Abstract: Several approaches have been suggested for authenticating verifiable credentials, however, most fail to address the issue of revocation. Additionally, the suggested revocation technique ...