Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs

Michael Hölzl, Michael Roland, Omid Mir, Rene Mayrhofer

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

4 Citations (Scopus)


Providing methods to anonymously validate the user's identity is essential in many applications of electronic identity (eID) systems. A feasible approach to realize such a privacy-preserving eID is the usage of group signature protocols or pseudonym-based signatures. However, providing a revocation mechanism that preserves privacy is often the bottleneck for the scalability of such schemes. In order to bridge this gap between practicability and privacy, we propose a scalable and efficient revocation scheme suitable for smart cards in a mobile eID architecture. By using a pseudo-random function, we derive one-time revocation tokens for the revocation check and generate proofs of validity using a new method referred to as disposable dynamic accumulators. Our scheme thereby preserves unlinkability and anonymity of the eID holder even beyond revocation and does not require online connectivity to a trusted party for the verification and revocation check.
Original languageEnglish
Title of host publicationProceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018
PublisherACM Press
Number of pages9
ISBN (Electronic)9781450351911
Publication statusPublished - 9 Apr 2018
Event33rd ACM Symposium on Applied Computing - Pau, France
Duration: 9 Apr 201813 Apr 2018

Publication series

NameProceedings of the ACM Symposium on Applied Computing


Workshop33rd ACM Symposium on Applied Computing
Internet address


  • Electronic identities
  • privacy-preserving revocation
  • scalability
  • dynamic accumulators
  • smart cards
  • Privacy-preserving revocation
  • Smart cards
  • Scalability
  • Dynamic accumulators


Dive into the research topics of 'Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs'. Together they form a unique fingerprint.

Cite this