Methods and apparatuses for having a single trusted party collect digitally
signed lists (e.g., CRLs) from different trusted data item issuers (e.g.,
CAs). According to one embodiment, the trusted third party collects the
digitally signed lists. The trusted third party then associates with
sorted entries from each of the digitally signed lists a representation of
the trusted data item issuer that provided the digitally signed list. The
trusted third party cryptographically manipulates the sorted entries and
associated representations. The trusted party electronically transmits at
least one of the entries on one of the digitally signed lists and part of
the cryptographically manipulated data onto a network.