• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    2022-11-11 10:47:48GangXuYiboCaoShiyuanXuXinLiuXiuBoChenYiyingYuandXiaojunWang
    Computers Materials&Continua 2022年9期

    Gang Xu,Yibo Cao,Shiyuan Xu,Xin Liu,Xiu-Bo Chen,Yiying Yu and Xiaojun Wang

    1School of Information Science and Technology,North China University of Technology,Beijing,100144,China

    2School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,014010,China

    3Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,100876,China

    4School of Electronic Engineering,Dublin City University,Dublin,Ireland

    Abstract: With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search (PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further, the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly, we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result, which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least, through security analysis, our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.

    Keywords: Lattice cryptography; searchable encryption; blockchain; privacy protection;log system;information security;applied cryptography

    1 Introduction

    With the advancement of the big data period,more and more log files containing private data are being stored by data owners in the cloud,facing significant privacy threats and challenges.Searchable encryption is a technology for searching the log ciphertext based on keyword trapdoors.In this technology, data users can obtain the search trapdoors based on the searching keywords provided to the servicer.Then, the servicer executes a search algorithm to search for the matching ciphertext to correctly retrieve the data required by the user without recovering the plaintext,which significantly protects data privacy.At the beginning of the 21st century,Song et al.[1]put forward the new academic concept of searchable encryption for the first time.They completed the first research plan for the search problem of encrypted data.Further,searchable encryption can be divided into two categories,whether the encryption key and the decryption key are the same.The encryption key and decryption key of symmetric searchable encryption are the same,which cannot guarantee data security.Generally,it is only used when the owner and user of the log file are the same people,and it fails to satisfy most applications.

    In 2004, Boneh et al.[2] focused on searching for specific encrypted mailboxes to define the concept of Public-key Encryption with Keyword Search(PEKS)and gave a specific implementation.PEKS has different encryption and decryption keys, which can achieve the effect of sharing data information between data owners and data users so that searchable encryption can be applied to more practical scenarios.Many researchers have since improved and optimised the PEKS scheme to achieve faster search efficiency.Xu et al.[3] proposed Searchable Public Key Ciphertext with Hidden Structure(SPCHS),enabling the fastest possible search of keywords without compromising the encrypted keywords’contextual security.Cui et al.[4] proposed the concept of key aggregation searchable encryption and adopted the Key-Aggregate Searchable Encryption(KASE)scheme.In this scheme,the data owner is only required to issue a public key to the data users who share many files,which is helpful for the effective management of the key and makes this scheme easier to use in practical situations.Song et al.[5]proposed two searchable encryption schemes,FAST and FASTIO,to achieve forward privacy,dramatically improving I/O efficiency and reducing communication overhead.

    However, traditional PEKS faces the problem of the untrustworthiness of the servicer, which is fortunately solved to a certain extent by the emergence of blockchain technology.Blockchain,proposed by Nakamoto[6]in 2008,is a distributed public ledger that records all transactions into the block without third-party control and ensures the security and fairness of each transaction.At present,the vigorous development of blockchain technology is favoured by many researchers[7-16].Wang et al.[17] proposed a scheme that uses blockchain technology to store the hash value of users’private data and the attribute set of third-party applications,which realises secure one-to-many transmission of personal data.Xu et al.[18] avoided the intervention of third-party agencies through blockchain technology and established a multi-party security system.However,blockchain can solve the problem of the untrustworthiness of third-party organisations.Based on this idea, Li et al.[19] proposed a searchable encryption scheme (SSE-using-BC)based on blockchain technology, storing encrypted data on a decentralised blockchain.It avoids the intervention of centralised service providers and ensures the privacy of encrypted data.In 2019, Chen et al.[20] proposed a searchable encryption scheme for Electronic Health Records (EHR).Researchers used logical expressions to generate an EHR index and store it in the blockchain to ensure the EHR index’s immutability, integrity, and traceability.In 2020, Nie et al.[21] used searchable encryption to safeguard the privacy of data information and applied the Ethereum blockchain to solve the fairness problem in the search process.Chen et al.[22] designed a new Blockchain-based Searchable Public-key Encryption Scheme with Forward and Backward Privacy (BSPEFB), which largely avoids the adaptive leakage-exploiting attacks of searchable encryption technology in the Vehicle Social Network (VSN)and reflects the practicality of the scheme.

    Although the above scheme has improved the problem of the untrustworthiness of the service party in the searchable encryption process, with the rapid development of quantum computing[23], the Shor algorithm realises the rapid decomposition of large prime factors [24].As a result,malicious users with a quantum computer can launch a keyword guessing attack based on quantum computing,causing searchable encryption schemes based on traditional cryptography to lose security and privacy.As a result, more researchers have devoted themselves to proposing a post-quantum method.Nabil et al.[25] proposed that the traditional blockchain scheme is vulnerable to attacks by quantum adversaries.It designed the first post-quantum security signature scheme with public key re-randomisation by providing a deterministic wallet scheme with a post-quantum structure.However,lattice-based cryptography has the highest efficiency and low communication overhead among many post-quantum schemes,and is thus the most promising technology.

    In a nutshell,we propose a searchable encryption scheme based on lattice for log systems in the blockchain.Then,we describe our main contributions as follows:

    1.Firstly, we propose a searchable encryption scheme based on lattice cryptography to resist keyword guessing attacks under quantum computing.

    2.Secondly, blockchain technology is applied to replace the authoritative and trusted party in the scheme to ensure the honesty and credibility of the server.

    3.Finally, we conduct a security analysis of our scheme and compare it with other schemes,demonstrating its feasibility and efficiency.

    2 Preliminary

    Definition 1(Lattice)Suppose thata1,a2,...,am∈Rnaremlinearly independent vectors,then the set of linear combinations is called latticeL,denoted byL=L(A)={x1·a1+x2·a2+···+xm·am|xi∈Z},where the matrixA= {a1,a2,...,am} ∈Rn×mis called a basis ofL,mis called the rank ofL,andnis called the dimension ofL.Whenm=n,Lis called full rank.

    Definition 2(Dual Lattice)Suppose thatL(A) is the lattice composed of basesA∈Rn×m, then define the dual lattice as:L*={x∈Rn|〈x,y〉∈Z,?y∈L}.

    Definition 3(q-ary Lattice)Setqis a positive integer,given a matrixA∈Zn×mand vectoru∈Znq,we define:

    Obviously,Lq(A) andL⊥q (A) are dual lattices of each other, and(A) can be obtained by translation(A).

    Definition 4(Discrete Gaussian Distribution)Suppose thatDL,σ,cis a discrete Gaussian distribution defined on latticeLwith a vectorcas the center andσas a parameter,and the specific expression form is:such thatWhenc=0,it records asDL,σ.

    Lemma 1(TrapGen)[26]Supposeq≥2,andm≥2nlogq,TrapGen algorithm outputs a matrixA∈which is a statistically approximation to auniform distribution and the basisTA∈Zm×mof(A)satisfying‖TA‖≤O(nlogq)and

    Lemma 2(SamplePre)[27]SetTAis the basis of(A),the parametersand the vectoru∈,and then SamplePre algorithm outputs a vectorεthat is statistically close to,satisfyingAε=umodq.

    Lemma 3(SampleL)[28] Suppose a positive integerm >n,q >2, given a latticeL⊥q (A), setTAas the basis ofL⊥q (A), matrixB∈parameters, and vectoru∈Znq, then SampleL algorithm outputs a vectorε, which is statistically close toDL⊥q,s, satisfying(A|B)ε=umodq.

    Lemma 4(SampleR)[28] Suppose a positive integerm >n,q >2, given a lattice), setTBas the basis ofL⊥q (B), matrixA∈,R∈, parametersmax‖x‖=1‖Rx‖and vectoru∈Znq,then SampleR algorithm outputs a vectorεwhich is close tosatisfying(A|AR+B)ε=umodq.In particular,ifR∈{-1,1}m×m,then we obtain

    Lemma 5(Gaussian Sampling)[27] Knowing the centrec, parameterσ, and an implicit safety parameterpof a distribution,the algorithm randomly selects an integerx←Z ∩[c-σ·t,c+σ·t]and outputsxwith a certain probability andxis close toDZ,σ,c.

    Definition 5(ISIS problem)Suppose it is an integerq,matrixA∈,a real numberβ >0 and a vectorv,and there is a non-zero vectorεsatisfyingAε=vmodqand‖ε‖≤β.

    3 Design of Our Scheme

    3.1 Blockchain Architecture and Transaction Design

    The structure of the blockchain and transaction constructed in this paper is shown in Fig.1.The keyword ciphertext attribute and number attribute are added to the transaction.The keyword ciphertext attribute is formed by the data owner encrypting the keyword with the data user’s public key,and the number attribute records the number corresponding to the keyword.Based on this,the smart contract traverses the ciphertext of each keyword according to the search trapdoor uploaded by the data user and returns the number corresponding to the qualified keyword to the cloud storage platform.In this way,data owners and data users can share data.

    Figure 1:Blockchain and transaction structure

    3.2 Our Scheme Architecture

    The architecture of our scheme shows in Fig.2.The roles participating in this scheme include data owner,cloud storage platform,blockchain network,and data user.Their roles in the system are as follows:

    (1)Data owner.A data owner is the owner of the log file.He/she divides the log file,generates a number set,and extracts a valid keyword set to store the encrypted log file information in the cloud storage platform.In addition,he/she calculates the keyword ciphertext set corresponding to the log and then uploads the data index to the blockchain.The main problem faced by our scheme is that malicious users perform keyword guessing attacks under quantum computing on the keyword ciphertext,so our scheme focuses on the description of the encryption process of keywords.

    (2)Cloud storage platform.Cloud storage platform receives and stores the encrypted log file uploaded by the data owner.After getting the permission of the smart contract, the cloud storage platform returns the specific log file ciphertext to the data user.

    Figure 2:Scheme architecture

    (3)Blockchain network.By designing the algorithm in the smart contract,it receives the keyword ciphertext uploaded by the data owner and the trapdoor transmitted by the data user.After receiving a query request from a user, the query is performed according to a specific algorithm, and then the query result is returned to the cloud storage platform.The cloud storage platform is notified whether to send the ciphertext of the log file to the data user.

    (4)Data user.A data user is responsible for making a query request to the smart contract.Thus,he/she gets the ciphertext of the corresponding logfile from the cloud storage platform and obtains the plaintext of the log file after decryption.

    3.3 Related Algorithm Definition

    Definition 6The searchable encryption scheme based on lattice includes:

    (1)(p,pkown,skown,pkre,skre,$charge,$fund) ←Initialize(λ):We input the security parametersλof the architecture,output parametersp,the key held by the data owner(pkown,skown),the key held by the data user(pkre,skre),the single search price$charge of the blockchain,and the initial deposit value$fund of the data user.

    (2)(I,CF) ←Encrypt(F,pkown,skown,pkre): Firstly, the data owner generates a number setNand then takes the effective keywordsWi(1 ≤i≤n) in the log file under each number to generate a keyword setW= {W1,W2,...;,Wn}.Then, the data owner inputs the private keyskownand the public keypkreto encrypt the keyword set to obtain the ciphertextCW.Furthermore,we combineCWandNto get the data indexI,and the data index performs the chain operation.Finally,the log file is encrypted with the data user’s public keypkre,and the ciphertextFis obtained and uploaded to the cloud storage platform.

    (3)T←TrapGenerate(pkre,Wi):The algorithm takes the keywordWito be searched as well as the data user’s public keypkreas input.Then,the data user calculates and outputs the corresponding trapdoor T and uploads it to the blockchain network.

    (4)NW←Verify(I,T): The algorithm is executed by the smart contract in the blockchain.According to the indexItransmitted to the blockchain and the trapdoorTgenerated by the data user,the smart contract executes theVerifyalgorithm to search for the keyword ciphertext that matches the trapdoorT.If the corresponding ciphertext is found,the numberNWof the ciphertext will be returned to the cloud storage platform.

    4 Detailed Description of Our Scheme

    4.1 Initialise(λ)

    Initialise algorithm includes system initialisation, key initialisation, and blockchain network initialisation.In this algorithm, the system sets a series of parameters required for execution and distributes keys to the main participants of the system.The specific processInitialise(λ) is defined as follows:

    (1)System initialisation.A series of system parameters(n,m,q)are specified,where q is a prime number, and the system runs the initialisation program to generate the system parametersp.In this process, the system uses the input parameters to construct Znqand, selects a random vectorvfrom the Znq, and randomly selects two matricesM1andM2from the.Then, it sets the hash functionsrequired by the system and outputsp={n,m,q,v,M1,M2,H1,H2}.

    (2)Key initialisation.The system inputs the parameter p, Lemma 1 outputs the matrixMand the basisTof the latticeL(M) and satisfiesandMT= 0modq.Then, the system obtains the public-private key pair(pk,sk): =(M,T).Through the above process, the key(pkown,skown): =(Mown,Town)of the data owner and the key(pkre,skre): =(Mre,Tre)of the data user can be obtained,and then the system will transmit the generated key to the data owner and data user securely and confidentially.

    (3)Blockchain network initialisation.The data owner initialises the single search cost$charge on the blockchain network.The data user uses a unique identity ID to register an identity account on the blockchain network and set the deposit$fund of ID.

    4.2 Encrypt(F,pkown,skown,pkre)

    Encrypt algorithm includes log file encryption and keyword encryption.At this stage,this paper mainly studies the process of keyword encryption.The specific stepsEncrypt(F,pkown,skown,pkre)are as follows:

    (1)Preparation stage.The data owner will divide the log fileF,namelyF=(b1,b2,...,bn).After that, each division is numbered to generate a number setN=(1,2,...,n).Fori= 1,2,...,n,each keywordWiare extracted from each divisionbi.Finally, we obtain a keyword setW=(W1,W2,...,Wn).

    (2)Log file encryption.The data owner uses the public keypkreof the data used to encrypt each division of the log file and generates the corresponding log file ciphertextCbito form the ciphertext setThen,the data owner uploadsCFto the cloud storage platform.

    (3)Keyword encryption.The data owner randomly samples a vectorrand a noise vectoryin Znq.Then,for anyWi∈W,the data owner calculates:whereR∈{-1,1}.It is known that is the hash functionH1set by the system during the initialisation process.Then,the data owner randomly chooses a bitω∈{0,1}and calculates the corresponding hash valueAccording to Lemma 2,the data owner can obtain a vectorε,which satisfiesMownε=modq.In addition,the data owner calculates a parameter·ωfor each keyword ciphertext.The ciphertext corresponding to,and each division in the ciphertext corresponds to the number set to generate a ciphertext index

    (4)Keyword ciphertext uploading.The data owner uses the private key to generate a digital signature for the hash valueof each keyword ciphertext, generates the corresponding transaction,and submits the transaction to the master node.Then all nodes in the blockchain execute the consensus algorithm.The master node packs the transaction in a period together to form a block and then sends it to the slave node,which receives the block delivery by the master node and verifies the transaction in it.The verification process is as follows:the slave node extractspkownstored in the transaction from the node to decrypt and obtain the hash valueof the keyword ciphertext.Ifthe slave node announces that the verification is successful.Otherwise,the data may have been tampered with,and the slave node returns this transaction to the data owner.Assuming that the maximum number of malicious nodes that can exist in the consensus algorithm isf,if the number of verifications isNT >f+1,each node on the blockchain will store the block.

    4.3 TrapGenerate(pkre,Wi)

    The data user inputs their public keypkreand keywordWiintoTrapGenerate(pkre,Wi).According to Lemma 3,the algorithm generates a vectorTsatisfying(Mre|M1+M2·Wi)T=vmodq.Then,Twill be outputted as a trapdoor and sent to the consensus node on the blockchain.

    4.4 Verify(I,T)

    Before runningVerify(I,T), the smart contract will compare the value of the deposit$fund of data user ID and the single search cost $charge.If $fund<$charge, It returnsto the data user that the cost is insufficient.If $fund ≥$charge, the smart contract automatically executesVerifyto search for the keyword ciphertext and its number that match the user trapdoor in the data index set.Verifytakes data indexand trapdoorTas input.First,the algorithm enumerates the keyword ciphertextCWi (1 ≤i≤n)inI.For each ciphertext,calculate:then it can be concludedω= 1, otherwiseω= 0.Then the algorithm calculates the hash value, if it existsj∈[1,n] and satisfiesMreεj=modq,cWj′is the target keyword ciphertext corresponding to the trapdoorT.Finally,the numberNW=jof the keyword ciphertext is returned by the algorithm to the cloud storage platform.

    The cloud storage platform finds the ciphertext of the corresponding log file according to the index value and transmits it to the data user.To obtain the plaintext of the log file,the data user decrypts the ciphertext.

    Proof:For the method of restoring the value during the search and verification process,we give the proof as follow:

    5 Security Analysis

    5.1 Credibility

    This solution is based on the blockchain network,which can ensure the honesty and credibility of search results and primarily resist malicious attacks by illegal users on the server.The keyword search process does not involve any third parties in the decentralised blockchain network, and the nodes conduct open and transparent interactions based on transactions.All transactions and operations are recorded on the block.The characteristics of traceability and non-tampering can ensure the fairness and credibility of each search operation.In addition, each transaction initiated in the blockchain network requires the payment of a particular cost, which effectively avoids the possibility of illegal users undermining the program’s regular operation through malicious and exhaustive means.

    5.2 Unforgeability of Keyword Ciphertext

    In this scheme, the keyword ciphertext of the log file is unforgeable, its security can be reduced to ISIS hardness,and it effectively resists keyword guessing attacks initiated by illegal users equipped with quantum computers,thereby ensuring privacy of the plaintext.

    Theorem 1For any adversary A in polynomial time, the difficulty of forging the ciphertext of a keyword is equal to the difficulty of solving the difficult problem of ISIS currently.

    Proof:Assuming that adversary A cracks the unforgeability of the ciphertext with a non-negligible probability,it is equivalent to constructing a challenger C capable of solving ISIS problems.

    (1)Initialisation.Suppose adversary A initiates a keyword guessing attack on the system by forging the keyword ciphertext.In that case,challenger C executes the Setup algorithm to generate a series of parameters required by the system and sends the parameterspto adversary A.Then, C initiates an inquiry to the random prophecy and obtains the parametersMown*, which will be used as the public key of the data owner.Finally,C randomly selects a matrix∈as the data user’s public key and simultaneously dispatches two public keys to A.

    (2)Inquiry phase 1.For any ciphertextCWiwith differentω∈ {0,1} keywords, ifCWi=andw=w*, the challenger C calculatesH1(cW,ω) and returns it to adversary A, and addsto the list.Otherwise,C randomly obtainsεwhich obeys(Mown*),σaccording to Lemma 5,then calculatesH1(cW,ω)=Mown*εmodqand adds(CW,ω,H1(cW,ω))to the list.

    (3)Inquiry phase 2.For the keywordWi(1 ≤i≤n) that adversary A initiates an inquiry,challenger C calculatesand generates the first partcWiof the ciphertext.After obtainingεwhich obeysaccording to Lemma 5, challenger C will sendto adversary A.

    (4)Forgery phase.In this phase, adversary A will forge a ciphertextrelated to the keywordWi*(1 ≤i≤n).To begin with, A gets a trapdoorT*through Lemma 2 and sends it to challenger C.Then C calculates,thenω*=1,otherwiseω*=0,and returns a second partε*of the ciphertext of the key set forged by A.In this process,C cannot obtain information related to this ciphertext by asking a random oracle.Therefore,the keyword ciphertextis forged by A,which is a solution to ISIS hardness.

    Analysis:Assuming thatε*is a part of the effective keyword ciphertextCWi, and satisfyingmodq.If adversary A forges the keyword ciphertextwith probabilityp, it notices thatNis the number of times which the Inquiry phase 1 is executed in polynomial time.So, we obtain the probability that C successfully obtains the satisfying conditionis at least.Therefore,in the current situation,Challenger C has at least the advantageto break the assumption of ISIS hardness.In summary, the difficulty of adversary A forging the correct keyword ciphertext can be reduced to the difficulty of solving the ISIS hardness.

    6 Comprehensive Evaluation Analysis

    Our paper proposes a searchable encryption scheme based on lattice for log systems combined with blockchain.The test environment is a 64-bit Windows system with 16GB of memory.And the experimental process is completed by the local virtual machine Ubuntu 16.04.6.As shown in Tab.1,we compare the scheme in this paper with the schemes[30,31]in terms of methodology and hardness assumptions.

    Table 1: Comparison of methodologies and hardness assumption

    Through comparison,the common point between the literature[30]and our scheme is that they both use searchable encryption to ensure the fairness and credibility of the system environment.However, our scheme still provides the security of keyword ciphertexts facing quantum computing attacks.Consequently,the privacy of log files is well protected.

    After that, in order to compare the differences between the literature [31] and our proposed scheme in the trapdoor cost, verify algorithm cost, ciphertext size, and trapdoor size, Tab.2 defines the acronyms used in the experimental process,and Tab.3 shows the performance comparison results.

    Table 2: Glossary

    Table 3: Performance comparison

    Since our scheme uses the trapdoor generation algorithm based on lattice theory and mainly relies on the addition and multiplication of vectors, the overall efficiency of our scheme is superior to traditional cryptography.

    Fig.3 shows the changing trend of the keyword search time under not introducing the blockchain and introducing the blockchain.Since the search operation in the blockchain requires more cost for on-chain transactions,the keyword search time is increased,but the credibility and traceability of the search results can be guaranteed.However,with the linear growth in the number of keywords,the time spent in the blockchain transaction will become insignificant compared to the time used to search for keywords,so the time is less and less affected by the blockchain transaction time.

    Figure 3:Comparison of schemes

    7 Conclusion

    To solve the keyword guessing attacks launched by quantum attackers and the untrustworthiness of service providers,this paper designs and proposes a searchable encryption scheme based on lattice for log systems in the blockchain.The application of a lattice-based encryption algorithm makes the scheme resist quantum computing and ensures the security of the keyword ciphertext.At the same time, blockchain technology is employed to separate the keyword ciphertext search from the log file storage.Due to the keyword search is performed by designing a smart contract that ensures the reliability of the search results when the credibility of the servicer is unknown.According to the security analysis and experimental simulation, our scheme is secure in quantum attacks while being highly efficient.In the future,we will introduce forward security and optimize computational cost.

    Funding Statement:This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202101),NSFC(Grant Nos.62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology,the Natural Science Foundation of Inner Mongolia(2021MS06006),Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    每晚都被弄得嗷嗷叫到高潮| 欧美日韩黄片免| a在线观看视频网站| 亚洲精品美女久久av网站| 午夜免费鲁丝| 亚洲天堂av无毛| 深夜精品福利| 国产国语露脸激情在线看| 久久国产亚洲av麻豆专区| 国产伦理片在线播放av一区| 91九色精品人成在线观看| av电影中文网址| 搡老熟女国产l中国老女人| 国产亚洲av高清不卡| 人成视频在线观看免费观看| 国产不卡一卡二| 成年女人毛片免费观看观看9 | 欧美大码av| 国产成人精品久久二区二区免费| 一夜夜www| 久久国产精品影院| 国产精品一区二区在线观看99| 亚洲中文字幕日韩| 国产片内射在线| 欧美日韩黄片免| 日韩一卡2卡3卡4卡2021年| 久久久国产成人免费| 交换朋友夫妻互换小说| 欧美在线一区亚洲| 国产极品粉嫩免费观看在线| 王馨瑶露胸无遮挡在线观看| 日本黄色视频三级网站网址 | 国产亚洲av高清不卡| 三上悠亚av全集在线观看| 国产在线观看jvid| 国产亚洲欧美在线一区二区| 交换朋友夫妻互换小说| 欧美人与性动交α欧美精品济南到| 国产精品一区二区在线不卡| 欧美乱码精品一区二区三区| 在线观看www视频免费| 99九九在线精品视频| 大码成人一级视频| 亚洲avbb在线观看| 啦啦啦在线免费观看视频4| 午夜91福利影院| 亚洲欧美精品综合一区二区三区| 一区二区日韩欧美中文字幕| 成年人免费黄色播放视频| 乱人伦中国视频| 日韩欧美三级三区| 肉色欧美久久久久久久蜜桃| 99riav亚洲国产免费| 99riav亚洲国产免费| 黄色丝袜av网址大全| 黑人操中国人逼视频| 久久精品国产综合久久久| 中文字幕高清在线视频| 免费日韩欧美在线观看| 女人被躁到高潮嗷嗷叫费观| 午夜福利免费观看在线| 精品国产乱码久久久久久小说| 18禁裸乳无遮挡动漫免费视频| 国产单亲对白刺激| 午夜两性在线视频| 精品一品国产午夜福利视频| 亚洲精品中文字幕一二三四区 | 99九九在线精品视频| 亚洲精品一卡2卡三卡4卡5卡| 9热在线视频观看99| 亚洲精品在线观看二区| 国产欧美亚洲国产| 国产一区二区在线观看av| 国产成人av激情在线播放| 一级片'在线观看视频| 欧美一级毛片孕妇| 丁香六月欧美| 日本黄色视频三级网站网址 | 丰满人妻熟妇乱又伦精品不卡| 免费日韩欧美在线观看| 12—13女人毛片做爰片一| 国产男靠女视频免费网站| 亚洲视频免费观看视频| 欧美成狂野欧美在线观看| 国产一区二区在线观看av| 大片免费播放器 马上看| 欧美日韩精品网址| 国产又色又爽无遮挡免费看| 中文亚洲av片在线观看爽 | 免费人妻精品一区二区三区视频| 国产精品欧美亚洲77777| 在线观看免费高清a一片| 亚洲精品中文字幕在线视频| 精品一品国产午夜福利视频| 久久久久国内视频| xxxhd国产人妻xxx| 精品人妻1区二区| 叶爱在线成人免费视频播放| 老司机午夜福利在线观看视频 | 热99久久久久精品小说推荐| 青草久久国产| 99久久99久久久精品蜜桃| 自线自在国产av| 亚洲精品美女久久av网站| 99香蕉大伊视频| 一级毛片电影观看| 国产日韩欧美视频二区| 一本一本久久a久久精品综合妖精| 国产黄色免费在线视频| 91大片在线观看| 激情在线观看视频在线高清 | 国产不卡一卡二| 亚洲人成77777在线视频| 在线观看免费日韩欧美大片| 女人精品久久久久毛片| 99久久99久久久精品蜜桃| 免费在线观看影片大全网站| 国产免费现黄频在线看| 视频区图区小说| 亚洲情色 制服丝袜| 亚洲国产欧美网| 天天躁夜夜躁狠狠躁躁| 国产在线视频一区二区| 一级片免费观看大全| 欧美成人免费av一区二区三区 | 91国产中文字幕| 自拍欧美九色日韩亚洲蝌蚪91| 精品少妇内射三级| 亚洲精品在线观看二区| 在线看a的网站| 亚洲免费av在线视频| 一级毛片精品| 飞空精品影院首页| 亚洲精品粉嫩美女一区| tocl精华| 欧美一级毛片孕妇| 国产精品99久久99久久久不卡| 巨乳人妻的诱惑在线观看| 人妻一区二区av| 国产成人精品久久二区二区91| 精品国产一区二区久久| 亚洲欧美一区二区三区久久| 嫩草影视91久久| 国产精品av久久久久免费| 性少妇av在线| 精品久久久精品久久久| 一进一出好大好爽视频| 成年人黄色毛片网站| 嫁个100分男人电影在线观看| 亚洲情色 制服丝袜| 国产亚洲av高清不卡| 捣出白浆h1v1| 人人妻人人澡人人看| 国产免费视频播放在线视频| 亚洲欧美色中文字幕在线| 国产男女超爽视频在线观看| 一进一出抽搐动态| 亚洲自偷自拍图片 自拍| av天堂在线播放| h视频一区二区三区| 日本av手机在线免费观看| 菩萨蛮人人尽说江南好唐韦庄| 国产一区二区激情短视频| 每晚都被弄得嗷嗷叫到高潮| 老司机靠b影院| 黑人巨大精品欧美一区二区蜜桃| 国产成人欧美| 免费黄频网站在线观看国产| 狠狠精品人妻久久久久久综合| 国产成人欧美| 黄色视频在线播放观看不卡| 国产成+人综合+亚洲专区| 一级a爱视频在线免费观看| 大片免费播放器 马上看| 黑人欧美特级aaaaaa片| 亚洲欧美日韩高清在线视频 | 亚洲欧美精品综合一区二区三区| 麻豆成人av在线观看| 激情视频va一区二区三区| 在线观看一区二区三区激情| 精品福利永久在线观看| xxxhd国产人妻xxx| 国产xxxxx性猛交| 1024视频免费在线观看| 黄色毛片三级朝国网站| 免费少妇av软件| 久久久久国内视频| 精品少妇久久久久久888优播| 国产在线一区二区三区精| 在线天堂中文资源库| 午夜精品久久久久久毛片777| 99九九在线精品视频| 精品亚洲成国产av| 精品福利永久在线观看| 黄色毛片三级朝国网站| 女人高潮潮喷娇喘18禁视频| 91av网站免费观看| 91老司机精品| 亚洲专区中文字幕在线| 在线永久观看黄色视频| 美女午夜性视频免费| 窝窝影院91人妻| 国产区一区二久久| 精品少妇久久久久久888优播| 国产精品1区2区在线观看. | 婷婷成人精品国产| 新久久久久国产一级毛片| 国产精品香港三级国产av潘金莲| a级片在线免费高清观看视频| 日韩三级视频一区二区三区| av网站免费在线观看视频| 99热网站在线观看| 淫妇啪啪啪对白视频| 色婷婷久久久亚洲欧美| 9热在线视频观看99| 精品人妻1区二区| 91成人精品电影| 9热在线视频观看99| av又黄又爽大尺度在线免费看| 成年人黄色毛片网站| 免费高清在线观看日韩| 国产精品自产拍在线观看55亚洲 | 亚洲av成人一区二区三| 色视频在线一区二区三区| 伦理电影免费视频| 久久久国产一区二区| 国产精品亚洲av一区麻豆| 精品国产一区二区久久| 黑人欧美特级aaaaaa片| 国产精品亚洲一级av第二区| 黄色 视频免费看| 成年人午夜在线观看视频| 18禁美女被吸乳视频| 国产精品久久久久久人妻精品电影 | 国产精品成人在线| 亚洲精品中文字幕在线视频| 国产精品亚洲av一区麻豆| 三级毛片av免费| 精品人妻熟女毛片av久久网站| 老熟女久久久| 大型黄色视频在线免费观看| a级毛片黄视频| 99riav亚洲国产免费| 男人操女人黄网站| 精品国内亚洲2022精品成人 | 俄罗斯特黄特色一大片| 一区二区三区精品91| 又大又爽又粗| 中文字幕av电影在线播放| 悠悠久久av| 亚洲av美国av| 国产精品成人在线| 中文字幕精品免费在线观看视频| 亚洲第一av免费看| 久久午夜亚洲精品久久| 亚洲av片天天在线观看| 国产av一区二区精品久久| 人人妻人人澡人人看| 欧美激情久久久久久爽电影 | 一个人免费在线观看的高清视频| 夜夜夜夜夜久久久久| 啦啦啦在线免费观看视频4| 国产深夜福利视频在线观看| 制服诱惑二区| 日日爽夜夜爽网站| 成年动漫av网址| 国产黄色免费在线视频| 精品久久久久久电影网| 热re99久久精品国产66热6| 五月开心婷婷网| 亚洲精华国产精华精| 国产aⅴ精品一区二区三区波| 日本黄色视频三级网站网址 | 色94色欧美一区二区| 亚洲成国产人片在线观看| 老司机在亚洲福利影院| 亚洲成av片中文字幕在线观看| 国产一区二区在线观看av| 久久人人爽av亚洲精品天堂| 亚洲欧洲精品一区二区精品久久久| 国产精品久久久久久精品古装| 国产成人精品无人区| 国产成人av激情在线播放| 九色亚洲精品在线播放| 人妻一区二区av| 国产欧美日韩综合在线一区二区| 国产成人免费无遮挡视频| 久久精品国产亚洲av香蕉五月 | 人人妻人人澡人人看| 丝袜美足系列| 亚洲精品一二三| 日本wwww免费看| 午夜91福利影院| 高清视频免费观看一区二区| av片东京热男人的天堂| 蜜桃国产av成人99| cao死你这个sao货| 国产av国产精品国产| 国产精品香港三级国产av潘金莲| 最黄视频免费看| 免费在线观看视频国产中文字幕亚洲| av视频免费观看在线观看| 一本—道久久a久久精品蜜桃钙片| 黄色成人免费大全| 国产三级黄色录像| 午夜久久久在线观看| 乱人伦中国视频| 老鸭窝网址在线观看| 国产激情久久老熟女| 中文亚洲av片在线观看爽 | 性高湖久久久久久久久免费观看| av国产精品久久久久影院| 久久久久久人人人人人| 久久亚洲真实| 亚洲色图 男人天堂 中文字幕| 精品国内亚洲2022精品成人 | 天堂8中文在线网| 在线观看一区二区三区激情| 国产欧美日韩一区二区精品| 怎么达到女性高潮| 丝袜喷水一区| 欧美午夜高清在线| 叶爱在线成人免费视频播放| 91国产中文字幕| 人人妻人人澡人人看| 黄片大片在线免费观看| 欧美亚洲 丝袜 人妻 在线| 亚洲精品国产区一区二| av不卡在线播放| av免费在线观看网站| 国产无遮挡羞羞视频在线观看| 亚洲一区中文字幕在线| 亚洲熟女毛片儿| 91字幕亚洲| 热99久久久久精品小说推荐| 一进一出好大好爽视频| 亚洲熟女毛片儿| 一区二区三区乱码不卡18| 建设人人有责人人尽责人人享有的| 97在线人人人人妻| 他把我摸到了高潮在线观看 | 亚洲av日韩在线播放| 国产精品久久电影中文字幕 | 国产一区二区在线观看av| 超碰成人久久| www.999成人在线观看| 久久久久视频综合| 999精品在线视频| 国产福利在线免费观看视频| 男男h啪啪无遮挡| 日韩精品免费视频一区二区三区| 欧美人与性动交α欧美精品济南到| 国产精品99久久99久久久不卡| 免费观看av网站的网址| 我的亚洲天堂| 另类亚洲欧美激情| av一本久久久久| 十八禁高潮呻吟视频| 丝袜人妻中文字幕| 免费日韩欧美在线观看| 久久久国产精品麻豆| 日本av手机在线免费观看| 久久狼人影院| 免费不卡黄色视频| 欧美 日韩 精品 国产| 久久午夜亚洲精品久久| 少妇 在线观看| 成年人免费黄色播放视频| 黄色a级毛片大全视频| 国产成人系列免费观看| 午夜老司机福利片| 伊人久久大香线蕉亚洲五| 丝袜人妻中文字幕| 一本大道久久a久久精品| 热99久久久久精品小说推荐| 99热国产这里只有精品6| 成年版毛片免费区| av欧美777| 国产熟女午夜一区二区三区| 一级黄色大片毛片| 91成年电影在线观看| 国产精品欧美亚洲77777| 欧美国产精品一级二级三级| 丰满少妇做爰视频| 国产亚洲欧美精品永久| 夜夜夜夜夜久久久久| av不卡在线播放| 正在播放国产对白刺激| 日韩中文字幕欧美一区二区| 在线天堂中文资源库| 在线av久久热| 精品国产国语对白av| 国产欧美日韩一区二区三区在线| 一夜夜www| 中文字幕色久视频| 亚洲精品一卡2卡三卡4卡5卡| 99国产精品免费福利视频| 日韩中文字幕视频在线看片| 亚洲欧美日韩高清在线视频 | 欧美av亚洲av综合av国产av| a级毛片在线看网站| 久久久久久久久免费视频了| 午夜视频精品福利| 黄色视频不卡| 亚洲 国产 在线| 国产在线一区二区三区精| 黄色视频,在线免费观看| 91国产中文字幕| 精品熟女少妇八av免费久了| 免费久久久久久久精品成人欧美视频| 窝窝影院91人妻| av一本久久久久| 啦啦啦视频在线资源免费观看| 男人操女人黄网站| 脱女人内裤的视频| 欧美中文综合在线视频| 免费一级毛片在线播放高清视频 | 大码成人一级视频| 欧美人与性动交α欧美软件| 涩涩av久久男人的天堂| 国产亚洲精品久久久久5区| 国产高清激情床上av| 狠狠狠狠99中文字幕| 2018国产大陆天天弄谢| 天天躁日日躁夜夜躁夜夜| 在线观看66精品国产| 日韩欧美一区二区三区在线观看 | 淫妇啪啪啪对白视频| 999精品在线视频| 欧美日韩亚洲综合一区二区三区_| 国产精品一区二区在线不卡| 韩国精品一区二区三区| 最新的欧美精品一区二区| 一区二区三区乱码不卡18| 亚洲第一青青草原| 久久精品国产99精品国产亚洲性色 | 亚洲天堂av无毛| 一二三四在线观看免费中文在| videosex国产| 色尼玛亚洲综合影院| 国产日韩欧美亚洲二区| 欧美成狂野欧美在线观看| 最近最新中文字幕大全电影3 | 中文字幕色久视频| 97人妻天天添夜夜摸| 宅男免费午夜| 国产欧美日韩一区二区精品| 黄色毛片三级朝国网站| 搡老岳熟女国产| 亚洲av第一区精品v没综合| 中文字幕色久视频| 啦啦啦在线免费观看视频4| 女人高潮潮喷娇喘18禁视频| 欧美日韩亚洲综合一区二区三区_| 丝袜人妻中文字幕| 我的亚洲天堂| 日韩一区二区三区影片| 国产欧美亚洲国产| 无人区码免费观看不卡 | 亚洲国产成人一精品久久久| 丝瓜视频免费看黄片| 亚洲av日韩精品久久久久久密| 色94色欧美一区二区| tocl精华| 亚洲专区字幕在线| 1024香蕉在线观看| 精品一区二区三区四区五区乱码| 中文字幕精品免费在线观看视频| videos熟女内射| 99精品久久久久人妻精品| 美国免费a级毛片| 91麻豆精品激情在线观看国产 | 国产亚洲精品一区二区www | 国产成人啪精品午夜网站| 老熟妇乱子伦视频在线观看| 女人久久www免费人成看片| 99久久精品国产亚洲精品| 一本综合久久免费| 精品国产一区二区三区四区第35| 久久99一区二区三区| 午夜老司机福利片| av网站在线播放免费| www日本在线高清视频| 日本欧美视频一区| 亚洲性夜色夜夜综合| 首页视频小说图片口味搜索| 国产在视频线精品| 精品一区二区三卡| 亚洲精华国产精华精| 搡老乐熟女国产| 精品国产亚洲在线| 他把我摸到了高潮在线观看 | 国产高清激情床上av| 无遮挡黄片免费观看| 国产又色又爽无遮挡免费看| 国产黄色免费在线视频| 国产aⅴ精品一区二区三区波| 91大片在线观看| 午夜视频精品福利| 悠悠久久av| 国产又爽黄色视频| 满18在线观看网站| 日韩中文字幕视频在线看片| 美女国产高潮福利片在线看| 亚洲三区欧美一区| 自线自在国产av| 国产欧美亚洲国产| 国产黄色免费在线视频| 无人区码免费观看不卡 | 亚洲精品一卡2卡三卡4卡5卡| 午夜福利乱码中文字幕| 日韩人妻精品一区2区三区| 我的亚洲天堂| 乱人伦中国视频| 黄频高清免费视频| 欧美成人免费av一区二区三区 | 一区在线观看完整版| 91精品国产国语对白视频| 美女午夜性视频免费| 人人妻人人爽人人添夜夜欢视频| 香蕉国产在线看| 欧美乱码精品一区二区三区| 午夜福利影视在线免费观看| 一区二区三区乱码不卡18| 欧美乱码精品一区二区三区| 亚洲精品成人av观看孕妇| 久久久精品区二区三区| 国产精品一区二区在线观看99| 99国产精品99久久久久| 国产91精品成人一区二区三区 | 在线亚洲精品国产二区图片欧美| 99久久人妻综合| 亚洲成av片中文字幕在线观看| 在线观看www视频免费| 日韩 欧美 亚洲 中文字幕| 肉色欧美久久久久久久蜜桃| 99久久国产精品久久久| 国产精品1区2区在线观看. | 搡老乐熟女国产| 岛国在线观看网站| 18禁裸乳无遮挡动漫免费视频| 国产免费视频播放在线视频| 欧美亚洲 丝袜 人妻 在线| 国产激情久久老熟女| 国产亚洲精品一区二区www | 精品少妇内射三级| 老司机福利观看| 国产成人av教育| av国产精品久久久久影院| 欧美国产精品一级二级三级| 中文字幕人妻丝袜制服| 国产精品 国内视频| 久久香蕉激情| 免费观看av网站的网址| 欧美日韩亚洲国产一区二区在线观看 | 国产成人免费无遮挡视频| 嫩草影视91久久| 成年动漫av网址| 免费观看a级毛片全部| 午夜福利,免费看| 国产成人av教育| 老熟妇乱子伦视频在线观看| 国产一区二区激情短视频| 桃红色精品国产亚洲av| 在线观看舔阴道视频| 国产91精品成人一区二区三区 | 久久亚洲精品不卡| 欧美人与性动交α欧美精品济南到| 欧美人与性动交α欧美精品济南到| 久久人妻av系列| 曰老女人黄片| 人人妻人人澡人人爽人人夜夜| 两性夫妻黄色片| 久久久久网色| 国产三级黄色录像| 亚洲欧洲精品一区二区精品久久久| 精品国产超薄肉色丝袜足j| 丝袜美腿诱惑在线| 国产精品一区二区免费欧美| www日本在线高清视频| 韩国精品一区二区三区| 久久精品国产亚洲av高清一级| 国产极品粉嫩免费观看在线| 黄色成人免费大全| 岛国毛片在线播放| 夫妻午夜视频| 首页视频小说图片口味搜索| 麻豆乱淫一区二区| 18禁美女被吸乳视频| 亚洲欧洲精品一区二区精品久久久| 国产在线一区二区三区精| 汤姆久久久久久久影院中文字幕| 成人黄色视频免费在线看| 97人妻天天添夜夜摸| 十八禁高潮呻吟视频| 国产精品 国内视频| 大码成人一级视频| 91精品国产国语对白视频| 欧美老熟妇乱子伦牲交| 国产精品美女特级片免费视频播放器 | 国产精品成人在线| 欧美 亚洲 国产 日韩一| 肉色欧美久久久久久久蜜桃| 美女福利国产在线| 丝袜美腿诱惑在线| 中文字幕高清在线视频| 国产男女超爽视频在线观看| 人人妻人人添人人爽欧美一区卜| 人妻一区二区av| 国产精品欧美亚洲77777| 亚洲第一青青草原| 夫妻午夜视频| 亚洲视频免费观看视频| 51午夜福利影视在线观看| 欧美精品亚洲一区二区|