Primary Key accounts are one of Nunchuk's authentication mechanisms. It replaces the usual username/password login with one of your Bitcoin public-private key pairs.
Primary Key accounts are built on Bitcoin Core's MessageSign()
API.
Email logins have been highly popular as part of an overall Internet architecture for various reasons:
- Email accounts allow for easy correspondence between the users and the service provider, including critical security updates.
- Certain types of content and services are better served using email.
- Emails represent digital capital (a form of Proof-of-Work) and can act as a natural 2FA against hacking and spam.
Nevertheless, email address data have been frequently targeted, leaked and exploited over the years, especially when service providers have little to no security systems in place.
Primary Key accounts are our solution to that. It uses public-key cryptography and leverages Bitcoin's native ECDSA signature (it can be updated to Schnorr later) to provide an alternative authentication mechanism.
If you have any feedback or questions, please email [email protected] or join our Slack.
# We use bitcoin-cli here, but feel free to use any other tools
> bitcoin-cli getnewaddress
< 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN
# identity = hash(public_key). In case of bitcoin-cli, we use the address, which was already hashed.
# username is an alias to identity
> GET /account/v1/nonce?identity=${identity}&username=${username}
< {"nonce":"thisisanonce"}
# We use bitcoin-cli here, but feel free to use any other tools
# message should be the combination of username and nonce. eg: ${username}${nonce}
> bitcoin-cli signmessage "${identity}" "${message}"
> POST /account/v1/sign-up
{
"identity": "${identity}",
"username": "${username}",
"nonce": "${nonce}",
"signature": "${signature}"
}
# Response really depends on the server implementation. But usually, it includes an access_token, token type and expiration time.
< {"access_token": "thisisanaccess_token", "token_type": "Bearer", "expires_in": 3600}
-
Server looks up where (identity, username) is located in the database
-
Verify the signature
> POST /account/v1/sign-up { "identity": "${identity}", "username": "${username}", "nonce": "${nonce}", "signature": "${signature}" } # Response really depends on the server implementation. But usually, it includes an access_token, token type and expiration time. < {"access_token": "thisisanaccess_token", "token_type": "Bearer", "expires_in": 3600}