future Work
In recent years, the rise of blockchain technology has completely changed people's traditional life and thinking patterns, and has spawned many new blockchains, and business models.Blockchain technology will have a major impact and change in all walks of life, including leasing-related industries.This study proposes the complete application of blockchain technology in the field of art leasing, with blockchain technology expected to continue to shine at a higher level in the future.
Through this study, the following goals have been achieved: Due to the open and transparent rental price, the renters' willingness to rent will be greatly increased.Investors can check the lease status of the artwork they invest in at any time, and the dividend information is open and transparent, which improves investors' willingness to invest.Such a positive cycle between the two parties will ensure the sustainable operation of the Art Bank.
Art banks can promote the awakening of art investment awareness and the prosperity of the art market, and the development of the art market will strengthen art investment awareness, thereby promoting the development of art banks.It can be expected that in this interactive relationship between the art bank and the art market, the art bank will go all the way.
The framework and protocols proposed in this article are not only applicable to art leasing, but also housing leasing, and even other leasing-related issues.However, all roles need to register in the blockchain center and obtain the public-private key pair of elliptic curve signatures to use the system in our proposed scheme.In addition, there needs to be an artwork information-sharing platform planned by the government or businesses in the environment.

Figure 3 .
Figure 3. Smart contract structure of the proposed scheme.

( 1 )
Lease items and prices are open and transparent: The art banks will form a consortium to jointly register and maintain the information on the artworks.The types of artwork and rental information are open and transparent.The renters can use reasonable rents to rent their favorite artworks, which will increase the renters' willingness to rent.(2) Public investment for mutual benefit and common prosperity: Usually, the price of art is extremely expensive.Art banks do not have enough funds to buy a large amount of art.At this time, people can be open to investing and subscribing to art.If the art is successfully rented out, the investing public can get profit dividends.Through the non-tampering feature of the blockchain and investors' trust in the Art Bank is also improved.(3) Positive circulation and sustainable operation: Through blockchain technology, renters can quickly find their favorite artworks due to the convenient search mechanism.
Algorithm 2 is called, and a result of valid/invalid is obtained.

Algorithm 3 .
The proposed scheme's smart contract AP_CAins and AP_CAchk func ins SC AP_CAins (str APid, str APdetail, str APcert, str APtsp) BC CA−AP = h(r CA−AP , s CA−AP ) ) is calculated, and ID LE , Enc LE−AB , (r LE−AB , s LE−AB ) is sent to AB.Step 2:(ID LE , M LE−AB , Cert LE , TS LE−AB , ID BC ) = D SK AB (Enc LE−AB ) = h(ID LE , M LE−AB , Cert LE , TS LE−AB , ID BC ) (23)is calculated, the verification process by (token, r LE−AB , s LE−AB , Q LE ) is called, and then a result of valid/invalid is obtained.If the verification is passed, the message from LE will be received by AB, and the smart contracts LE_ABins and LE_ABchk will be triggered.Algorithm 5 is presented as follows: (22)is first calculated by AB, TS NOW − TS LE−AB ≤ ∆T is used to confirm whether the timestamp is valid, Cert LE is verified with PK LE , and then the correctness of the ECDSA signature is verified.token 1: A random value k LE−IC is generated by the LE, token = h(ID LE , M LE−IC , Cert LE , AB LE , TS LE−IC , ID BC ) Enc LE−IC = E PK IC (ID LE , M LE−IC , Cert LE , AB LE , TS LE−IC , ID BC ) (30)is calculated, the signature process by(token, k LE−IC , d LE ) is called, and (r LE−IC , s LE−IC ) is obtained.(31) is calculated, and ID LE , Enc LE−IC , (r LE−IC , s LE−IC ) is sent to the IC.Step 2: (ID LE , M LE−IC , Cert LE , AB LE , TS LE−IC , ID BC ) = D SK IC (Enc LE−IC )

Table 1 .
Non-repudiation of the proposed scheme.

Table 2 .
Computation costs of the proposed scheme.
asy : An asymmetrical signature/verifying a signature's time is required.T cmp : A comparison of the operation's time is required.T h : A one-way hash function's time is required.T mul : A multiplication operation's time is required.

Table 3 .
Communication cost of the proposed scheme.
sig : To transmit an ECDSA signature's (384 bits) time required.T asy : To transmit an asymmetric message's (1024 bits) time required.T ohter : To transmit information's (160 bits) time required.

Table 4 .
Efficiency quantitative analysis and estimation surveys.