Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Credential Status

A property in a W3C Verifiable Credential that points to a mechanism, like a revocation list, for checking if the credential is still valid.
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is Credential Status?

Credential Status is a mechanism for checking the current validity of a verifiable credential without revealing its contents.

In decentralized identity systems, a Credential Status is a critical component that allows a verifier to check if a credential, such as a digital driver's license or university degree, is still valid and has not been revoked by its issuer. Unlike a paper certificate, a digital credential is dynamic; its validity can change after issuance. The status mechanism provides a privacy-preserving way to query this state, typically by checking a cryptographically secure status list or registry, without the verifier needing to contact the issuer directly for each verification. This is a core feature of standards like W3C Verifiable Credentials.

The most common implementation is the Status List 2021 specification, which uses a bitstring—a compressed array of bits—where each bit represents the revocation status of a single credential. The issuer publishes this list, often as a Verifiable Credential itself, to a decentralized or publicly accessible location. When a holder presents their credential, the verifier uses an index number embedded within it to check the corresponding bit in the status list. A 0 typically means active, while a 1 means revoked. This approach is efficient and scalable, as one list can manage the status for thousands of credentials.

Credential status checks are essential for real-world use cases where trust must be current. For example, a professional license could be suspended, an employee's access badge deactivated, or a payment credential flagged for fraud. Without a reliable status mechanism, verifiers would have to trust all presented credentials indefinitely or rely on inefficient, centralized call-back systems. By enabling real-time, cryptographic status checks, this mechanism supports selective disclosure and user-centric identity while maintaining the issuer's necessary control over their attestations.

how-it-works
VERIFIABLE CREDENTIALS

How Credential Status Works

Credential status is the mechanism for checking the real-time validity of a verifiable credential, determining if it has been revoked, suspended, or is still active.

Credential status is a critical component of verifiable credentials (VCs), providing a dynamic check on whether an issued credential is still valid. Unlike the static data within the credential itself, status is a live property that can change after issuance. This mechanism prevents the use of credentials that have been revoked by the issuer (e.g., a driver's license suspended for violations) or suspended temporarily. The status check is typically performed by a verifier during the presentation process, ensuring they only accept credentials that are currently authorized.

The most common technical pattern for implementing credential status is the Status List, as defined in the W3C Verifiable Credentials Data Model. In this model, a cryptographic bitstring (a Status List) is created, where each bit represents the status of a single credential. A value of 0 typically indicates the credential is valid, while a 1 indicates it is revoked. The credential contains a statusPurpose (like "revocation" or "suspension") and an statusListIndex pointing to its specific bit position. The verifier fetches the current Status List from a trusted URI and checks the bit at the given index to determine the credential's state.

Several specific status list types exist to optimize for different use cases. The StatusList2021 entry uses a compressed bitstring stored in a verifiable credential itself, enabling decentralized and privacy-preserving checks. Revocation Lists are a subset focused solely on permanent revocation. For more granular, event-based status, Linked Data Proof Validity Proofs can be used. The choice of mechanism involves trade-offs between privacy, decentralization, performance, and the specific revocation semantics required by the credential ecosystem.

From an architectural perspective, credential status introduces a trusted data source—the status list issuer or registry. This entity must be highly available and integrity-protected, as verifiers rely on its information. Status checks can be performed off-chain (querying a traditional database or API) or on-chain (querying a smart contract or decentralized ledger), each with distinct security and scalability implications. Proper implementation requires careful management of key rotation for status list signing and considerations for privacy, such as avoiding correlation through the timing of status checks.

In practice, credential status enables real-world trust models. For example, a university can revoke a digital diploma if academic misconduct is later discovered, or a corporate issuer can suspend an employee's access badge credential upon termination. The status list credential itself is often signed by the issuer, making its contents tamper-evident. This creates a verifiable chain of trust from the original credential to its current status, allowing ecosystems to remain secure and responsive without requiring the re-issuance of all credentials when a single credential's state changes.

key-features
VERIFIABLE CREDENTIALS

Key Features of Credential Status

Credential Status is the mechanism for determining the current validity of a Verifiable Credential (VC), enabling issuers to revoke or suspend credentials without modifying the original signed data.

01

Status List Method

The W3C-recommended standard for efficient revocation. It uses a bitstring status list where each credential is assigned a specific bit position. A value of 0 indicates the credential is valid, while 1 indicates revoked. This allows a single, compact list to manage the status of thousands of credentials, drastically reducing on-chain data and computational overhead compared to per-credential checks.

02

Revocation vs. Suspension

Credential status supports two distinct states of invalidity. Revocation is permanent, typically used when a credential should never be valid again (e.g., a lost ID). Suspension is temporary, allowing an issuer to pause a credential's validity (e.g., for investigation) with the potential to later reinstate it. The status list bit can represent either state, with the semantics defined by the issuer's governance policy.

03

Decentralized Verification

Status checks are performed by verifiers (relying parties) without contacting the issuer directly. The verifier fetches the current status list (hosted at a URI in the credential's credentialStatus field) and checks the bit at the credential's index. This enables offline-first, privacy-preserving verification while ensuring the credential's validity is governed by a trusted, updatable source.

04

CredentialStatus Object

The technical field embedded within a Verifiable Credential that defines how to check its status. It is a JSON object containing:

  • id: The unique URI of the status list.
  • type: The status method (e.g., StatusList2021Entry).
  • statusPurpose: Either revocation or suspension.
  • statusListIndex: The integer position of the credential's status bit in the list.
  • statusListCredential: The URI of the Verifiable Credential that contains the status list itself.
05

On-Chain vs. Off-Chain Models

Status lists can be anchored to different infrastructures for trust and availability. On-Chain models store the list's hash or the list itself on a blockchain (e.g., Ethereum, ION), providing strong tamper-evidence and censorship resistance. Off-Chain models host the list on a traditional web server or distributed file system (e.g., IPFS), offering higher scalability and lower cost, with trust derived from the issuer's signature on the status list VC.

06

Selective Disclosure for Privacy

Advanced status protocols enable privacy-preserving revocation checks. Using zero-knowledge proofs (ZKPs), a holder can prove their credential is not revoked without revealing the credential's unique identifier or its position in the status list. This prevents verifiers from correlating different presentations from the same holder, a critical feature for building anonymous yet accountable credential systems.

status-list-types
VERIFIABLE CREDENTIALS

Common Credential Status List Types

A credential's status indicates its current validity. These are the primary technical mechanisms for checking if a credential has been suspended, revoked, or expired.

02

Revocation List 2020

An earlier bitstring-based status protocol that stores revocation status in a verifiable credential itself. The issuer signs a credential containing the revocation list, which verifiers must fetch and parse.

  • Key Difference: The list is a signed credential, not a standalone resource.
  • Trade-off: Simpler to implement but requires verifiers to process the entire list object.
03

JSON-LD Credential Status

A flexible, schema-based approach using JSON-LD contexts. It defines a credentialStatus property within the credential, pointing to a service endpoint or a cryptographic proof for checking status.

  • Use Case: Enables custom status mechanisms like smart contract checks or Oracle queries.
  • Advantage: Highly extensible and can integrate with existing blockchain or database systems.
04

OIDC SIOP Status

Status checking integrated with OpenID Connect Self-Issued OP (SIOP) flows. Relies on the OIDC provider's backend to assert credential validity during the authentication handshake, often using a distributed ledger or a centralized registry.

  • Context: Primarily for decentralized identity (DID) and sign-in protocols.
  • Mechanism: Status is embedded within the ID Token or verified via a separate endpoint call.
05

Dynamic Registry

A status mechanism where the credential points to a live, queryable registry (e.g., a smart contract, API, or blockchain). The verifier queries this registry in real-time using a credential-specific identifier.

  • Characteristics: Enables real-time revocation and complex status logic.
  • Drawback: Requires the registry to be highly available and introduces latency.
06

Timestamp & Expiry

The most fundamental status controls: validFrom and validUntil timestamps defined in the credential's payload. Validity is determined by comparing current time against these fields.

  • Universal: Supported by all credential formats.
  • Limitation: Cannot handle mid-term revocation; only provides binary expiration.
technical-details
DATA MODEL

Credential Status

Credential Status is a critical mechanism within verifiable credentials that enables the real-time verification of a credential's validity, independent of its issuance.

In the W3C Verifiable Credentials Data Model, the credentialStatus property is an optional field that points to a status list or service where a verifier can check if a credential has been revoked, suspended, or otherwise changed state. This mechanism decouples the credential's cryptographic proof from its current validity, allowing issuers to manage the lifecycle of credentials after they have been issued. Common implementations include Status List 2021 and revocation registries, which provide a privacy-preserving way to check status without revealing the specific credential being verified.

The status check is performed by a verifier querying the endpoint or list referenced in the credentialStatus field. For example, a credential might contain a property like "credentialStatus": { "id": "https://example.edu/status/1", "type": "StatusList2021Entry" }. The verifier fetches the status list from that URL and uses an indexed bit to determine the credential's state. This design is essential for credentials that have a long lifespan, such as professional licenses or academic degrees, where the issuing authority must retain the ability to revoke them in cases of misconduct or expiration.

Implementing credential status effectively requires careful architectural choices. Key considerations include the availability and performance of the status service, as verifiers rely on it for real-time checks. Privacy is also paramount; modern schemes like bitstring status lists allow a verifier to check a single bit without learning the status of any other credentials on the list. Furthermore, the choice between a centralized status service and a decentralized one (e.g., anchored on a blockchain) involves trade-offs between control, censorship resistance, and operational complexity for the issuer.

ecosystem-usage
CREDENTIAL STATUS

Ecosystem Usage & Standards

Credential status defines the mechanisms for verifying the current validity of a digital attestation, such as a Verifiable Credential (VC). This section details the standards and methods used to check if a credential has been revoked, suspended, or expired.

01

Status List 2021 (W3C)

A W3C standard that defines a privacy-preserving method for credential revocation using a bitstring status list. Each credential is mapped to a specific bit in a cryptographically signed list. A value of 0 indicates the credential is valid, while 1 indicates it is revoked. This allows for efficient, batch status checks without revealing which specific credential is being verified.

  • Mechanism: Status is encoded in a JSON Web Signature (JWS) or JSON Web Token (JWT).
  • Privacy: Verifiers only learn if the credential is valid, not the holder's other credentials.
  • Example: A university issues a diploma VC and publishes a status list. Employers can check the list's signature and the relevant bit to confirm the diploma is still valid.
02

Revocation Registries

A decentralized ledger-based approach, often used with Decentralized Identifiers (DIDs), where credential issuers publish revocation events to a verifiable data registry (e.g., a blockchain). The status is checked by querying the registry for the credential's unique identifier.

  • Common in: Hyperledger Indy, Sovrin, and other SSI (Self-Sovereign Identity) frameworks.
  • Process: The issuer creates a revocation registry on the ledger. To revoke, they publish a cryptographic accumulator delta (like a CL signature).
  • Verification: The verifier fetches the latest registry state and the non-revocation proof from the holder to cryptographically verify status.
03

Timestamp & Expiry

The most basic form of status management, using time-based fields within the credential's metadata. Validity is determined by comparing the current time against these predefined fields.

  • validFrom: The datetime when the credential becomes active.
  • validUntil or expirationDate: The datetime after which the credential is no longer valid.
  • Limitation: This method cannot handle mid-lifecycle revocation (e.g., a driver's license being suspended). It is often used in conjunction with a revocation mechanism like a status list.
04

OAuth 2.0 Token Introspection

A standard RFC 7662 method where a verifier (resource server) queries the authorization server's introspection endpoint to check the active state of a presented token. While not a native VC standard, this pattern is adapted for credential status in some enterprise and OpenID Connect implementations.

  • Flow: The verifier sends the token to a trusted issuer endpoint.
  • Response: The endpoint returns a JSON object with an active boolean and other metadata.
  • Use Case: Often used for API access tokens and can be extended to manage the status of Verifiable Presentations in walled-garden ecosystems.
05

Selective Disclosure & Status

Advanced cryptographic schemes allow a holder to prove a credential is valid without revealing its unique identifier, enabling privacy-preserving status checks. This is a core feature of Zero-Knowledge Proof (ZKP) based credentials.

  • Mechanism: Using BBS+ signatures or similar, the holder can generate a proof that their credential is both unrevoked and contains certain claims, without disclosing the credential ID or other sensitive data.
  • Benefit: Prevents correlation across different verifications, as the verifier cannot link the status check back to a specific entry in a public revocation list.
06

Real-World Implementation: EU Digital COVID Certificates

A large-scale, real-world deployment of credential status checking. The EU DCC system used a blacklist (revocation list) of compromised or invalid certificate identifiers.

  • Status Mechanism: National health authorities published signed JSON lists of revoked certificate unique identifiers (UVCI).
  • Verification App Flow: The verifier app would download the latest revocation list, check its digital signature, and then check if the presented certificate's ID was on the list.
  • Scale: Demonstrated the operational challenges of distributing and updating revocation lists across multiple jurisdictions in near real-time.
security-considerations
CREDENTIAL STATUS

Security & Privacy Considerations

Credential status mechanisms determine how a verifiable credential's validity is checked and revoked, directly impacting the security model and privacy guarantees of a decentralized identity system.

02

Revocation Registries

A blockchain-anchored method, often used with Indy-style credentials, where a revocation registry (e.g., a cryptographic accumulator) is published to a ledger. The credential includes a revocation registry identifier and a private witness. To prove validity, the holder demonstrates their credential is not in the published accumulator without revealing its specific identifier, offering strong privacy.

03

On-Chain vs. Off-Chain Status Checks

The trade-off between decentralization and efficiency in status verification.

  • On-Chain: Status is written to a public ledger (e.g., Ethereum, Sovrin). Provides tamper-proof audit trails but incurs transaction costs and latency.
  • Off-Chain: Status is managed by the issuer via an API or a status list credential. Offers high performance and low cost but re-introduces a point of centralization and issuer availability risk.
04

Privacy Risks in Status Checks

How status verification can leak sensitive information about the credential holder.

  • Correlation: Frequent checks of the same status list can link a holder's activities across different verifiers.
  • Timing Attacks: The act of checking status can reveal the exact moment a credential is presented.
  • Identifier Exposure: Some methods require sending a unique credential identifier to the issuer's server, breaking holder-centric privacy models.
05

Selective Disclosure for Status

Advanced cryptographic techniques that allow a holder to prove a credential is valid without revealing its full identifier or linking to previous presentations.

  • Zero-Knowledge Proofs (ZKPs): Enable a holder to generate a proof that their credential's status bit is 0 (valid) without revealing the index.
  • BBS+ Signatures: Allow for derived proofs where status can be proven as part of a larger selective disclosure set, minimizing data leakage.
06

Issuer Availability & Censorship

The security dependency on the credential issuer's operational status and integrity.

  • Availability Risk: If an issuer's status endpoint goes offline, all credentials become unverifiable, creating a single point of failure.
  • Censorship Risk: A malicious or coerced issuer could falsely revoke credentials or deny status checks.
  • Mitigations: Use decentralized status lists (e.g., on IPFS), long-lived status credentials, or persistent on-chain registries to reduce this dependency.
CREDENTIAL STATUS

Frequently Asked Questions (FAQ)

Credential status is a critical mechanism for managing the validity and revocation of digital attestations. These questions address how status is checked, updated, and secured across different systems.

Credential status is a mechanism for determining if a digital credential, like a Verifiable Credential (VC), is currently valid, suspended, or revoked. It is crucial for maintaining trust in decentralized identity systems, as the data in a credential (e.g., a university degree or professional license) can become outdated or be rescinded by the issuer. Without a reliable status check, verifiers cannot trust that the credential presented to them is still authoritative, undermining the entire system's integrity. Status mechanisms prevent the use of compromised or expired credentials in access control, KYC processes, and other trust-based interactions.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team