We suggest two approaches for dealing with member revocation. The first one is based on a group-shared private key and, as in section 3, relies on the confidentiality of this key (even w.r.t. the card-holder). The second one is based on ``black lists'' and relies on the integrity of the ``black list'' membership program executed by the card.