Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Revocation Registry

A revocation registry is a cryptographically secure data structure, maintained by an issuer, that lists the unique identifiers of verifiable credentials that have been revoked and are no longer valid.
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is a Revocation Registry?

A core component of verifiable credential systems that enables the selective invalidation of credentials without revealing the holder's identity.

A revocation registry is a tamper-evident data structure, typically implemented as a cryptographic accumulator or a smart contract, that allows an issuer to revoke a previously issued verifiable credential (VC). It provides a mechanism for verifiers to check the current status of a credential—whether it is still valid or has been revoked—without the issuer needing to be contacted directly for each verification, preserving privacy and enabling offline verification. This is a critical feature for maintaining trust and security in decentralized identity ecosystems like W3C Verifiable Credentials and Self-Sovereign Identity (SSI) frameworks.

The registry works by publishing a revocation list or updating a cryptographic proof (like a non-membership proof) on a decentralized ledger or another verifiable data registry. When a credential is issued, it is cryptographically linked to an entry in this registry. To revoke it, the issuer updates the registry to mark that specific entry as invalid. During verification, a holder presents their credential along with a current, valid cryptographic proof from the registry demonstrating the credential is not on the revocation list, allowing the verifier to trust its status.

Common technical implementations include revocation bitmaps (like in Hyperledger Indy/Aries), accumulator-based registries (using technologies like CL signatures), and smart contract-based registries (used in Ethereum-based systems like Veramo or Ethereum Attestation Service). Each method balances trade-offs between privacy, on-chain gas costs, and computational overhead for generating and verifying proofs. The choice of registry type directly impacts the system's scalability and the privacy guarantees it offers to credential holders.

Without a revocation registry, verifiable credentials would be static, irrevocable assertions, making them unsuitable for real-world use cases where credentials have a limited lifespan or may need to be invalidated due to loss, compromise, or changed circumstances. Essential applications include academic diplomas, professional licenses, membership cards, and Know Your Customer (KYC) attestations, where the ability to revoke is as important as the ability to issue.

how-it-works
VERIFIABLE CREDENTIALS

How a Revocation Registry Works

A technical explanation of the mechanism for revoking digital credentials in decentralized identity systems.

A revocation registry is a cryptographically secure, tamper-evident ledger or data structure that tracks the revocation status of Verifiable Credentials (VCs) without revealing the credential holder's identity. It functions as a critical component of decentralized identity systems, enabling issuers to invalidate credentials—such as a driver's license or professional certification—after they have been issued, while allowing verifiers to check this status efficiently and privately. This mechanism is essential for maintaining the integrity and trustworthiness of credential ecosystems over time.

The core mechanism often involves the issuer publishing a cryptographic accumulator, such as a revocation list or a cryptographic accumulator like a RSA accumulator or Merkle tree, to a verifiable data registry (e.g., a blockchain). When a credential is issued, it is cryptographically linked to a unique, non-identifying element within this accumulator, such as a leaf in a Merkle tree. To revoke it, the issuer updates the accumulator to exclude that element. The verifier then checks a cryptographic proof—like a non-membership proof—against the current state of the registry to confirm the credential is still valid.

This design prioritizes privacy-preserving verification. A verifier can confirm a credential is not revoked without learning which specific credential is being checked or querying a centralized database about the holder. For example, using a bitstring status list, the issuer publishes an encrypted list where each bit corresponds to a credential's status; the holder provides a cryptographic proof revealing only the status of their specific bit. This approach, standardized in W3C Status List 2021, balances efficiency with minimal data disclosure.

Implementing a revocation registry involves key technical decisions: the choice of accumulator type (e.g., simple list vs. dynamic accumulator), the update frequency (real-time vs. batched), and the underlying infrastructure (permissioned blockchain, decentralized ledger, or a traditional database with verifiable logs). Each choice involves trade-offs between cost, scalability, privacy, and the timeliness of revocation status. Systems like Hyperledger Indy use a specialized blockchain to host revocation registries, while other frameworks may use more lightweight, off-chain designs.

key-features
DECENTRALIZED IDENTITY

Key Features of a Revocation Registry

A revocation registry is a critical component of decentralized identity systems, providing a mechanism to invalidate credentials without compromising user privacy or requiring a central authority.

01

Immutable Revocation Log

A revocation registry functions as an immutable, append-only ledger (often on a blockchain) that records the status of credentials. When a credential is revoked, a cryptographic proof of its invalidity—such as a revocation index or accumulator delta—is published to the registry. This creates a permanent, tamper-proof record that verifiers can query to check a credential's current validity state.

02

Selective Disclosure & Privacy

Advanced registries use cryptographic accumulators (like RSA accumulators or Merkle trees) to enable zero-knowledge proofs of non-revocation. This allows a holder to prove their credential is still valid without revealing its unique identifier or linking multiple presentations. This preserves unlinkability and minimal disclosure, key privacy principles of Self-Sovereign Identity (SSI).

03

Decentralized Governance

Control over the registry is distributed to prevent a single point of failure or control. Governance models include:

  • Issuer-Held: The credential issuer maintains their own registry.
  • Ledger-Anchored: The registry state is anchored to a public blockchain (e.g., Ethereum, Sovrin).
  • Holder-Mediated: The credential holder manages proof of non-revocation, often via a revocation status list in their digital wallet. This removes reliance on a central revocation authority.
04

Efficient State Proofs

To avoid requiring verifiers to download the entire registry history, systems generate compact state proofs. For a Merkle tree-based registry, this is a Merkle proof demonstrating that a credential's identifier is not in the tree's revoked leaves. For accumulator-based systems, it's a witness that proves membership in the valid set. These proofs are small and verifiable in constant time (O(1)).

05

Temporal Validity & Sliding Windows

Registries often incorporate time-based validity to automate revocation. Features include:

  • Expiration Timestamps: Credentials auto-revoke after a set time.
  • Status List Validity Periods: A revocation status list (like a W3C StatusList2021) is issued with a short validity window, requiring periodic refresh.
  • Sliding Window Accumulators: The accumulator state updates at regular intervals (e.g., daily), and proofs are valid only for that period, forcing regular updates and limiting historical tracking.
06

Interoperability Standards

To ensure cross-system functionality, revocation registries implement open standards. Key specifications include:

  • W3C Verifiable Credentials: Defines the credentialStatus property for pointing to a revocation registry entry.
  • W3C StatusList2021: A standard for bit-packed status lists (revocation or suspension).
  • Hyperledger AnonCreds: Uses CL signatures and revocation registries on a distributed ledger.
  • DIF Sidetree Protocol: Enables scalable Decentralized Identifiers (DIDs) with revocation capabilities.
examples
REVOCATION REGISTRY

Examples & Implementations

Revocation registries are implemented across various decentralized identity frameworks and credential systems to manage credential status. These examples highlight different architectural approaches and real-world use cases.

02

W3C Verifiable Credentials Status

The W3C Verifiable Credentials Data Model specification defines a standard credentialStatus property. This allows a credential to point to a revocation registry for status checks. Common implementations include:

  • Status List 2021: Encodes revocation statuses into a compressed bitstring (like a bitmap) stored in a verifiable credential itself or on a public ledger.
  • Revocation List 2020: A similar approach using JSON-LD and linked data proofs. This standard enables interoperability between different DID (Decentralized Identifier) methods and credential formats.
03

Ethereum-Based Registries (ERC-xxxx)

On Ethereum and other smart contract platforms, revocation registries are often implemented as smart contracts. These contracts maintain a mapping (e.g., from credential ID to status) that can be updated by the issuer and queried by verifiers. Key design patterns include:

  • Merkle Tree Roots: Storing a root hash on-chain, with off-chain proofs for privacy.
  • State Channels: Using layer-2 solutions for cheaper, faster status updates.
  • ZKP Integration: Combining with zero-knowledge proofs (ZKPs) to allow proving non-revocation without revealing the credential ID.
04

Sovrin Network

Sovrin is a public utility permissioned ledger specifically designed for SSI. Its revocation registry implementation is built on the Hyperledger Indy codebase. It uses a cryptographic accumulator (a type of RSA accumulator) where the registry is a single, large number. Revoking a credential changes the accumulator value, and holders must obtain a new witness to prove their credential is still valid. This allows for constant-size proofs regardless of the number of revoked credentials.

06

Practical Use Cases

Revocation registries enable real-world, revocable credentials:

  • Employee Badges: A company can instantly revoke access credentials for a departed employee.
  • University Diplomas: A university can revoke a degree if academic misconduct is discovered.
  • Professional Licenses: Medical or financial licenses can be suspended by the issuing authority.
  • KYC/AML Credentials: A DeFi protocol can check if a user's KYC credential from a provider is still valid before granting access, complying with regulatory requirements.
COMPARISON

Revocation Registry vs. Traditional Revocation

A technical comparison of credential revocation mechanisms, contrasting decentralized, on-chain registries with centralized, off-chain methods.

FeatureRevocation Registry (On-Chain)Traditional Revocation (Off-Chain)

Architecture & Control

Decentralized, cryptographically verifiable

Centralized, issuer-controlled

Verification Latency

< 1 sec (on-chain query)

Seconds to minutes (API call)

Revocation Proof

Zero-knowledge proof or Merkle proof

Signed revocation list (CRL) or OCSP response

Issuer Dependency Post-Issuance

None (registry is permissionless)

Full (verifier must trust issuer's live endpoint)

Censorship Resistance

High (immutable, global state)

Low (issuer can block access)

Verifier Workflow Complexity

Simple state check

Complex (CRL parsing, OCSP stapling)

Privacy for Holder

High (selective disclosure of non-revocation)

Low (may reveal credential ID to issuer)

Typical Infrastructure Cost

Gas fee per update ($0.10 - $5.00)

Server maintenance & scaling costs

security-considerations
REVOCATION REGISTRY

Security & Privacy Considerations

A revocation registry is a critical component in decentralized identity and credential systems, enabling the selective and verifiable invalidation of credentials without compromising user privacy or requiring a central authority.

01

Core Mechanism: Accumulators & Witnesses

A revocation registry uses cryptographic accumulators (like RSA or Merkle trees) to represent a set of valid credentials. To prove a credential is still valid, a witness (a cryptographic proof) is generated, demonstrating the credential's inclusion in the accumulator. Revocation updates the accumulator, invalidating the witness for the revoked credential without revealing which specific credential was revoked.

02

Privacy-Preserving Revocation

Unlike a simple blacklist, a well-designed registry supports selective disclosure. A verifier can confirm a credential is not revoked without learning the credential's unique identifier or the holder's other credentials. This is achieved through zero-knowledge proofs (ZKPs) that prove the witness is valid for the current accumulator state, revealing nothing else.

03

Key Security Threats

  • Registry Compromise: If the private key for an RSA accumulator is leaked, an attacker can forge valid witnesses or revoke arbitrary credentials.
  • Witness Freshness Attacks: Using a stale witness to prove a revoked credential is still valid. Mitigated by requiring timestamps or linking to the latest accumulator state.
  • Denial-of-Service via Registry Update: Malicious or frequent updates can burden credential holders who must constantly fetch new witnesses.
  • Linkability: Poor implementation can allow verifiers to link multiple presentations from the same holder by tracking witness patterns.
04

Registry Governance & Update Models

Who controls the registry and how it's updated are critical design choices.

  • Centralized Issuer Control: The credential issuer (e.g., a university) manages the registry. Simple but re-introduces a trusted party.
  • Decentralized/Blockchain-Based: The registry's state (e.g., the accumulator root hash) is anchored on a blockchain, providing transparency and auditability of updates. However, update frequency must be balanced with on-chain costs.
  • Holder-Local Updates: Credential holders periodically fetch delta updates to their witness, reducing issuer load but increasing holder responsibility.
06

Performance & Scalability Trade-offs

Different accumulator types present trade-offs:

  • RSA Accumulators: Provide constant-size witnesses and accumulator, but require a trusted setup and have computationally expensive updates.
  • Merkle Tree Accumulators (e.g., CL Signatures): Witness size is logarithmic to the number of credentials. Updates are more efficient, but proofs are larger. No trusted setup required.
  • Dynamic Accumulators: Allow efficient addition and deletion of members, crucial for a practical revocation system. The choice impacts system throughput, cost, and trust assumptions.
REVOCATION REGISTRY

Common Misconceptions

Clarifying the purpose, mechanics, and limitations of revocation registries in decentralized identity systems.

No, a revocation registry is not a centralized blacklist; it is a decentralized mechanism for managing the status of credentials without revealing the identity of the holder. Unlike a traditional blacklist, which is a single list of banned entities, a revocation registry uses cryptographic accumulators or similar structures to allow selective disclosure. A verifier can check if a specific credential (identified by its unique credential index) is still valid by querying the registry, but cannot see all revoked credentials at once. This preserves privacy and aligns with the principles of self-sovereign identity (SSI).

REVOCATION REGISTRY

Technical Details

A revocation registry is a critical component of verifiable credential systems, enabling credential issuers to revoke previously issued credentials without contacting the holder. This section details its mechanisms, types, and technical implementation.

A revocation registry is a cryptographically secure data structure that allows a credential issuer to publicly declare which specific verifiable credentials are no longer valid, enabling a verifier to check a credential's status without contacting the issuer directly. It works by the issuer maintaining a list, often on a blockchain or other decentralized ledger, that maps credential identifiers to their revocation status (e.g., active or revoked). When a verifier receives a credential, they check the associated registry entry as part of the verification process. This mechanism is essential for maintaining trust and accountability in decentralized identity systems, as it allows for the withdrawal of trust in compromised or outdated credentials while preserving holder privacy through selective disclosure.

REVOCATION REGISTRY

Frequently Asked Questions

A revocation registry is a critical component of decentralized identity systems, enabling the selective invalidation of credentials. These FAQs address its core mechanisms and practical applications.

A revocation registry is a decentralized data structure, often implemented as a smart contract or a verifiable data registry, that maintains a cryptographically secure list of revoked credentials or credential statuses. It allows an issuer to signal that a previously issued verifiable credential (VC) is no longer valid, without revealing the credential's specific attributes. This is essential for managing credential lifecycles, such as when a user's access privileges are revoked, a membership expires, or a private key is compromised. The registry publishes status information—like a revocation list or cryptographic accumulator—that a verifier can query to check a credential's validity during the presentation process, ensuring trust is maintained over time.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Revocation Registry: Definition & How It Works | ChainScore Glossary