
mechanism (for each role) and providing insights on
how an implementor might balance their costs to
achieve an optimal revocation service.
ACKNOWLEDGEMENTS
This work has been partially supported by a joint
laboratory between FBK and the Italian Government
Printing Office and Mint and by the project SER-
ICS (PE00000014) under the MUR National Re-
covery and Resilience Plan funded by the European
Union - NextGenerationEU. The authors would like
to personally thank Paul Bastian, Giuseppe De Marco,
Francesco Antonio Marino, and Mirko Mollik for
their valuable discussion and feedback.
REFERENCES
Aas, J. (2024). Intent to end OCSP service. https://
letsencrypt.org/2024/07/23/replacing-ocsp-with-crls.
html.
Baldimtsi, F., Camenisch, J., Dubovitskaya, M., Lysyan-
skaya, A., Reyzin, L., Samelin, K., and Yak-
oubov, S. (2017). Accumulators with applications
to anonymity-preserving revocation. http://ia.cr/2017/
043.
Bari
´
c, N. and Pfitzmann, B. (1997). Collision-free ac-
cumulators and fail-stop signature schemes with-
out trees. https://link.springer.com/chapter/10.1007/
3-540-69053-0 33.
Barthoulot, A., Blazy, O., and Canard, S. (2024). Crypto-
graphic accumulators: New definitions, enhanced se-
curity, and delegatable proofs. https://ia.cr/2024/657.
Bloom, B. H. (1970). Space/time trade-offs in hash coding
with allowable errors. https://dl.acm.org/doi/10.1145/
362686.362692.
Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S.,
and Cooper, D. (2008). Internet X.509 Public Key In-
frastructure Certificate and Certificate Revocation List
(CRL) Profile. https://www.rfc-editor.org/rfc/rfc5280.
html.
Camenisch, J. and Lysyanskaya, A. (2002). Dynamic
accumulators and application to efficient revocation
of anonymous credentials. https://iacr.org/archive/
crypto2002/24420061/24420061.pdf.
De Marco, G., Steele, O., Marino, F. A., and
Adomeit, M. (2024). OAuth Status As-
sertions. https://datatracker.ietf.org/doc/
draft-demarco-oauth-status-assertions/03/. Work
in Progress.
Derler, D., Hanser, C., and Slamanig, D. (2015). Revisiting
cryptographic accumulators, additional properties and
relations to other primitives. https://link.springer.com/
chapter/10.1007/978-3-319-16715-2 7.
Donald E. Eastlake 3rd (2011). Transport Layer Secu-
rity (TLS) Extensions: Extension Definitions. https:
//www.rfc-editor.org/rfc/rfc6066.
Fazio, N. and Nicolosi, A. (2002). Cryptographic accumu-
lators: Definitions, constructions and applications. Pa-
per written for course at New York University. Avail-
able at http://www-cs.ccny.cuny.edu/
∼
fazio/research.
html. Paper written for course at New York Univer-
sity.
Flamini, A., Ranise, S., Sciarretta, G., Scuro, M., Sman-
iotto, N., and Tomasi, A. (2025). Public key accumu-
lators for revocation of non-anonymous credentials.
Cryptology ePrint Archive, Paper 2025/549.
Galperin, S., Adams, C., Myers, M., Ankney, R., and Mal-
pani, A. N. (1999). X.509 internet public key in-
frastructure online certificate status protocol - ocsp.
https://www.rfc-editor.org/rfc/rfc2560.
Hyperledger (2024). Anoncreds v2. https://github.com/
hyperledger/anoncreds-v2-rs.
Jaques, S., Lodder, M., and Montgomery, H. (2022). AL-
LOSAUR: accumulator with low-latency oblivious
sublinear anonymous credential updates with revoca-
tions. https://ia.cr/2022/1362.
Jones, M., Bradley, J., and Sakimura, N. (2015). RFC 7519
- JSON Web Token (JWT). https://www.rfc-editor.
org/rfc/rfc7519.
Karantaidou, I. and Baldimtsi, F. (2021). Efficient con-
structions of pairing based accumulators. https://ia.
cr/2021/638.
Khovratovich, D., Lodder, M., and Parra, C. (2022).
Anonymous credentials with type-3 revocation, ver-
sion 0.6. https://github.com/hyperledger/ursa-docs/
tree/main/specs/anoncreds1.
Larisch, J., Choffnes, D., Levin, D., Maggs, B. M., and
Mislove, Alan a nd Wilson, C. (2017). CRLite: A
Scalable System for Pushing All TLS Revocations to
All Browsers. https://ieeexplore.ieee.org/document/
7958597.
Li, J., Li, N., and Xue, R. (2007). Univer-
sal accumulators with efficient nonmembership
proofs. https://link.springer.com/chapter/10.1007/
978-3-540-72738-5 17.
Looker, T., Bastian, P., and Bormann, C. (2025). To-
ken Status List. https://datatracker.ietf.org/doc/
draft-ietf-oauth-status-list/10/. Work in Progress.
M’Raihi, D., Rydell, J., Pei, M., and Machani, S. (2011).
TOTP: Time-Based One-Time Password Algorithm.
https://www.rfc-editor.org/info/rfc6238.
Nguyen, L. (2005). Accumulators from bilinear pairings
and applications. https://link.springer.com/chapter/10.
1007/978-3-540-30574-3 19.
Russ, H. and Paul, H. (1999). Internet X.509 Public Key
Infrastructure Operational Protocols: FTP and HTTP.
https://www.rfc-editor.org/rfc/rfc2585.
Russ Housley, Tim Polk, W. S. F. and Solo, D. (2002). In-
ternet x.509 public key infrastructure certificate and
certificate revocation list (crl) profile. https://www.
rfc-editor.org/rfc/rfc3280.html.
Vitto, G. and Biryukov, A. (2022). Dynamic universal
accumulator with batch update over bilinear groups.
https://ia.cr/2020/777.
Comparison of Credential Status Mechanisms for the Digital Wallet Ecosystem
749