Next Article in Journal
Impact on Predictive Performance of Air Pollutants in PV Forecasting Using Multi-Model Ensemble Learning: Evidence from the Port Logistics Hinterland Area
Previous Article in Journal
The Driving Forces of Digital Transformation: Navigating Peer Effects in Industrial and Regional Ecosystems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain Adoption to Fight Counterfeiting at the Source in a Vertically Differentiated Competition

1
College of Economics and Management, Taiyuan University of Technology, Taiyuan 030024, China
2
Shanxi Key Laboratory of Data Factor Innovation and Economic Decision Analysis, Shanxi University of Finance and Economics, Taiyuan 030006, China
3
College of Management, Zhejiang University, Hangzhou 310058, China
*
Author to whom correspondence should be addressed.
Systems 2025, 13(11), 941; https://doi.org/10.3390/systems13110941 (registering DOI)
Submission received: 25 September 2025 / Revised: 18 October 2025 / Accepted: 21 October 2025 / Published: 23 October 2025

Abstract

The proliferation of counterfeit products poses a substantial threat to numerous industries. Blockchain technology (BCT) offers an effective solution for product traceability, providing a means to combat counterfeiting. However, BCT can verify the authenticity of the information but cannot confirm the veracity of the product itself, a problem known as counterfeiting at the source. To our knowledge, this issue has yet to be studied. The security level of BCT traceability is used to indicate its ability to combat counterfeiting. We establish game-theoretical models to investigate BCT adoption strategies for a typically authentic firm and a premium firm to fight counterfeiting in a vertically differentiated competition. This study demonstrates that BCT reduces deceptive counterfeiters’ incentive to pool with the branded firm and mitigates the negative impact of asymmetric information on the prices, market share, and profits of authentic products in a monopoly. In instances where the proportion of counterfeits is substantial, premium products will lose market share, a phenomenon often referred to as “bad money driving out good money.” In a vertically differentiated competition, if the quality of the premium product is below a certain threshold, it is recommended that the premium firm be the first to adopt BCT, while the typically authentic firm should not follow (Scenario NB). That is, Scenario NB is a win-win situation for both firms in the competition. The premium firm that has adopted BCT can offer a “free ride” to the typically authentic firm.

1. Introduction

1.1. Background and Motivation

In the contemporary era, the proliferation of counterfeit products emerged as a significant challenge for numerous industries, including pharmaceuticals, food, jewelry, fashion, and electronics [1]. Examples of such products include fake toys with toxic paint, winter coats without padding, and contaminated cosmetics. The global economy loses over $500 billion a year as a result of counterfeiting (U.S. Chamber of Commerce’s Global Innovation Policy Center Information 2022). These unregulated products do not meet legal or safety standards and may pose a serious threat to the health and safety of consumers.
There are two distinct forms of counterfeiting: (a) non-deceptive counterfeiting, which occurs when customers can distinguish between authentic and counterfeit products, and (b) deceptive counterfeiting, which occurs when customers are unable to distinguish between the two types of products [2]. For example, many counterfeit imitations of designer bags or shoes have distinct external features that can be identified. Nevertheless, deceptive counterfeiting occurs when the counterfeit product appears to be identical to the authentic product and customers are unable to distinguish between the two types of products. This can be observed in the case of many counterfeit foods (e.g., baby formula) and medicines that have the same outer packaging as the authentic product.
The fight against counterfeits is a matter of the utmost importance, necessitating not only the establishment of a collaborative framework between the business community, government, and consumers but also the implementation of efficacious technologies. Conventional technologies include barcodes, RFID tags, and OACTs [3]. However, they can also be copied and printed on copycat products. Compared with traditional technologies, BCT represents a novel information technology, exhibiting distinctive features such as decentralization, transparency, traceability, immutability, data security, and the self-establishment of credit. To combat counterfeit goods, numerous firms adopt BCT for product traceability, such as Walmart, Amazon, JD, and Alibaba in China [4]. For example, the blockchain traceability and authentication system developed by the Ali Group to assist Moutai (a Chinese liquor) can effectively enhance product traceability, authenticity verification, transaction payment, and other services.
Using BCT for traceability guarantees that the information about the product is true, effective, and free from errors before uploading. However, this does not imply that the products are authentic. In other words, BCT cannot guarantee that all the data on the blockchain is from authentic products, i.e., BCT cannot prevent counterfeiting at the source or before uploading the blockchain. To illustrate, the data about Moutai that is incorporated into the BCT traceability system can be authentic and unaltered; however, BCT is unable to guarantee the veracity of the liqueur within the bottle. As a case in point, the valuable herb, Matsutake, is produced in Tibet, China. Initially, it is harvested by farmers and then traced through JD Blockchain. It is important to note that Matsutake inventory entering BCT traceability may contain counterfeit and inferior herbs if they do not undergo strict testing and screening before moving into blockchain traceability. This phenomenon is commonly known as ‘Garbage in, and garbage out.’ Consequently, BCT is unable to entirely prevent counterfeiting at the source. The ability of BCT traceability to resist counterfeits is referred to as the security level of BCT traceability in this paper.

1.2. Research Questions and Innovations

This study examines the adoption strategy of BCT by authentic firms in two markets where deceptive counterfeits exist: a monopoly and a vertically differentiated competitive duopoly. In particular, we address the following research questions (RQs):
RQ 1: In a monopoly, what is the impact of BCT on the pricing, market share, and profits of the authentic firm? Additionally, what is the effect of information asymmetry and the counterfeiter?
RQ 2: In a vertically differentiated competitive duopoly, what are the BCT adoption strategies for authentic and premium firms in the presence of deceptive counterfeits? Is it possible to identify a win-win scenario for them?
RQ 3: What is the impact of BCT on consumer surplus and social welfare? Which scenario benefits consumers?
To answer these questions, we develop analytical models in a monopoly and a vertically differentiated competitive duopoly in the presence of deceptive counterfeits. In a monopoly, we obtain the perfect Bayesian equilibrium of an authentic firm and a deceptive counterfeiter. In a competitive duopoly, we build upon a vertical differentiation model for a typically authentic firm and a premium firm in the presence of deceptive counterfeits. The quality of products produced by a premium firm is higher than that of products produced by a typically authentic firm. The strategies of two authentic firms adopting BCT and the win-win scenario are identified.
Following the identification of the equilibrium decisions in two markets, we obtain the following anti-counterfeiting and BCT adoption strategies: (i) BCT serves to mitigate the adverse impact of asymmetric information on prices, market share, and profits of authentic products; (ii) If the proportion of counterfeit products in a duopoly is considerable, premium products will experience a loss of market share, which leads to the phenomenon of ‘bad money drives out good money’; (iii) In a vertically differentiated competition, when the quality of the premium product is below a threshold, Scenario NB is a win-win situation for both firms, that is, the premium firm adopts BCT, while the typically authentic firm does not. At this point, the premium firm that has adopted BCT can offer a “free ride” to the typically authentic firm.
To summarize, the contribution of this paper is twofold. From a practical perspective, this paper offers a novel perspective on the practical challenges posed by blockchain technology in addressing the issue of counterfeiting. To the best of our knowledge, this is the first study to consider strategies for adopting blockchain technology to combat counterfeiting in a vertically differentiated competition when BCT is not able to completely counteract counterfeits. This study offers managerial insights into the impact of BCT on an authentic firm and a counterfeiter, as well as the BCT adoption strategies of two competing authentic firms, i.e., a typically authentic firm and a premium firm. From an academic perspective, in contradistinction to the paucity of extant studies on the utilization of blockchain technology to combat counterfeiting (Shen et al. [1]), our study considers the adoption strategies for blockchain of two competing firms in the context of deceptive counterfeits being simultaneously mixed into two authentic channels. We obtain perfect Bayesian equilibrium results by analytical analysis. The optimal blockchain adoption strategy for vertically differentiated competitive firms is obtained when blockchain technology is unable to fully counteract counterfeits. Furthermore, this paper presents an innovative examination of the security level of blockchain technology.
We also clarify the scope and boundary conditions up front and provide a roadmap of implementation, equilibrium selection, mechanism explanations, cost thresholds, and policy implications developed in Section 2.4, Section 3.1, Section 3.2, Section 3.3, Section 4, Section 5, Section 6 and Section 6.3.

1.3. Paper Organization

The rest of the paper is organized as follows. Section 2 reviews the related literature. Section 3 presents the model descriptions of markets, products, and consumers. Section 4 analyzes the effect of BCT on a monopoly with deceptive counterfeits. Section 5 provides BCT adoption strategies of two competing authentic firms in a vertically differentiated competition. Section 6 extends the base model in two aspects. Section 7 concludes this paper.

2. Literature Review

We examine the BCT adoption strategies to combat counterfeiting in a monopoly and vertically differentiated competition. Based on the research focus of this paper, we present three related streams of literature as follows.

2.1. Relevant Research on Counterfeits

The issue of counterfeiting has been the subject of academic research since the 1980s. Grossman and Shapiro [5] classify counterfeit products into two categories: non-deceptive and deceptive counterfeits. Non-deceptive counterfeits are those that consumers can distinguish from brand-name products. Deceptive counterfeits exhibit physical characteristics that are nearly indistinguishable from those of authentic products, rendering it impossible for consumers to ascertain whether a product is authentic or counterfeit. The literature on counterfeit goods encompasses a multitude of disciplines, including parallel imports [6], intellectual property rights [7], inventory management [8], and consumers’ behavior [9,10].
To illustrate, Cho et al. [2] compares deceptive and non-deceptive counterfeiters and provide insights into the impact of anti-counterfeiting strategies on a brand-name company, a counterfeiter, and consumers. Furthermore, Qian et al. [11] examine the searchable and experiential dimensions of quality responses to entry by counterfeiters and analyze market equilibria under competition from counterfeiting as well as under monopoly branding. In the context of counterfeit drugs, Gao [3] considers a model in which an authentic firm sells its drug at a reliable source, while counterfeiters sell their drugs at a dubious source, and shows there may be an inverted U-shaped relationship between the complexity of the OACT and the volume of counterfeit drug purchases. In the context of luxury products, Gao et al. [12] develop a game-theoretic model to examine the entry of copycats and its implications and find that copycats with a high physical resemblance, but low product quality are more likely to successfully enter the market.
In summary, the existing literature discusses two main types of counterfeits, non-deceptive and deceptive counterfeits, and describes the characteristics of counterfeits. Based on the existing literature, our work mainly considers deceptive counterfeits and uses the characteristics of counterfeits of existing studies. We also categorize the quality attributes of a product into searchable characteristics and experiential characteristics. Differently, we consider the strategy of genuine companies adopting blockchain technology when deceptive counterfeits are mixed into two genuine channels with quality differences.

2.2. Using Blockchain to Combat Counterfeiting

Blockchain is a decentralized, traceable, multi-party distributed database that has the potential to significantly enhance the security of supply chains [13,14,15,16,17]. The potential of blockchain technology to transform supply chain functions is immense, encompassing supply chain provenance, business process reengineering, consumer demand, and security enhancement [18,19,20,21,22]. For example, Choi et al. [22] believe that blockchain technology helps the firm accurately assess the proportion of risk-seeking, risk-neutral and risk-averse customers; Lu et al. [23] explore the ways in which firms can profit from blockchain traceability with regard to convenience preference products and trust preference products; Choi [24] proposes the implementation of blockchain with cryptocurrency engenders a mutually beneficial scenario for all supply chain agents and consumers; Zhao et al. [25] indicate that prominent e-commerce platforms use blockchain to enhance consumer confidence in product quality; Gupta et al. [26] find that blockchain technology is more effective in facilitating the financial resilience of a supply chain under the moderating influence of environmental dynamism, in comparison with artificial intelligence; Choi et al. [27] investigate the blockchain technology would potentially improve the use of social media analytics for supply chain operations management.
At present, blockchain technology is the focus of extensive research in the field of product traceability. Furthermore, the use of BCT for product traceability can guarantee the veracity of products, thereby deterring the proliferation of counterfeit goods. Specifically, Choi, T. M. [28] proposes that a significant application of blockchain technology lies in the realm of diamond authentication and certification, delves into various consumer-driven operations models, and underscores the merits of blockchain-empowered platforms in facilitating diamond authentication and certification. Subsequently, Shen et al. [1] examine the efficacy of permissioned blockchain technology in combating copycats in the supply chain and show that PBT increases the BNC profit, consumer surplus, and social welfare and reduces the copycat’s profit. Pun et al. [29] examine the effectiveness of blockchain as a solution to combat deceptive counterfeits and find that blockchain should be used when customers have intermediate distrust about products in the market. Furthermore, Zhu et al. [30] focus on whether the powerful brand owner in a dual-channel supply chain should adopt BCT and indicate that the adoption of BCT is always beneficial to the retailer, which creates a “free-rider” issue. Choi and Ouyang [31] propose that blockchain-based product provenance authentication (BPPA) platforms have been developed to assist in the authentication of products such as diamonds and reveal the analytical conditions governing when it is beneficial to use the BPPA platform. In addition, Li et al. [32] explores the interplay between blockchain technology adoption and channel selection in combating counterfeits and examine the impact of this interaction on consumer surplus and social welfare.
To summarize, extant research on the utilization of blockchain technology in the context of counterfeiting reaches a core finding that this technology is capable of guaranteeing the authenticity and verifiability of products, thereby providing a complete counteraction to counterfeiting. Nevertheless, there are instances in current practice where products with blockchain traceability information are found to be counterfeits, highlighting the necessity for further research into the newly emerging issues in commerce. This constitutes a significant research gap in the field.
Our study posits that blockchain can guarantee the authenticity of the data and information of the products on the chain. However, it should be noted that blockchain does not provide any assurance regarding the authenticity of the products entering the channel, which is referred to as “counterfeiting at the source”. This paper presents an innovative examination of the security level of blockchain technology in light of the aforementioned problem. In contrast to existing studies, we focus on combating counterfeits and analyzing strategic options for using blockchain technology to combat counterfeiting in a vertically differentiated competition.

2.3. Vertically Differentiated Competition

This paper is also related to the literature on vertically differentiated competition. Vertically differentiated competition refers to the competition between products or services that vary in quality (Vandenbosch and Weinberg [33]; Kuksov and Lin [34]). This type of competition is prevalent in markets where consumers have different preferences for product quality (Tian et al. [35]). The literature on vertically differentiated competition focuses on various aspects, such as pricing strategies, channel competition, consumer behavior, and the impact of strategic interactions between firms.
Specifically, the extant literature mainly focuses on pricing (Xu et al. [36]; Jing [37]; Tang et al. [38]; Nire and Matsubayashi [39]), product quality (Zhou and Choudhary [40]; Zhao et al. [41]; Guan et al. [42]), channel competition (Lu and Menezes [43]), and service market (Zhou et al. [44]). For example, Li et al. [45] investigates pricing strategies in a competition in which two platforms offer dependent products and identify the impact of message dissemination on pricing strategies. Kwark et al. [46] examine the effect of managerial optimism on firms’ performance in competition and find that managerial optimism about the demand of only one firm can increase both firms’ profits. Xu et al. [47] consider a duopoly supply chain and identify the impact of the horizontal and vertical fairness concerns on the three-party supply chain coordination.
In the research conducted on the adoption of blockchain technology by competing firms, Ye et al. [48] seek to answer whether and under what conditions two competing agri-food supply chains can benefit from the adoption of blockchain technology (BT). The results suggest that the Nash equilibrium outcome for the BT adoption strategy is strongly influenced by key parameters such as the intensity of competition, the growth rate of market size and investment costs with BT adoption, and the planting costs of the agri-food industry. Liu et al. [49] demonstrate that the application of blockchain technology in the certification of the green level of products has the potential to transform the competitive landscape between green and non-green products. Niu et al. [50] find that a brand’s efficient image investment encourages e-tailers to connect to the blockchain system, increasing the genuine product’s market share through enhanced competition with copycats. E-tailers are also more likely to participate if their commission from copycat sales is low and their reselling channel advantage is limited.
In conclusion, scholars examine strategies for the adoption of blockchain technology in different competing scenarios of practical problems. We also study blockchain adoption strategies in competitive scenarios, but our research questions are different from the current research. We focus on how a typically authentic firm, and a premium firm should decide on a blockchain selection strategy when there is a source counterfeiting problem in vertically differentiated competition, i.e., when the blockchain is not able to fully counteract counterfeiting. Our research can provide strategic support for branding companies in current practice.

2.4. Comparison to Closely Related Models

Relative to Shen et al. [1], who study permissioned blockchain to deter copycats in a supply chain, we focus on deceptive counterfeits that can still enter the channel before data capture (“source counterfeiting”) and on vertical quality differentiation between two authentic firms. Pun et al. [29] highlights that blockchain is useful under intermediate distrust; our analysis complements theirs by endogenizing adoption timing in duopoly and showing when NB (premium adopts; standard does not) dominates NN and BB under quality and fee thresholds. Zhu et al. [30] examines dual-channel dominance by a brand owner and document free-rider issues; we obtain a distinct free-ride spillover where the standard firm benefits when the premium rival adopts first (Proposition 6). Finally, Li et al. [32] connect channel selection with blockchain; we hold channels fixed and instead explore source-counterfeit security μ as a lever shaping prices, demands, and welfare across scenarios. Together, these differences clarify the niche our model fills.

3. Model Setup

This section begins by describing the types of markets, the individual market players and products, and consumer utility.

3.1. Markets

This study examines two market structures: a monopoly and a competitive duopoly. There is only one authentic firm a in the monopoly. In the context of a vertically differentiated competitive duopoly, two authentic firms compete for market share. Each firm specializes in the production of either typically authentic products or premium products, which are imperfect substitutes. In the following, these two firms are referred to as a typically authentic firm a 1 and a premium firm a 2 , respectively. Deceptive counterfeit products are present within both markets. These counterfeit products are often designed to match the external characteristics and price points of their authentic counterparts, with the intent of deceiving consumers. However, such products are often of substandard quality, lacking in durability, and sometimes posing health and safety concerns for consumers. Examples of such products include precious Chinese herbs such as Ginseng and Matsutake, wine, tea, and designer bags. The present study focuses exclusively on the issue of deceptive counterfeiting, with relevant examples and references provided herein.
Branded firms can utilize BCT to combat the counterfeiting of products. Given that BCT is unable to eradicate counterfeiting at its source, the present study proposes a novel methodology for evaluating the blockchain’s capacity to resist such illicit activities. The following definition is proposed for the security level of BCT.
Definition 1 
(Security level). The security level of blockchain traceability, μ [ 0 ,   1 ] , is the fraction of source counterfeits blocked from entering the authentic sales channel by the end-to-end traceability and auditing process.
μ = 0   means no protection; μ = 1   means full protection. Implementation-wise, μ increases with the intensity and coverage of upstream inspections, tamper-evident devices, cryptographic anchoring, and smart-contract enforcement. We assume a one-off service fee F μ   that is increasing (and possibly convex) in μ ; the baseline linear form F μ = ϕ μ   is used in Section 4 and Section 5 for tractability without affecting the qualitative comparative statics.
In the context of Bitcoin transactions, the security level of blockchain technology is characterized by its capacity to prevent the occurrence of “double spending,” which refers to the process of attempting to spend the same Bitcoin more than once. The achievement of this security level is facilitated by the utilization of smart contracts within the blockchain. This value is taken as given or exogenous by producers and consumers. In practice, the authentic firm employs a third-party blockchain traceability service, such as JD Blockchain in China.
The security level is contingent upon the capacity of the smart contract protocol to establish a “trusted execution environment.” The automated rules embedded within the protocol are of crucial importance. The incentives for the parties involved are modified, which results in a significant increase in the risk and cost of detection for fraudulent activities. This, in turn, serves to deter counterfeiting at its source. Security does not arise automatically; it is the outcome of a meticulously designed protocol that transforms technical trust (immutability) into commercial trust (transparent processes, clear rewards and penalties). A robust protocol is one which, by virtue of its very nature, significantly reduces the potential for counterfeiting.

3.2. Products

As posited by Qian et al. [11], we also consider that a product incorporates two dimensions of quality: that which is searchable and that which is experiential. Searchable quality is defined as the observable characteristics of a product that are actively sought out at the time of purchase. In contrast, experiential quality encompasses unobservable characteristics such as the comfort, friction, and cushioning effects of shoes, which are unobserved at the time of purchase. Customers can infer experiential quality based on word of mouth, past experiences, searchable quality, and price.
We let product quality be q = ω s q s + ω e q e with ω s , ω e > 0   and ω s + ω e = 1 . Deceptive counterfeits perfectly mimic the searchable component but suffer an experiential discount, q c = ω s q s + ω e δ q e , δ ( 0 ,   1 ) . All results in Section 4 and Section 5 carry over with a re-scaling of coefficients; in particular, price and demand monotonicities and the ranking NN vs. NB vs. BB remain unchanged (proof sketch in Appendix A and Appendix B).
The quality of an authentic product in a monopoly is expressed as q a . In a competitive duopoly, we denote the quality of an authentic product as q a 1 and that of a premium product as q a 2 , and q a 1 < q a 2 . The quality of a deceptive counterfeit is presented as q d .
The quality of an authentic product incorporates a searchable quality s and an experiential quality h , i.e., q a = s + h . The quality of the authentic product is taken as given in the model. As a deceptive counterfeit imitates the authentic product, its quality is q d = s + δ d h , where 0 < δ d < 1 . It has the same searchable quality as the authentic product to confuse consumers. However, a deceptive counterfeit is typically characterized by a lack of perfect experiential quality. Moreover, we exclusively consider marginal costs and do not take into account sunk costs, which do not alter the qualitative implications of the results. We assume physical products have marginal production cost, and the marginal cost is linear with respect to quality, c q i , where 0 < c < 1 2 , which applies to all the results in the paper.

3.3. Consumers

A unit mass of consumers is in the market. Each consumer purchases at most one product. Consumers’ preference for the quality of the product is denoted by θ . Denote the cumulative distribution function of consumers’ taste for the quality as F θ , and the probability density function as f θ . Without loss of generality, assume θ follows a uniform distribution of 0 ,   1 . Relaxing this assumption does not change the results qualitatively but only complicates calculations (Qian et al. [11]). In the model extensions, we further discuss the nonuniform distribution of consumer preference to verify the robustness of the basic model. The utility that a customer consumes one unit of product i is U θ = θ q i p i , where i a , a 1 , a 2 , d and p i is the price of the product i . Table 1 summarizes all the notations.
Remark 1 
(Existence and Uniqueness of the Price Nash Equilibrium). With standard vertically differentiated demand and downward-sloping best responses, the product of best-response slopes below unity yields a contraction mapping, ensuring a unique price Nash equilibrium. Increasing μ does not break contraction: it shifts demand and affects slopes only through second-order terms, so uniqueness and the direction of comparative statics are preserved.

4. Monopoly in the Presence of Counterfeiting

In this study, we examine two scenarios: one in which a branded producer does not adopt BCT traceability and another in which the same producer adopts BCT. Use superscript N to denote no BCT adoption, and B to denote BCT adoption. Given that our principal focus is on deceptive counterfeits, the issue can be conceptualized as a pooling equilibrium. This is because deceptive counterfeits make it difficult for consumers to differentiate between genuine and counterfeit products. Our analysis yields optimal Bayesian equilibrium solutions within the context of a pooling equilibrium.

4.1. No Use of Blockchain

We initially examine the scenario in which the authentic firm does not utilize BCT. In light of the superior quality of the authentic product, the counterfeiter opts for a deceptive strategy, leading to the emergence of pooling equilibrium solutions. For tractability, we assume s = h = 1 2 henceforth in the paper.
The sale of deceptive counterfeits presents a significant challenge for consumers attempting to differentiate between authentic and counterfeit products. This is due to the fact that the searchable qualities and price of the counterfeit products are identical to those of the authentic products, making it difficult for consumers to ascertain whether they are purchasing an authentic product or a counterfeit. This creates an information asymmetry between sellers and consumers. This ultimately leads to uncertainty among consumers regarding the products in question. Similarly to the findings of Qian et al. [11], consumers possess a prior understanding of the likelihood of a product being authentic or counterfeit. We denote the prior probability belief of a counterfeit as λ , and that of the authentic product as 1 λ . Hence, customers have the probability λ of being deceived into purchasing counterfeits and the utility is U θ = 1 λ θ q a p a N + λ θ q d N p a N . The marginal consumer who is indifferent between purchasing a product and not purchasing is denoted by θ N * .
θ N * = p a N s + 1 λ + λ δ d .
An authentic firm’s payoff function is
m a x p a N Π a N = p a N c q a 1 λ 1 θ N * .
A deceptive counterfeiter’s payoff function is
Π d N = p a N c q d λ 1 θ N * .
The equilibrium results are p a N * = 1 4 2 + 2 c λ + λ δ d and Π a N * = 1 λ 2 + 2 c + λ λ δ d 2 8 2 + λ 1 + δ d .
Lemma 1.
In the absence of BCT, the profit of a deceptive counterfeiter is a concave function of the proportion of counterfeits λ .
If the proportion of counterfeits is small, the positive effect on the demand for counterfeits is greater than the negative effect on the price of genuine goods and total demand, and the counterfeiter’s profit increases. If it is large, its negative impact on price and total demand will outweigh its positive impact on the demand for counterfeits, and hence the profit will decrease. Thus, it is not the case that a higher proportion of counterfeits leads to a higher profit for the counterfeiter.

4.2. Use of Blockchain

Welfare is defined as consumer surplus plus firms’ profits net of F ( μ ) ; counterfeiters’ profits are excluded.
When the authentic firm uses BCT, he needs to pay the service fee. In practice, the service fee for the BCT traceability is a one-time payment. Hence, we assume the one-time BCT service fee is ϕ μ ϕ > 0 , where ϕ is a unit service fee and referred to as the payment rate for BCT. The BCT service fee is positively correlated to the security level.
While BCT guarantees the integrity of existing blockchain data, it does not prevent the introduction of counterfeit products at the source. To illustrate, in the context of tracing the provenance of marine fish in a specific marine area, BCT can’t guarantee that all the data on the blockchain originates from high-quality marine fish. Nevertheless, BCT can markedly diminish the incursion of counterfeit products into the supply chain, thereby facilitating the authentication of genuine merchandise.
BCT’s traceability service prevents some counterfeits from entering the blockchain. The proportion of counterfeits on the market is now reduced to λ 1 μ from λ . Therefore, the probability of counterfeits on the market when using BCT is λ ~ = λ 1 μ 1 λ μ , and that of authentic products is 1 λ ~ = 1 λ 1 λ μ . After observing the use of BCT, consumers also update their prior beliefs about the type of product. Thus, a consumer’s utility for the product sold when using BCT is U θ = 1 λ ~ θ q a p a B + λ ~ θ q d B p a B . The marginal consumer who is indifferent between purchasing a product and not purchasing is denoted by θ B * .
m a x p a B Π a B = p a B c q a 1 λ 1 λ μ 1 θ B * ϕ μ .
An authentic firm’s profits are as follows.
m a x p a B Π a B = p a B c q a 1 λ 1 λ μ 1 θ B * ϕ μ .
A deceptive counterfeiter’s payoff function is
Π d B = p a B c q d λ 1 μ 1 λ μ 1 θ B * ϕ μ .
We derive the pooling equilibrium with blockchain use, following a backward approach.
Lemma 2.
With the use of BCT, the price, market share, profits, consumer surplus, and social welfare are as follows.
(a) Price of an authentic product:
p a B * = 2 λ 1 δ d 1 μ + μ + 2 c 1 λ μ 4 4 λ μ .
(b) Market share of an authentic firm:
D a B * = 1 λ K + 2 c 1 λ μ 2 1 λ μ K .
(c) Profits of an authentic firm:
Π a B * = 1 λ 2 2 c λ + λ δ d λ μ 1 2 c + δ d B 2 8 1 λ μ 2 K ϕ μ .
(d) Consumer surplus:
C S B * = 1 λ ~ θ * 1 θ s + h p a B * d θ + λ ~ θ * 1 θ s + δ d h p a B * d θ = H 2 16 1 + λ μ K + 2 λ μ .
(e) Social welfare:
S W B * = H 2 16 1 + λ μ K + 2 λ μ + 1 + λ H 2 8 1 + λ μ 2 K + 2 λ μ ϕ μ .
where  H = 2 c 1 + λ 1 δ d + 1 2 c + δ d λ μ ,   K = 2 λ 1 δ d 1 μ μ .
First, we obtain some results of comparative statistical analysis in a pooling equilibrium with blockchain. As discussed earlier, when authentic products are infiltrated by counterfeit products, consumers face uncertainty about the type and quality of a product; in other words, consumers have product information asymmetry. Specifically, the uncertainty about product type is reflected in the proportion of counterfeit products. The information asymmetry about quality is reflected in the discounted factor of the experiential quality of counterfeit products. The reduction in the discounted factor leads to a higher degree of information asymmetry.
Proposition 1
(Effect of BCT on price, market share, and profits).  As the security level of BCT is improved (i.e., as   μ   increases),
(a)
the price and market share of an authentic product increases; the profits of an authentic firm increase if  ϕ < ϕ ^ ;
(b)
a deceptive counterfeiter’s market share and profits both decrease if λ < 1 2 μ .
The improved level of security or traceability provided by BCT reduces counterfeiting and increases consumer utility, known as the utility effect. This effect increases the price and market share of authentic products and decreases those of counterfeits. Moreover, firms trade off both positive and negative effects when choosing BCT. On the one hand, due to the security level of BCT, a branded firm obtains higher product prices and greater market demand, which is a positive effect. On the other hand, when using BCT, the company has to pay the software service fee, which has a negative effect. Thus, if the unit service fee is below a threshold, the use of BCT increases the profits of the authentic firm. In addition, if the proportion of counterfeits is not large, the use of BCT reduces the market share and profits of a counterfeit firm. Thus, in a pooling equilibrium, BCT works well when the proportion of counterfeits is less than the threshold.
Corollary 1.
(Effect of BCT on brands and counterfeiters) (a) If the unit service fee for BCT is less than a threshold i.e., ϕ < ϕ ^ ), brands should adopt BCT. (b) BCT reduces deceptive counterfeiters’ incentive to pool with the branded firm.
The adoption of BCT by brands significantly reduces the proportion of counterfeits and thus increases consumer willingness to pay. If the unit service fee for BCT is not too high, brand companies are better off with BCT. In addition, BCT reduces the incentive for fraudulent counterfeiters to join forces with an authentic company. Such an outcome illustrates the motive for anti-counterfeiting. In a pooling equilibrium, counterfeiters trade off two effects of BCT: the price effect and the demand effect. On the one hand, as the security level of BCT increases, the price of authentic products improves, leading to higher marginal profits for counterfeiters. This price effect increases the incentive for counterfeiters to enter the BCT traceability channel. On the other hand, the higher the security level of BCT, the lower the proportion of counterfeits, which reduces the demand and revenue for counterfeiters. Thus, the demand effect of BCT reduces the incentive for counterfeiters to enter the market. The demand effect of BCT on counterfeits dominates the price effect, which therefore reduces the incentive for counterfeiters to join forces with the branded firm. As a result, branded firms prefer BCT to minimize the pooling incentives for counterfeiters.
Proposition 2
(Effect of BCT on asymmetric information). If   λ < λ , as the security level of BCT is improved (i.e., as μ increases),
(a) the adverse impact of the asymmetric information on the authentic firm’s price, market share, and profits is mitigated (e.g., 2 Π a B * λ μ > 0 , 2 Π a B * δ d μ < 0 );
(b) the positive impact of the asymmetric information on the market share and profits of a deceptive counterfeiter is mitigated (e.g., 2 D d B * λ μ < 0 , 2 D d B * δ d μ < 0 ).
Here, the critical value λ is an increasing function of μ . This proposition illustrates how BCT acts on the impact of asymmetric information on authentic and counterfeit goods. Interestingly, BCT mitigates the negative impact of asymmetric information on authentic products and reduces the positive impact of asymmetric information on counterfeits. In addition to the aforementioned utility effect, BCT prevents a certain percentage of counterfeits from entering the market, thereby improving the quality of products when BCT is used, which is referred to as the quality effect. In fact, given the proportion of counterfeits λ and their quality discount factor δ d B P , the asymmetric information reduces the quality of products in a pooling equilibrium. BCT acts to suppress asymmetric information. Therefore, whether the effect of asymmetric information is positive or negative, BCT weakens it.
Proposition 3 
(Effect of BCT on welfare).
(a) Consumer surplus always benefits from blockchain.
(b) If the unit service fee for BCT is less than a threshold (i.e., ϕ < ϕ ^ ), blockchain improves social welfare.
We find that blockchain is beneficial to consumers, that is, higher levels of blockchain security increase consumer utility. This positive effect outweighs the negative effect of a higher price for authentic products, leading to a higher consumer surplus. However, the positive effect does not outweigh the negative effect in terms of social welfare, as blockchain also imposes costs on branded companies in addition to increasing consumer trust. Therefore, social welfare benefits from BCT only when the unit service fee for blockchain is low. This finding provides important managerial insights for policymakers.
In the context of pooling equilibrium, consumers are unable to differentiate between counterfeit goods, thus necessitating the implementation of blockchain technology as a means of combatting such illicit activities. In the context of the separating equilibrium, consumers possess the capacity to autonomously discern counterfeit goods, obviating the necessity for blockchain technology. Consequently, the primary focus of this paper is the pooling equilibrium.

5. Vertically Differentiated Competition in the Presence of Counterfeiting

Next, we consider two competing authentic firms. Each firm sells one type of product. The two products are typically authentic and premium, respectively, where a typically authentic product refers to an authentic product of standard quality, and a premium product refers to an authentic product of higher quality. The two products are imperfect substitutes. The quality of the typically authentic products q a 1 is less than that of the premium product q a 2 . We also assume that product quality has both searchable and experiential attributes. Hence, denote that q a 1 = q a = s + h and q a 2 = s + h ( h > h ), and s = h = 1 2 . For example, some valuable herbs are available in different quality levels, such as Ginseng and Matsutake in China, and foods such as sea cucumber. They tend to have the same searchable attributes, but the experiential attributes vary greatly. There are still counterfeits on the market, and the quality of these is q d = s + δ d h , where 0 < δ d < 1 . For simplicity of analysis, assume that two types of authentic products are pooled with the same proportion of counterfeits, i.e., the percentage of counterfeits is λ 2 for both products.

5.1. Competition Scenarios

In a duopoly market with counterfeits, three scenarios are discussed based on whether the firms adopt BCT. Scenario NN is when neither firm adopts BCT; Scenario NB denotes when the authentic firm does not adopt BCT, while the premium product firm does; Scenario BB represents when both firms use BCT. We focus on the following questions: (a) How does the use of BCT affect the competition between these firms? (b) How do the firms decide the timing to use BCT? That is, under what scenarios should BCT be adopted? (c) What is the impact of BCT on consumer surplus and social welfare? (Figure 1).
Scenario NN. We use the vertical product differentiation framework to model consumer utility. In this scenario, both firms do not adopt BCT. Consumers can purchase both products with probability λ 2 of being counterfeits. Thus, consumer utility of both the typically authentic and the premium product is as follows:
U a 1 N N θ = 1 λ 2 θ q a 1 P a 1 N N + λ 2 θ q d P a 1 N N .
U a 2 N N θ = 1 λ 2 θ q a 2 P a 2 N N + λ 2 θ q d P a 2 N N .
Letting the above utilities be equal, i.e., U a 1 N N θ = U a 2 N N θ , we obtain the marginal consumer’s preference for quality as θ N N * = P a 1 N N P a 2 N N 1 λ q a 1 q a 2 . The market demand for the two products is D a 1 N N = θ N N * and D a 2 N N = 1 θ N N * , respectively. The firms maximize their profits by choosing the optimal prices for their products:
Π a 1 N N P a 1 N N = P a 1 N N c q a 1 D a 1 N N 1 λ 2 .
Π a 2 N N P a 2 N N = P a 2 N N c q a 2 D a 2 N N 1 λ 2 .
Scenario NB. In this scenario, the premium firm adopts BCT, while the typically authentic firm does not. The security level of BCT adopted by the premium firm is still indicated as μ . Initially, both authentic firms have the proportion of counterfeit products as λ 2 . Since the premium firm a 2 adopts BCT, the counterfeits with the proportion of λ μ 2 will be blocked and thus switch to the typically authentic firm a 1 . Therefore, the percentage of counterfeit products of a 1 becomes λ 1 + μ 2 , and that of a 2 becomes λ 1 μ 2 . Therefore, the probability of consumers purchasing counterfeits from a 1 becomes λ a 1 N B = λ 1 + μ / 2 λ 1 + μ / 2 + 1 λ / 2 = λ 1 + μ 1 + λ μ , and from a 2 becomes λ a 2 N B = λ 1 μ / 2 λ 1 μ / 2 + 1 λ / 2 = λ 1 μ 1 λ μ . The consumer utility of the typically authentic and premium product becomes as follows:
U a 1 N B θ = 1 λ a 1 N B θ q a 1 P a 1 N B + λ a 1 N B θ q d P a 1 N B .
U a 2 N B θ = 1 λ a 2 N B θ q a 2 P a 2 N B + λ a 2 N B θ q d P a 2 N B .
In the same way, the marginal consumer’s preference for quality is obtained as θ N B * = P a 1 N B P a 2 N B K , where K = 1 λ a 1 N B q a 1 1 λ a 2 N B q a 2 + λ a 1 N B λ a 2 N B q d . The demand for two products is D a 1 N B = θ N B * and D a 2 N B = 1 θ N B * . The profits of the two firms are as follows.
Π a 1 N B P a 1 N B = P a 1 N B c q a 1 D a 1 N B 1 λ a 1 N B .
Π a 2 N B P a 2 N B = P a 2 N B c q a 2 D a 2 N B 1 λ a 2 N B .
Scenario BB. Since two firms use BCT, both have counterfeits with proportion λ μ 2 deterred, so the proportion of counterfeits for both firms becomes λ 1 μ 2 . Therefore, the probability of a consumer purchasing counterfeit products from both firms becomes λ a 1 B B = λ a 2 B B = λ 1 μ 2 λ 1 μ 2 + 1 λ 2 = λ 1 μ 1 λ μ . The consumer utility obtained by purchasing typically authentic products and premium products is as follows:
U a 1 B B θ = 1 λ a 1 B B θ q a 1 P a 1 B B + λ a 1 B B θ q d P a 1 B B .
U a 2 B B θ = 1 λ a 2 B B θ q a 1 P a 2 B B + λ a 2 B B θ q d P a 2 B B .
We obtain the marginal consumer’s preference for quality as θ B B * = P a 1 B B P a 2 B B 1 λ a 1 B B q a 1 q a 2 . The market demand is D a 1 B B = θ B B * and D a 2 B B = 1 θ B B * , respectively. The profit functions are in the following:
Π a 1 B B P a 1 B B = P a 1 B B c q a 1 D a 1 B B 1 λ a 1 B B .
Π a 2 B B P a 2 B B = P a 2 B B c q a 2 D a 2 B B 1 λ a 2 B B .

5.2. Analysis and Results

This section mainly discusses the BCT adoption strategies of two competing firms, as well as win-win strategies for both sides. Some comparative statistical results are also derived. Competitive scenarios beneficial to consumers and social welfare are also derived.
Proposition 4.
If the proportion of counterfeit products λ in vertically differentiated competition is high, then premium products will lose market share.
If there are a large number of counterfeits on the market, consumers realize they have a high probability of buying counterfeits. Instead of paying higher prices for premium products, it is better to pay a lower price for typically authentic products. The phenomenon of ‘bad money driving out good money’ emerges. In particular, λ needs to satisfy the condition of 0 < λ < 1 c 2 in Scenario NN, and 0 < λ < 3 4 μ in scenarios NB and BB must be fulfilled. Otherwise, premium products lose market share.
Proposition 5.
It is advantageous for the premium firm to be the first to adopt BCT, with Scenario NB being the most advantageous, followed by Scenario BB and Scenario NN being the worst, i.e., Π a 2 N B *  >  Π a 2 B B *  >  Π a 2 N N * .
The price and demand for premium products are higher in Scenario NB than in Scenarios NN and BB, as shown in Table 2; therefore, the premium firm makes the highest profit in Scenario NB. In Scenario NN, where neither firm adopts BCT, the premium firm can gain a greater competitive advantage by being the first to adopt BCT in Scenario NB. However, if the authentic firm also adopts BCT in Scenario BB, the premium firm’s competitive advantage is weakened and its profits are lower than in Scenario NB. Figure 2 shows the comparison of these three competitive scenarios.
Proposition 6.
For the typically authentic firm, if 1 2 < h < h ^ , Scenario NB is also optimal, followed by Scenario BB and then Scenario NN, i.e., Π a 1 N B *  >  Π a 1 B B *  >  Π a 1 N N * . Specifically,
(a) Π a 1 N B * > Π a 1 N N * , this suggests that the premium firm adopting BCT can offer a free ride to the typically authentic firm.
(b) Π a 1 B B *  >  Π a 1 N N * .
(c) If 1 2 < h < h ^ , Π a 1 N B * > Π a 1 B B * .
The result of Π a 1 N B * > Π a 1 N N * seems to be a counterintuitive conclusion. This is because if the premium firm is the first to adopt BCT, it will drive some of the counterfeits to the typically authentic firm and increase the probability that consumers will buy counterfeit versions of typically authentic products, thus reducing the demand for authentic products. In addition, the adoption of BCT by the premium firm increases consumer confidence in and utility of premium products, which also increases the price of premium products. However, typically authentic products also have room for price increases. The price increase effect for typically authentic products outweighs the sales decrease effect. Thus, the premium firm’s decision to adopt BCT first increases the typically authentic firm’s profit, which is the spillover effect of BCT on the value of both firms.
The adoption of BCT by both firms leads to an increase in the price of both products, where P a 1 N N * < P a 1 B B * . However, the rise in prices reduces the sales of the typically authentic product, i.e., D a 1 N N * > D a 1 B B * . Since the effect of the price increase is greater than the effect of the sales decrease, the profits of the authentic firm are higher in Scenario BB than in Scenario NN.
Mechanism behind the “free-ride”. Let π a = ( p a c a ) D a be the standard firm’s profit. When the premium firm adopts blockchain, two forces act on π a : (i) Demand contraction—some consumers upgrade to the premium product because μ raises their expected experiential quality; and (ii) Competitive softening—vertical distance widens, so the standard firm’s optimal best response raises p a to extract surplus from the lower-taste segment. In the parameter region identified in Proposition 6, the price-increase effect dominates the quantity-loss effect, yielding Δ π a > 0   despite Δ D a < 0 . Intuitively, authenticity certification by the premium firm relaxes head-to-head pressure in vertical differentiation, allowing the standard firm to free-ride on improved sorting and charge a higher margin.
Although the introduction of BCT may increase sales of authentic products, it may also increase competition between firms, thereby reducing the price of authentic products. Moreover, if the quality of the premium products is not high, the competition between firms is greater as there is less to differentiate the premium products from the authentic products. Therefore, it is not appropriate for the authentic firm to adopt BCT at the same time as the premium firm, as shown in Figure 3. If the quality of premium products is sufficiently high, the competition between firms is not fierce, so the authentic firm can also adopt BCT, as shown in Figure 4.
Corollary 2.
If the quality of the premium product is below a certain threshold, Scenario NB is a win-win situation for both the typically authentic firm and the premium firm.
This result can be obtained by Propositions 5 and 6. The best BCT selection strategy is for the premium firm to adopt BCT while the typically authentic firm does not adopt BCT, as shown in Figure 5. In this scenario, the Pareto optimum is achieved. The management implication is that when premium products face imperfect substitution competition from typically authentic products, premium firms should be the first to adopt BCT and typically authentic firms should not follow.
Proposition 7.
(a) Effect of λ . (i) The profits of both typically authentic and premium firms decrease with λ in Scenarios NN and BB. (ii) The profits of both firms increase or decrease with λ in Scenario NB.
(b) Effect of μ . (i) The profits of both typically authentic and premium firms increase with μ in Scenario BB. (ii) The profits of a premium firm increase with μ , and the profits of a typically authentic firm increase or decrease with μ in Scenario NB.
(c) Effect of h . (i) The profits of both typically authentic and premium firms increase with h in Scenarios NN and BB. (ii) The profits of a typically authentic firm increase with h , and the profits of a premium firm increase or decrease with h in Scenario NB.
In Scenario NB, due to the adoption of BCT by the premium firm, the percentage of counterfeits among the authentic products is higher than among the premium products. Moreover, λ a 1 N B λ > λ a 2 N B λ , i.e., as the total proportion of counterfeits in the market increases, the probability of counterfeiting the authentic product is greater than that of counterfeiting the premium product. Therefore, the utility of buying the typically authentic product decreases more, changing the competitive landscape between the two firms. In other words, the typically authentic firm has a significant competitive disadvantage, while the premium firm has a competitive advantage. Although λ increases the probability that a consumer purchases counterfeits, thus reducing consumer utility. However, the effect is not always negative due to the asymmetric competition between typically authentic and premium firms in Scenario NB. In Scenarios NN and BB, both firms are symmetric and an increase in λ does not change the competitive landscape, so the profits of the two firms decrease with λ .
In Scenario NB, the adoption of BCT by premium firms is not always detrimental to typically authentic firms; moreover, the profits of the authentic firm increase when the effect of increasing the price of the authentic product outweighs the effect of increasing the probability of buying counterfeits so that Scenario NB can become a win-win scenario. This result that the profits of both typically authentic and premium firms increase with μ in Scenario BB is intuitive.
In Scenario NB, the shift in the competitive landscape engenders an enhanced competitive posture for a premium firm. An escalation in prices exerts a more substantial impact on demand, consequently precipitating a decline in the profits of the aforementioned premium firm. Consequently, in Scenario NB, the assumption that superior quality invariably yields favorable outcomes for the premium product is not substantiated (Table 3).
Proposition 8.
The comparative results on consumer surplus and social welfare are obtained as follows.
(a) Consumer surplus. If 0 < λ < 3 4 , C S N B * < C S B B * .
(b) Social welfare. (i) S W N B * < S W B B * . (ii) If 66 + 3 70 92 < λ < 1 , S W N N * < S W B B * .
Although Scenario NB is the optimal scenario for firms, consumers demonstrate a clear preference for Scenario BB. This is because consumers have a high probability of purchasing counterfeits in Scenario NB, which results in a suboptimal consumption experience. By contrast, in Scenario BB, consumers have the lowest probability of purchasing counterfeits and benefit from the most favorable shopping environment.
Scenario BB exhibits higher social welfare in comparison to Scenario NB. Additionally, Scenario BB surpasses Scenario NN, particularly in scenarios characterized by a substantial presence of counterfeit goods in the market. Consequently, from the perspective of social welfare, Scenario BB emerges as the more optimal case.

6. Extensions

In the following sections, we delve into the intricacies of two model variations and demonstrate the robustness of the fundamental model’s outcomes when confronted with alternative model specifications. We keep the welfare accounting as consumer surplus plus firms’ profits net of F ( μ ) .

6.1. Nonuniform Consumer Preference Distribution

In the basic model outlined in Section 3, it is assumed that consumer preferences for quality exhibit a uniform distribution from 0 to 1. In this section, the circumstances under which the probability density of consumer preferences follows a step-wise function, as noted by Kwark et al. [46], are investigated. In particular, we assume distinct consumer groups: the first group α is distributed uniformly between 0 ,   1 + β ; the second group 1 α is distributed uniformly between 0 ,   1 . It is observed that the probability density is higher on the left side of the distribution range 0 ,   1 than on the right side 1 ,   1 + β . When β = 0 , this distribution is equivalent to the fundamental model.
As the model analysis remains constant, the results specific to the monopoly are the sole focus of this discussion. In the absence of BCT, the marginal consumer is equivalent to that of the basic model. The demand function is as follows:
D a N = 1 λ 1 α 1 θ N * + α 1 θ N * 1 + β .
In the presence of BCT, the demand function is as follows:
D a B = 1 λ 1 λ μ 1 α 1 θ B * + α 1 θ B * 1 + β .
The profit functions and the solving procedure are consistent with those of the basic model. It can be verified that the primary results of the basic model hold qualitatively in the case of a non-uniform distribution of consumer preferences. In particular, the effect of BCT on prices, demand, and profits (as presented in Proposition 1 and 3), and the impact of BCT on asymmetric information (as presented in Proposition 2) are qualitatively the same as in the basic model.

6.2. Considering BCT Costs in the Competition

In the basic model in Section 5, the costs of BCT in a vertically differentiated competition are not taken into consideration. In this section, the cost of BCT traceability services for firms that adopt BCT is considered in three scenarios. Analogous results to those in the basic model are obtained.
Proposition 9.
If 0 < ϕ < min ϕ 1 , ϕ 2 and 1 2 < h < h ^ , the three scenarios are in the order of NB > BB > NN for both a premium firm and a typically authentic firm.
(a) For a premium firm, if 0 < ϕ < ϕ 1 , Π ~ a 2 N B * > Π ~ a 2 B B * > Π ~ a 2 N N * .
(b) For a typically authentic firm, if 1 2 < h < h ^ and 0 < ϕ < ϕ 2 , Π ~ a 1 N B * > Π ~ a 1 B B * > Π ~ a 1 N N * .
We generalize the fee to F i ( μ i ) with F i ( ) > 0 and F i ( ) 0 . The NB > BB > NN ranking (Proposition 9) continues to hold when marginal fees lie below a threshold governed by demand sensitivities and quality gaps. If F i is very high at the relevant μ i , BB may lose its welfare edge over NN because firm-side costs dominate consumer gains. This preserves the main insight: NB is privately optimal under moderate fees, whereas BB maximizes consumer surplus and often welfare when counterfeit prevalence is high, creating a classic externality wedge.
The same results as the basic model can be obtained when the marginal cost of the BCT is not too high. Conversely, when the cost of BCT traceability is elevated, adopting BCT becomes disadvantageous. When considering BCT costs, Scenario NB emerges as a mutually beneficial scenario for both firms. These direction-only checks (extreme μ ; high marginal fees; quality weights; demand elasticity; marginal subsidies to F ( μ ) ) provide qualitative robustness without changing the paper’s main comparative-statics conclusions.

6.3. Implementation of Conditions and Managerial Guidance

Operationalizing μ . Interpret μ as the share of source counterfeits prevented from entering the authentic channel through governance (batch-level sampling coverage, multi-stage inspections, tamper-evident seals, cryptographic anchoring, and dispute-resolving smart contracts). Higher μ   requires more intensive and auditable processes. Let the one-off service fee be a monotone increasing (possibly convex) function F ( μ ) ; the baseline linear form used in Section 4.2, F ( μ ) = ϕ μ , is a tractable special case.
Adoption corridor. The firm’s gain from μ   combines a utility/quality effect and a cost effect F ( μ ) . Adoption is advisable when the marginal benefit at the interior optimum exceeds the marginal fee (Proposition 1 and its corollary).
Product classes. Categories with a high experiential component enjoy stronger benefits because μ directly alleviates asymmetric information on experiential quality.
Governance playbook. Effective roll-out requires (i) credible third-party or consortium governance, (ii) verifiable data-capture at source, (iii) random audits with public attestation, and (iv) clear consumer-facing provenance cues.

6.4. Policy Implications

The government should indeed implement subsidy policies with the objective of encouraging firms to adopt blockchain technology, a course of action which has the potential to engender benefits social welfare.
Blockchain technology is a powerful enforcement tool for intellectual property systems, providing goods with tamper-proof ‘digital IDs’. It can effectively track authenticity and preserve evidence of infringement. While it does not replace intellectual property law, it does enhance its protection and enforcement capabilities in actual markets through technological means, thereby helping to build a more trustworthy business environment. Therefore, this paper argues that the government should encourage firms to adopt blockchain technology to supplement the intellectual property system.
Our results reveal a tension: consumers prefer BB (lowest counterfeit incidence), while firms may prefer NB (premium adopts; standard does not) when quality gaps and fees satisfy threshold conditions. Policymakers can close this wedge via marginal subsidies or tax credits tied to μ , public-procurement requirements for traceability, and standardized auditing protocols that reduce F ( μ ) .

7. Conclusions

Counterfeit products are causing significant harm to a wide range of industries around the world. The advent of blockchain technology holds considerable promise in addressing this issue by ensuring the integrity and traceability of data, thereby counteracting the proliferation of counterfeit goods to a certain extent. However, the issue of counterfeiting at the source remains largely unaddressed by the scholarly community. This study aims to address this gap by examining how authentic firms make decisions regarding BCT adoption strategies within a monopoly and competitive duopoly context.
The findings of this study demonstrate that, in general, firms should adopt BCT if the cost is not high. Furthermore, it is demonstrated that the adoption of BCT is advantageous to social welfare in a monopoly. Furthermore, the study demonstrates that BCT serves as a deterrent for deceptive counterfeiters, discouraging them from collaborating with the branded firm. However, in a duopoly market where both firms sell premium products, the adoption of BCT may not be optimal. Conversely, in a duopoly market where one firm specializes in premium products and the other in authentic products, with the premium product having a quality below a certain threshold, Scenario NB becomes a win-win scenario. The results of this study demonstrate that premium firms should be the primary adopters of BCT to combat counterfeiting, while authentic firms should refrain from adopting it. Notwithstanding this, the scenario in which both firms adopt BCT is found to be more beneficial to consumer surplus and social welfare than the scenario in which only premium firms adopt it.
This paper posits several research hypotheses for future investigation. Firstly, an exploration is conducted of the competitive landscape of two firms in the context of counterfeiting. In subsequent research, it would be worthwhile considering competition between two supply chains and their BCT adoption strategies. Secondly, the study posits the hypothesis that authentic premium products possess higher experiential quality than authentic products, yet both exhibit equivalent searchable quality. Further consideration could be given to premium products having higher experiential and searchable quality than authentic products. Thirdly, it is assumed that BCT is provided by a third party, such as JD Blockchain, or AntChain in China. However, it is noteworthy that certain corporations establish their own blockchain networks, such as Walmart and Amazon. Consequently, a potential avenue for future research could involve the examination of how companies utilize their own established BCT traceability networks to combat counterfeit goods.

8. Scope and Limitations

The present paper is subject to certain limitations in terms of its applicability, in addition to some significant constraints in the model’s assumptions. For instance, decision-making scenarios are generally confined to industries such as apparel, cosmetics, and luxury goods on online shopping platforms. In these sectors, counterfeit products can accurately replicate the search attributes of genuine items, yet they often fall short in replicating experiential attributes. In addition, this study is bounded by several modeling choices that clarify where our results are expected to hold. First, the game is static and single-period; dynamic reputation, learning from reviews, and repeated interactions are abstracted away. Second, before data are uploaded to the blockchain, observable signals are assumed to be perfectly mimicable by deceptive counterfeiters, rationalizing a pooling information environment. Third, consumer heterogeneity follows a uniform distribution; relaxing this to step-wise densities preserves qualitative results (Section 6.1). Fourth, the security level μ is taken as an implementable governance choice but enters the model as an exogenous parameter to firms’ price games (Section 4.2). Fifth, we abstract from multi-channel frictions, inventory dynamics, and contract enforcement risks. Under these boundary conditions, comparative statics and adoption-timing insights—especially the superiority of Scenario NB under a threshold on premium quality and service fees—remain valid. Future work can endogenize μ , allow noisy third-party verification, and study dynamic learning with reputational spillovers.

Author Contributions

Z.S.: Conceptualization, Methodology, Formal Analysis, Investigation, Writing—Original Draft; S.C.: Supervision, Conceptualization, Methodology, Writing—Review & Editing; Y.Y.: Validation, Software, Visualization, Funding Acquisition; Y.S.: Resources, Data Curation, Software; W.M.: Validation, Formal Analysis, Writing—Review & Editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Shanxi Provincial Basic Research Program [grant number 202403021222071], the Research Project Supported by Shanxi Scholarship Council of China [grant number 2023-037].

Data Availability Statement

This study did not create or analyze new data. Data sharing is not applicable to this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

A.1 Direction-only sign table (summary). Under NB, p a / μ > 0 (competitive softening), while C S / μ > 0 and W / μ 0 net of F ( μ ) within threshold ranges; p b / μ is weakly non-negative in typical parameterizations. These signs summarize the comparative-statics directions used in Section 4, Section 5 and Section 6.
A.2 General taste distributions. Under standard single-crossing and monotone-hazard conditions for the taste distribution, the directions of price and demand best responses are preserved; threshold endpoints re-scale but the NN/NB/BB ranking remains unchanged.
Glossary (key terms). Pooling equilibrium: observable signals are perfectly mimicable, so types cannot be separated before purchase. Semi-separating equilibrium: some types mix over signals, possibly due to noisy verification. Separating equilibrium: distinct types choose distinct, non-mimicable signals. Security level μ : fraction of source counterfeits blocked by governance. Fee F ( μ ) : one-off service fee increasing (possibly convex) in μ .

Appendix B

Proof of Lemma 1.
In a pooling equilibrium without blockchain,
Π d N * = λ 2 2 c + λ 1 + δ d 2 2 c δ d + λ 1 + δ d 8 2 + λ 1 + δ d .
2 Π d N * λ 2 = 1 + δ d 8 c 2 δ d + 2 + λ 1 + δ d 3 4 2 + λ 1 + δ d 3 < 0 .
Proof of Lemma 2.
We omit this proof. □
Proof of Proposition 1.
(a) We can obtain that
p a B * μ = λ 1 δ d 1 λ 4 1 λ μ 2 > 0 .
D a B * μ = λ 1 + λ 2 c 1 + δ d 1 λ μ 2 J 2 2 1 λ μ 2 J 2 > 0 .
If ϕ < ϕ ^ ϕ ^ = λ 8 1 + λ 2 1 δ d 1 λ 1 + λ μ 3 + 1 δ d 1 λ μ 2 1 + δ d 2 λ μ K 2 ,
Π a B * μ = 1 8 λ 1 λ 2 c 1 λ μ + J 2 c 1 + δ d 1 λ μ 2 3 δ d 1 λ 2 μ + λ 2 + μ J 1 λ μ 3 J 2 8 ϕ > 0 .
where K = 2 λ 1 + δ d 1 + μ μ , J = 2 + λ 1 + δ d 1 + μ + μ .
(b) If λ < 1 2 μ , D d B * μ = λ 1 λ 4 c 1 λ μ 2 J 2 2 1 λ μ 2 J 2 < 0 ,
Π d B * μ = 1 8 1 2 c + δ d 1 + 1 + 2 c δ d 1 + δ d 2 1 + δ d 1 + λ 3 1 + λ μ 3 1 3 δ d + 2 c 1 + δ d 1 λ 2 1 λ μ 2 + 16 c 2 δ d 1 λ 2 1 + δ d 2 λ μ K 2 8 ϕ < 0 .
Proof of Corollary 1.
This proof can be obtained by the proof of Proposition 1. □
Proof of Proposition 2.
(a) (i) The adverse impacts of asymmetric information on the price, market share, and profits of an authentic product are as follows. The larger λ and the smaller δ d represent the greater asymmetric information.
p a B * λ = 1 δ d 1 + μ 4 1 λ μ 2 < 0 ,   and   p a B * δ d = λ 1 μ 4 1 λ μ > 0 .
D a B * λ = 1 μ 2 c 1 + δ d 1 λ μ 2 J 2 2 1 λ μ 2 J 2 < 0 ,   and   D a B * δ d = c λ 1 λ 1 μ J 2 > 0 .
Π a B λ = 1 μ 2 c 1 λ μ + J 8 1 + λ μ 3 J 2 2 c 1 + δ d 1 λ μ 2 + 3 δ d 1 λ 2 μ λ 2 + μ J < 0 .
Π a B * δ d = λ 1 λ 1 μ 2 c 1 λ μ + J 2 c 1 + λ μ + J 8 1 λ μ 2 J 2 > 0 .
where J = 2 + λ 1 + δ d 1 + μ + μ .
(ii) The adverse impacts of the asymmetric information are mitigated by BCT as follows.
p a B * δ d μ = λ 1 λ 4 1 λ μ 2 < 0 .
If λ < 1 2 μ , p a B * λ μ = 1 δ d 1 + λ 2 + μ 4 1 λ μ 3 > 0 .
If λ < 1 2 μ , D a B * δ d μ = c λ 1 λ 1 μ G J 3 < 0 , where G = 2 + λ 3 + δ d 1 + μ + μ .
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 , D a B * λ μ = 2 c 1 + δ d 1 + λ μ 3 G 1 + λ 2 + μ J 3 2 1 + λ μ 3 J 3 > 0 .
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 ,
Π a B * δ d μ = λ 1 + λ 4 c 2 1 + λ μ 3 G 1 + λ 2 + μ J 3 8 1 + λ μ 3 J 3 < 0 .
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 ,
Π a B * λ μ = 4 c 2 1 + δ d 1 + λ μ 4 G 4 c 1 + λ 2 + μ 1 + λ μ J 3 + J 3 3 + λ 10 4 μ + λ 6 + μ 2 + μ + δ d 1 + λ 6 + 4 μ + λ 6 + 6 + μ μ 8 1 λ μ 4 J 3 > 0 .
(b) (i) The positive impacts of asymmetric information on the market share and profits of a deceptive counterfeiter are in the following.
If λ < 1 2 μ , D d B * λ = 1 + μ 4 c 1 λ μ 2 2 λ μ K 2 2 1 λ μ 2 2 λ μ K 2 > 0 .
D d B * δ d = c λ 2 1 μ 2 2 λ μ K 2 > 0 .
If λ < 1 2 μ ,
Π d B * λ = 1 μ 2 4 1 + λ μ 3 2 λ μ K 2 4 c 2 δ d 1 + λ μ 3 1 + λ 1 + δ d 1 + μ 2 λ μ K 2 + c 1 + δ d 1 + λ μ 2 λ μ K 2 > 0 .
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 ,
Π d B * δ d = λ 1 μ 2 8 1 λ μ 2 2 λ μ K 2 4 c 2 1 λ μ 2 2 + λ + λ μ λ 1 μ 2 λ μ K 2 2 c 1 + λ μ 2 λ μ K 2 > 0 .
(ii) The positive impacts of the asymmetric information are mitigated by BCT as follows.
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 , D d B * λ μ = 1 λ 1 + λ μ 3 + 1 2 1 λ μ 2 + 8 c 1 + λ J 3 2 c J 2 < 0 .
D d B * δ d μ = 4 c 1 λ λ 2 1 μ J 3 < 0 .
If λ < λ λ = 3 3 2 μ + 3 μ 6 6 μ + μ 2 ,
Π d B * λ μ = 1 λ 1 μ 4 1 λ μ 4 2 λ μ K 3 16 c 2 δ d 1 λ μ 4 G + 2 λ δ d 1 + μ 2 λ μ K 3 2 c 1 + δ d 1 + λ μ 2 λ μ K 3 < 0 .
Proof of Proposition 3.
C S B * μ = λ 1 λ 1 δ d 16 1 1 λ μ 2 4 c 2 J 2 > 0 .
If ϕ < ϕ ^ , Π a B * μ > 0 . Hence, if ϕ < ϕ ^ , S W B * μ > 0 . □
Proof of Proposition 4.
In Scenario NN, if 0 < λ < 1 c 2 , D a 2 N N * = 2 1 λ c 3 1 λ > 0 and Π a 2 N N * = 1 36 2 h 1 2 1 λ c 2   > 0.
In Scenario NB and BB, if 0 < λ < 3 4 μ , D a 2 N B * = c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ψ 3 1 λ Ψ > 0,
Π a 2 N B * = c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ψ 2 18 1 λ μ 2 1 + λ μ Ψ > 0 ,
D a 2 B B * = 2 c λ 2 c μ 3 1 λ > 0 ,   and   Π a 2 B B * = 2 h 1 2 2 λ c 1 λ μ 2 18 1 λ μ 2 > 0 .
where Ψ = 1 + λ μ 2 λ μ δ d + 2 h 1 + λ μ . □
Proof of Proposition 5.
Within the parameter ranges of   0 < λ < 1 c 2 and 0 < λ < 3 4 μ ,
Π a 2 N N * = 1 36 2 h 1 2 1 λ c 2 > 0 , Π a 2 B B * = 2 h 1 2 2 λ c 1 λ μ 2 18 1 λ μ 2 > 0 ,
and Π a 2 N B * = c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ψ 2 18 1 λ μ 2 1 + λ μ Ψ > 0 .
We can obtain that Π a 2 N N * < Π a 2 B B * < Π a 2 N B * . □
Proof of Proposition 6.
Within the parameter ranges of 0 < λ < 1 c 2 and 0 < λ < 3 4 μ , Π a 1 N N * = 1 36 2 h 1 1 + c λ 2 > 0, Π a 1 B B * = 2 h 1 1 λ c 1 λ μ 2 18 1 λ μ 2 > 0, and Π a 1 N B * = c 2 h 1 1 + λ 2 μ 2 1 λ Ψ 2 18 1 λ μ 1 + λ μ 2 Ψ > 0.
The results of Π a 1 N N * < Π a 1 N B * and Π a 1 N N * < Π a 1 B B * can be obtained.
If 1 2 < h < h ^ , where h ^ c 1 + δ d 1 + λ 2 μ 2 1 λ 3 λ μ + δ d 1 + 3 λ μ 4 1 + λ μ 1 c + λ + c λ μ 1 4 1 δ d 2 1 λ 2 1 + λ μ + c 2 1 λ μ 2 1 + λ μ 2 c 1 λ 1 4 λ μ + 3 λ 2 μ 2 1 + λ μ 1 + c λ c λ μ 2 , Π a 1 B B * < Π a 1 N B * . □
Proof of Corollary 2.
This proof can be obtained by the proof of Propositions 6 and 7. □
Proof of Proposition 7.
(a) Π a 1 N N * λ = 2 h 1 1 + c λ 18 < 0 . Π a 2 N N * λ = 2 h 1 2 c 2 λ 9 < 0 .
The expressions of Π a 1 N B * λ and Π a 2 N B * λ are extremely complicated, and we can see that they are not always positive or negative.
Π a 1 B B * λ = 2 h 1 1 μ 1 λ + c 1 λ μ 9 1 λ μ 3 < 0 .
Π a 2 B B * λ = 2 2 h 1 1 μ 2 2 λ + c 1 + λ μ 9 1 λ μ 3 < 0 .
(b) The expressions of Π a 1 N B * μ are also complicated and Π a 1 N B * μ could be positive or negative.
Π a 2 N B * μ = λ 2 1 λ Ω c 2 h 1 1 λ 2 μ 2 c 2 h 1 1 + δ d 1 λ μ 2 1 + λ μ 2 1 λ Ω λ μ 1 + λ μ + 2 h 1 + λ μ 2 δ d 1 + λ μ 1 + 2 λ μ 9 1 + λ μ 3 1 + λ μ 2 Ω 2 > 0 .
where Ω = 1 + 2 h + 1 + 2 h 2 δ d λ μ .
Within the parameter ranges 0 < λ < 1 c 2 and 0 < λ < 3 4 μ , the above equation is positive.
Π a 1 B B * μ = 2 h 1 1 λ λ 1 λ + c 1 λ μ 9 1 λ μ 3 > 0 .
Π a 2 B B * μ = 2 2 h 1 1 λ λ 2 2 λ c 1 λ μ 9 1 λ μ 3 > 0 .
(c) Π a 1 N N * h = 1 + c λ 2 18 > 0 .
Π a 2 N N * h = 2 c 2 λ 2 18 > 0 .
Π a 1 N B h = c 1 + λ μ 1 + 2 h + 3 + 2 h 4 δ d λ μ 1 λ Ω 1 + λ Ω c 2 h 1 1 λ 2 μ 2 9 Ω 2 1 + λ 2 μ 2 > 0 .
Π a 2 N B * h = c 1 + λ μ 1 + 2 h + 3 + 2 h 4 δ d λ μ + 2 1 λ Ω 2 1 λ Ω c 2 h 1 1 λ 2 μ 2 9 Ω 2 1 + λ 2 μ 2 .
We can obtain Π a 2 N B * h maybe positive or negative.
Π a 1 B B * h = 1 λ + c 1 λ μ 2 9 1 λ μ 2 > 0 .
Π a 2 B B * h = 2 2 λ c 1 λ μ 2 9 1 λ μ 2 > 0 .
Proof of Proposition 8.
(a) C S N B * = 1 36 2 c 13 + 10 h + 9 1 + δ d + 2 δ d 2 h 1 λ 1 λ μ + 11 1 δ d 1 λ 1 + λ μ + c 2 c h 2 1 λ 2 μ 2 1 λ Ω , C S B B * = 1 36 2 c 13 + 10 h + c 2 2 h 1 1 λ μ 1 λ + 20 4 h 1 λ λ 11 9 δ d + 9 1 + δ d μ 1 λ μ . By comparison, it can be obtained if 0 < λ < 3 4 , C S N B * < C S B B * .
(b) S W N N * = 1 72 10 + 9 + 9 δ d 10 λ λ + c 2 2 h 1 5 4 λ 1 λ + 4 h 1 λ 4 5 λ c 22 + 4 λ + 4 h 7 2 λ , S W N B * = 1 36 c 2 c h 2 5 λ 4 + λ μ 2 1 λ Ω + 10 + λ A + 4 h 1 λ 1 + λ μ 4 + λ 5 + 3 + λ 3 + μ μ 1 1 λ 2 μ 2 2 2 c 11 + λ 2 + μ 6 + 6 λ 13 λ μ 2 h 7 + λ 2 + μ 6 + 6 λ + 5 λ μ 1 λ 2 μ 2 , where A = 9 + 9 δ d 10 λ 1 λ 7 + 4 λ + δ d 7 20 λ μ + 11 13 δ d 1 λ λ 2 μ 3 λ 23 + λ 6 λ 2 + 3 δ d 7 + λ 5 + 4 λ μ 2 + 9 1 + δ d λ 3 μ 4 .
S W B B * = 1 36 c 2 2 h 1 5 λ 4 + μ 1 λ 2 c 11 + 2 λ 13 λ μ 2 h 7 + 2 λ + 5 λ μ 1 λ μ + 10 + 4 h 1 λ 4 λ 5 μ + λ 9 29 μ + 9 δ d 1 μ 1 λ μ λ 10 μ 11 + 9 μ 1 λ μ 2 . We can obtain S W N B * < S W B B * . If 66 + 3 70 92 < λ < 1 , S W N N * < S W B B * . □
Proof of Proposition 9.
(a) By the proof similar to the basic model, it follows that Π ~ a 2 B B * < Π ~ a 2 N B * . If 0 < ϕ < ϕ 1 , Π ~ a 2 N N * < Π ~ a 2 B B * , where ϕ 1 = 2 h 1 c 2 1 λ μ 2 4 c 1 λ 1 λ 2 μ 2 + 4 1 λ 2 1 + λ μ 2 λ μ 36 μ 1 λ μ 2 .
Hence, if 0 < ϕ < ϕ 1 , Π ~ a 2 N N * < Π ~ a 2 B B * < Π ~ a 2 N B * .
(b) Π ~ a 1 N N * < Π ~ a 1 N B * and Π ~ a 1 B B * < Π ~ a 1 N B * . These two results and their conditions are the same as the basic model.
If 0 < ϕ < ϕ 2 , Π ~ a 1 N N * < Π ~ a 1 B B * , where ϕ 2 = 2 h 1 c 2 1 λ μ 2 + 2 c 1 λ 1 λ 2 μ 2 + 1 λ 2 1 + λ μ 2 λ μ 36 μ 1 λ μ 2 . □

Appendix C. Equilibrium Results

The equilibrium results of Scenario NN in a duopoly market are summarized in Table A1.
Table A1. Equilibrium results of Scenario NN.
Table A1. Equilibrium results of Scenario NN.
VariablesResults
P a 1 N B * c 5 + 2 h 6 + 1 λ Ω 6 1 λ 2 μ 2 ( Ω = 1 + 2 h + 1 + 2 h 2 δ d λ μ )
P a 2 N B * 2 c 1 + h 3 + 1 λ Ω 3 1 λ 2 μ 2
D a 1 N B * c 2 h 1 1 λ 2 μ 2 + 1 λ Ω 3 1 λ Ω
D a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ω 3 1 λ Ω
Π a 1 N B * c 2 h 1 1 + λ 2 μ 2 1 λ Ω 2 18 1 λ μ 1 + λ μ 2 Ω
Π a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 + λ Ω 2 18 1 λ μ 2 1 + λ μ Ω
The equilibrium results of Scenario NB in a duopoly market are summarized in Table A2.
Table A2. Equilibrium results of Scenario NB.
Table A2. Equilibrium results of Scenario NB.
VariablesResults
P a 1 N B * c 5 + 2 h 6 + 1 λ Ω 6 1 λ 2 μ 2 ( Ω = 1 + 2 h + 1 + 2 h 2 δ d λ μ )
P a 2 N B * 2 c 1 + h 3 + 1 λ Ω 3 1 λ 2 μ 2
D a 1 N B * c 2 h 1 1 λ 2 μ 2 + 1 λ Ω 3 1 λ Ω
D a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ω 3 1 λ Ω
Π a 1 N B * c 2 h 1 1 + λ 2 μ 2 1 λ Ω 2 18 1 λ μ 1 + λ μ 2 Ω
Π a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 + λ Ω 2 18 1 λ μ 2 1 + λ μ Ω
The equilibrium results of Scenario BB in a duopoly market are summarized in Table A3.
Table A3. Equilibrium results of Scenario BB.
Table A3. Equilibrium results of Scenario BB.
VariablesResults
P a 1 N B * c 5 + 2 h 6 + 1 λ Ω 6 1 λ 2 μ 2 ( Ω = 1 + 2 h + 1 + 2 h 2 δ d λ μ )
P a 2 N B * 2 c 1 + h 3 + 1 λ Ω 3 1 λ 2 μ 2
D a 1 N B * c 2 h 1 1 λ 2 μ 2 + 1 λ Ω 3 1 λ Ω
D a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 λ Ω 3 1 λ Ω
Π a 1 N B * c 2 h 1 1 + λ 2 μ 2 1 λ Ω 2 18 1 λ μ 1 + λ μ 2 Ω
Π a 2 N B * c 2 h 1 1 + λ 2 μ 2 + 2 1 + λ Ω 2 18 1 λ μ 2 1 + λ μ Ω

References

  1. Shen, B.; Dong, C.; Minner, S. Combating copycats in the supply chain with permissioned blockchain technology. Prod. Oper. Manag. 2022, 31, 138–154. [Google Scholar] [CrossRef]
  2. Cho, S.H.; Fang, X.; Tayur, S. Combating strategic counterfeiters in licit and illicit supply chains. Manuf. Serv. Oper. Manag. 2015, 17, 273–289. [Google Scholar] [CrossRef]
  3. Gao, Y. On the use of overt anti-counterfeiting technologies. Mark. Sci. 2018, 37, 403–424. [Google Scholar] [CrossRef]
  4. Shen, B.; Cheng, M.; Dong, C.; Xiao, Y. Battling counterfeit masks during the COVID-19 outbreak: Quality inspection vs. blockchain adoption. Int. J. Prod. Res. 2023, 61, 3634–3650. [Google Scholar] [CrossRef]
  5. Grossman, G.M.; Shapiro, C. Counterfeit-product trade. Am. Econ. Rev. 1988, 78, 59–75. [Google Scholar]
  6. Ahmadi, R.; Yang, B.R. Parallel imports: Challenges from unauthorized distribution channels. Mark. Sci. 2000, 19, 279–294. [Google Scholar] [CrossRef]
  7. Qian, Y. Counterfeiters: Foes or Friends? How Counterfeits Affect Sales by Product Quality Tier. Manag. Sci. 2014, 60, 2381–2400. [Google Scholar] [CrossRef]
  8. Lw, A.; Mag, B.; Mp, C. Is it fake? Using potentially low quality suppliers as back-up when authentic suppliers are unavailable. Int. J. Prod. Econ. 2019, 213, 185–200. [Google Scholar]
  9. Hamelin, N.; Nwankwo, S.; Hadouchi, R.E. ‘Faking brands’: Consumer responses to counterfeiting. J. Consum. Behav. 2013, 12, 159–170. [Google Scholar] [CrossRef]
  10. Zhou, Y.; Gao, X.; Luo, S.; Xiong, Y.; Ye, N.Y. Anti-Counterfeiting in a retail Platform: A Game-Theoretic approach. Transp. Res. Part E Logist. Transp. Rev. 2022, 165, 102839. [Google Scholar] [CrossRef]
  11. Qian, Y.; Gong, Q.; Chen, Y. Untangling Searchable and Experiential Quality Responses to Counterfeits. Mark. Sci. 2015, 34, 522–538. [Google Scholar] [CrossRef]
  12. Gao, Y.; Lim, W.S.; Tang, C.S. Entry of copycats of luxury brands. Mark. Sci. 2017, 36, 272–289. [Google Scholar] [CrossRef]
  13. Guo, S.; Sun, X.; Lam, H.K. Applications of blockchain technology in sustainable fashion supply chains: Operational transparency and environmental efforts. IEEE Trans. Eng. Manag. 2020, 70, 1312–1328. [Google Scholar] [CrossRef]
  14. Lu, W.; Yu, J.; Chen, Z.; Ji, X. Blockchain adoption in a supply chain system to combat counterfeiting. Comput. Ind. Eng. 2022, 171, 108408. [Google Scholar] [CrossRef]
  15. Wu, J.; Yan, Y.; Wang, S.; Zhen, L. Optimizing Blockchain-Enabled Sustainable Supply Chains. IEEE Trans. Eng. Manag. 2025, 72, 426–445. [Google Scholar] [CrossRef]
  16. Schneider, S.; Leyer, M.; Tate, M. The transformational impact of blockchain technology on business models and ecosystems: A symbiosis of human and technology agents. IEEE Trans. Eng. Manag. 2020, 67, 1184–1195. [Google Scholar] [CrossRef]
  17. Hou, P.; Zhang, C.; Li, Y. The interplay of manufacturer encroachment and blockchain adoption to combat counterfeits in a platform supply chain. Int. J. Prod. Res. 2024, 62, 1382–1398. [Google Scholar] [CrossRef]
  18. Dutta, P.; Choi, T.M.; Somani, S.; Butala, R. Blockchain technology in supply chain operations: Applications, challenges and research opportunities. Transp. Res. Part E Logist. Transp. Rev. 2020, 142, 102067. [Google Scholar] [CrossRef] [PubMed]
  19. Luo, S.; Choi, T.M. E-commerce supply chains with considerations of cyber-security: Should governments play a role? Prod. Oper. Manag. 2022, 31, 2107–2126. [Google Scholar] [CrossRef]
  20. Chod, J.; Trichakis, N.; Tsoukalas, G.; Aspegren, H.; Weber, M. On the Financing Benefits of Supply Chain Transparency and Blockchain Adoption. Manag. Sci. 2020, 66, 4378–4396. [Google Scholar] [CrossRef]
  21. Wang, J.; Zhang, Q.; Hou, P. Combating deceptive counterfeits with blockchain technology under asymmetric information. IEEE Trans. Eng. Manag. 2022, 71, 3951–3963. [Google Scholar] [CrossRef]
  22. Choi, T.M.; Guo, S.; Liu, N.; Shi, X. Optimal pricing in on-demand-service-platform-operations with hired agents and risk-sensitive customers in the blockchain era. Eur. J. Oper. Res. 2020, 284, 1031–1042. [Google Scholar] [CrossRef]
  23. Lu, Q.; Liao, C.; Chen, X. The blockchain adoption strategies of online retailer in a dual-channel supply chain. Int. J. Prod. Econ. 2024, 274, 109322. [Google Scholar] [CrossRef]
  24. Choi, T.M. Creating all-win by blockchain technology in supply chains: Impacts of agents’ risk attitudes towards cryptocurrency. J. Oper. Res. Soc. 2021, 72, 2580–2595. [Google Scholar] [CrossRef]
  25. Zhao, Q.; Fan, Z.P.; Sun, M. Sales mode selection and blockchain technology adoption decisions in a platform supply chain. Int. J. Prod. Econ. 2024, 272, 109255. [Google Scholar] [CrossRef]
  26. Gupta, S.; Modgil, S.; Choi, T.M.; Kumar, A.; Antony, J. Influences of artificial intelligence and blockchain technology on financial resilience of supply chains. Int. J. Prod. Econ. 2023, 261, 108868. [Google Scholar] [CrossRef]
  27. Choi, T.M.; Guo, S.; Luo, S. When blockchain meets social-media: Will the result benefit social media analytics for supply chain operations management? Transp. Res. Part E Logist. Transp. Rev. 2020, 135, 101860. [Google Scholar] [CrossRef]
  28. Choi, T.M. Blockchain-technology-supported platforms for diamond authentication and certification in luxury supply chains. Transp. Res. Part E Logist. Transp. Rev. 2019, 128, 17–29. [Google Scholar] [CrossRef]
  29. Pun, H.; Swaminathan, J.M.; Hou, P. Blockchain adoption for combating deceptive counterfeits. Prod. Oper. Manag. 2021, 30, 864–882. [Google Scholar] [CrossRef]
  30. Zhu, S.; Li, J.; Wang, S.; Xia, Y.; Wang, Y. The role of blockchain technology in the dual-channel supply chain dominated by a brand owner. Int. J. Prod. Econ. 2023, 258, 108791. [Google Scholar] [CrossRef]
  31. Choi, T.M.; Ouyang, X. Initial coin offerings for blockchain based product provenance authentication platforms. Int. J. Prod. Econ. 2021, 233, 107995. [Google Scholar] [CrossRef]
  32. Li, Z.; Xu, X.; Bai, Q.; Guan, X.; Zeng, K. The interplay between blockchain adoption and channel selection in combating counterfeits. Transp. Res. Part E Logist. Transp. Rev. 2021, 155, 102451. [Google Scholar] [CrossRef]
  33. Vandenbosch, M.B.; Weinberg, C.B. Product and price competition in a two-dimensional vertical differentiation model. Mark. Sci. 1995, 14, 224–249. [Google Scholar] [CrossRef]
  34. Kuksov, D.; Lin, Y. Information provision in a vertically differentiated competitive marketplace. Mark. Sci. 2010, 29, 122–138. [Google Scholar] [CrossRef]
  35. Tian, C.; Xiao, T.; Shang, J. Channel differentiation strategy in a dual-channel supply chain considering free riding behavior. Eur. J. Oper. Res. 2022, 301, 473–485. [Google Scholar] [CrossRef]
  36. Xu, J.; You, X.; Li, Y.; Lu, J. Channel and pricing strategy of competing retailers in a two-stage supply chain. IEEE Trans. Eng. Manag. 2020, 69, 2882–2896. [Google Scholar] [CrossRef]
  37. Jing, B. Customer recognition in experience vs. inspection good markets. Manag. Sci. 2016, 62, 216–224. [Google Scholar] [CrossRef]
  38. Tang, C.S.; Yoo, O.S.; Zhan, D. When should grocery stores adopt time-based pricing? Impact of competition and negative congestion externality. Prod. Oper. Manag. 2023, 32, 2805–2824. [Google Scholar] [CrossRef]
  39. Nire, K.; Matsubayashi, N. Entry decisions for vertically differentiated markets with brand spillovers. Eur. J. Oper. Res. 2024, 314, 565–578. [Google Scholar] [CrossRef]
  40. Zhou, Z.Z.; Choudhary, V. Impact of competition from open source software on proprietary software. Prod. Oper. Manag. 2022, 31, 731–742. [Google Scholar] [CrossRef]
  41. Zhao, C.; Wang, X.; Xiao, Y.; Sheng, J. Effects of online reviews and competition on quality and pricing strategies. Prod. Oper. Manag. 2022, 31, 3840–3858. [Google Scholar] [CrossRef]
  42. Guan, H.; Geng, X.; Gurnani, H. Peer-to-peer sharing platforms with quality differentiation: Manufacturer’s strategic decision under sharing economy. Prod. Oper. Manag. 2023, 32, 485–500. [Google Scholar] [CrossRef]
  43. Lu, L.; Menezes, M.B. Supply chain vertical competition and product proliferation under different power structures. Int. J. Prod. Econ. 2024, 267, 109097. [Google Scholar] [CrossRef]
  44. Zhou, W.; Huang, W.; Hsu, V.N.; Guo, P. On the benefit of privatization in a mixed duopoly service system. Manag. Sci. 2023, 69, 1486–1499. [Google Scholar] [CrossRef]
  45. Li, Y.; Jiang, S.; Shi, J.; Wei, Y. Pricing strategies for blockchain payment service under customer heterogeneity. Int. J. Prod. Econ. 2021, 242, 108282. [Google Scholar] [CrossRef]
  46. Kwark, Y.; Chen, J.; Raghunathan, S. User-generated content and competing firms’ product design. Manag. Sci. 2017, 64, 4608–4628. [Google Scholar] [CrossRef]
  47. Xu, J.; Huang, Y.; Avgerinos, E.; Feng, G.; Chu, F. Dual-channel competition: The role of quality improvement and price-matching. Int. J. Prod. Res. 2021, 60, 3705–3727. [Google Scholar] [CrossRef]
  48. Ye, F.; Liu, S.; Li, Y.; Zhan, Y.; Cai, Z.; Kumar, A. Early adopter or follower? The strategic equilibrium of blockchain technology adoption strategy for competing agri-food supply chains. IEEE Trans. Eng. Manag. 2022, 71, 12385–12399. [Google Scholar] [CrossRef]
  49. Liu, S.S.; Hua, G.; Ma, B.J.; Cheng, T.C.E. Competition between green and non-green products in the blockchain era. Int. J. Prod. Econ. 2023, 264, 108970. [Google Scholar] [CrossRef]
  50. Niu, B.; Ruan, Y.; Xu, H. Turn a blind eye? E-tailer’s blockchain participation considering upstream competition between copycats and brands. Int. J. Prod. Econ. 2023, 265, 109009. [Google Scholar] [CrossRef]
Figure 1. Three competitive scenarios.
Figure 1. Three competitive scenarios.
Systems 13 00941 g001
Figure 2. Comparisons of three competitive scenarios for the premium firm.
Figure 2. Comparisons of three competitive scenarios for the premium firm.
Systems 13 00941 g002
Figure 3. Comparison of three scenarios for the typically authentic firm when h is not high.
Figure 3. Comparison of three scenarios for the typically authentic firm when h is not high.
Systems 13 00941 g003
Figure 4. Comparison of three scenarios for the typically authentic firm when h may be high.
Figure 4. Comparison of three scenarios for the typically authentic firm when h may be high.
Systems 13 00941 g004
Figure 5. The win-win situation for both firms (Note. c = 0.1 , h = 0.54 ).
Figure 5. The win-win situation for both firms (Note. c = 0.1 , h = 0.54 ).
Systems 13 00941 g005
Table 1. Notations.
Table 1. Notations.
NotationDescription
i Subscript for firms (or products), i a , a 1 , a 2 , d
a Authentic firm (or authentic product) in a monopoly
a 1 Authentic firm (or authentic product) in a competition
a 2 Premium firm (or premium product) in a competition
d Deceptive counterfeiter (or deceptive counterfeit product)
j Superscript for scenarios in two markets, j N , B , N N , N B , B B
N No use of BCT in a monopoly
B Use of BCT in a monopoly
N N No use of BCT in both firms in a competition
N B a 1 adopts BCT and a 2 does not adopt BCT in a competition
B B Both firms adopt BCT in a competition
θ Consumers’ taste for the quality of the product
λ Probability of deceptive counterfeits in the market
s Searchable quality of an authentic product
h Experiential quality of an authentic product
h Experiential quality of a premium product
δ d Discount factor of the experiential quality of a deceptive counterfeit
μ Security level of BCT traceability, μ 0 ,   1
q i Quality of a product i , i a , a 1 , a 2 , d
p i j Retail price of a product i in Scenario j
D i j Demand for a product i in Scenario j
Π i j Profits of the firm i in Scenario j
c Sensitivity of marginal cost to quality ( 0 < c < 1 2 )
Table 2. Comparisons of results in three competitive scenarios.
Table 2. Comparisons of results in three competitive scenarios.
FirmsTypically Authentic Firm ( a 1 )Premium Firm ( a 2 )
P a i * P a 1 N N * < P a 1 B B * < P a 1 N B * P a 2 N N * < P a 2 B B * < P a 2 N B *
D a i * D a 1 N B * < D a 1 B B * < D a 1 N N * D a 2 N N * < D a 2 B B * < D a 2 N B *
Π a i * Π a 1 N N * < Π a 1 B B * < Π a 1 N B * Π a 2 N N * < Π a 2 B B * < Π a 2 N B *
Table 3. Variation in variables with parameters in three scenarios.
Table 3. Variation in variables with parameters in three scenarios.
ScenariosScenario NNScenario NBScenario BB
Parameters λ h λ μ h λ μ h
P a 1 i j * + + / + + + +
P a 2 i j * + + / + + + +
D a 1 i j * + \ + / + + \
D a 2 i j * \ + / + + \
Π a 1 i j * + + / + / + + +
Π a 2 i j * + + / + + / + +
(Note. ‘ + ’ means that the left variable increases with the upper parameter; ‘ ’ means that the left variable decreases with the upper parameter, ‘ \ ’ means parameter has no definition or relevant influence relationship in the corresponding scenario.)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shao, Z.; Chen, S.; Yang, Y.; Si, Y.; Meng, W. Blockchain Adoption to Fight Counterfeiting at the Source in a Vertically Differentiated Competition. Systems 2025, 13, 941. https://doi.org/10.3390/systems13110941

AMA Style

Shao Z, Chen S, Yang Y, Si Y, Meng W. Blockchain Adoption to Fight Counterfeiting at the Source in a Vertically Differentiated Competition. Systems. 2025; 13(11):941. https://doi.org/10.3390/systems13110941

Chicago/Turabian Style

Shao, Ze, Shaohua Chen, Yi Yang, Yujing Si, and Weigao Meng. 2025. "Blockchain Adoption to Fight Counterfeiting at the Source in a Vertically Differentiated Competition" Systems 13, no. 11: 941. https://doi.org/10.3390/systems13110941

APA Style

Shao, Z., Chen, S., Yang, Y., Si, Y., & Meng, W. (2025). Blockchain Adoption to Fight Counterfeiting at the Source in a Vertically Differentiated Competition. Systems, 13(11), 941. https://doi.org/10.3390/systems13110941

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop