• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Pairing-Free ID-Based Key-Insulated Signature Scheme

    2015-06-01 09:59:24GuoBinZhuHuXiongandZhiGuangQin

    Guo-Bin Zhu, Hu Xiong, and Zhi-Guang Qin

    Pairing-Free ID-Based Key-Insulated Signature Scheme

    Guo-Bin Zhu, Hu Xiong, and Zhi-Guang Qin

    —Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based (ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm (DL) assumption, a security proof of our scheme in the random oracle model has also been given.

    Index Terms—Identity-based cryptography, keyinsulated, random oracle mode, signature.

    1. Introduction

    As more and more cryptographic primitives have been applied in insecure environments, the key-evolving protocols in the public key setting, such as the key-insulated[1],[2], intrusion-resilience[3],[4], and forward secure[5],[6]cryptosystems, have been put forward independently to deal with the key exposure problem. It is the basic idea behind the key-evolving method that the secret key will be evolved over time, while the corresponding public key remains unaltered during the lifetime of the private key. In this manner, the exposure of the secret keys in a given time period will not affect the secret keys in other time periods. As one of the key-evolution mechanisms, the key-insulated cryptosystem[1],[2]achieves key exposure resilience by dividing the secret key of the user into two parts: a temporary secret key held by the user and a helper key keptby a physically-secure but computationally-limited “helper”. The temporary secret key will be refreshed in each time period with the support from the helper, instead of the public key corresponding to this secret key remaining fixed over the whole lifetime of this private key. Since then, many schemes in this area have been presented including many key-insulated signature schemes[7]-[11].

    However, when the key-insulated signature is deployed in the public key infrastructure (PKI), a certificate should be issued by a certificate authority (CA) to establish the connection between the public key of the user and its corresponding identity. Before the signature is verified, the validity of this identity certificate should be guaranteed. Usually, the cost of maintaining, transferring, and validating the certificate is considered to be expensive. To reduce the overhead and complexity of the certificate management in traditional PKI, Shamir introduced the identity-based public key cryptography (ID-PKC)[12]. In ID-PKC environments, the public key of the user can be easily gained from his known identity information such as the email address or the telephone number. Meanwhile, a fully-trusted private key generator (PKG) is involved to generate the private key. In this case, the certificates in the conventional PKI can be eliminated in the ID-PKC. Observing the benefits of the key-insulated signature and ID-PKC, Zhouet al.[13]formalized the notion of the ID-based key-insulated signature (ID-KIS) scheme and proposed the first concrete construction from bilinear pairings. To afford a strong key-insulated property, Wenget al.[14]re-formalized the definition and security models of the ID-KIS scheme, and proposed a novel scheme along with the secure key-update. Taking different scenarios into account, extensions of the ID-KIS scheme, such as the ID-based parallel key-insulated signature[15],[16], ID-based key-insulated signcryption[17], ID-based key-insulated ring signature[18], ID-based key-insulated proxy signature[19], and ID-based key-insulated signature with batch verification[20], have also been investigated. Nevertheless, all of the existing ID-KIS schemes are constructed based on the bilinear pairings. Although the computation of the pairing is speeding up significantly, the pairing is still considered as the most expensive cryptographic operations so far[21]. Therefore, constructing an efficient and provably-secure ID-KIS scheme without pairing is an interesting and inspiring problem.

    In this paper, we propose an efficient and simpleID-KIS scheme and show its security in the random oracle model with the assumption that the DL problem is intractable. Compared with the previous ID-KIS schemes, our scheme is very efficient in terms of computation cost since the expensive bilinear pairing operation is eliminated from our scheme. To the best of authors’ knowledge, this is the first pairing-free ID-KIS scheme in literature.

    The rest of this paper is organized as follows. The mathematical background and the security model of ID-KIS scheme are given in Section 2. The concrete construction of the proposed scheme and the security proof is followed in Section 3 and Section 4, respectively. Finally, a concise conclusion is presented in Section 5.

    2. Preliminaries

    In this section, we will review some fundamental backgrounds such as the mathematical assumption, and the formal definition and security models of the ID-KIS scheme.

    2.1 Mathematical Assumption

    Definition 2.1[DL Assumption] On input a group G of prime orderqwith a generatorgand elementfor a random value, the DL problem consists of computing the elementx, whereis finite field with orderq.

    The success probability of an algorithmAin solving the DL problem in G is defined as=Pr[A(g,gx)=x∈] and the DL assumption refers thatis negligible.

    2.2 Security Notions

    A. Syntax of ID-KIS Scheme

    An ID-KIS scheme ID-KIS=(Setup, Extract, Update*, Update, Sign, Verify) is specified by the following six polynomial-time algorithms:

    1) Setup: On inputting a security parameterk, this randomized algorithm, which is usually performed by the trusted PKG, outputs the master public/secret key pair (mpk, psk) along with the total number of time periodsN. The PKG publishes the public parameters (mpk,N) and keeps the master secret key msk secretly by itself.

    2) Extract: On inputting user’s identity ID, this randomized algorithm, which is also executed by the PKG, generates the initial private key TSKID,0and the helper key HKID. TSKID,0is sent securely to the corresponding user, and HKIDis stored in a physically-secure but computationally-limited device named “helper”.

    3) Update*: On inputting user’s identity ID, the helper key HKID, and the time period indicesiandj, this randomized algorithm, which is run by the helper held by the corresponding user, generates the partial secret key PSKID,i,j.

    4) Update: On inputting the temporary secret key TSKID,jfor the time periodj, and the partial secret key PSKID,i,jfor time period indicesiandj, this randomized algorithm, which is run by the user itself, generates the temporary secret key TSKID,ifor the time periodi.

    5) Sign: On inputting a temporary secret key TSKID,ifor the time periodi, and a messagem, this randomized algorithm outputs a signature (σ,i) ← Sign(TSKID,i,m,i), where ← means generating signature.

    6) Verify: On inputting the master public key mpk, user identity ID, a time periodi, and corresponding signatureσ, this randomized algorithm outputs True if the signature is correct, or ⊥ otherwise.

    The consistency of ID-KIS scheme requires that for?i∈ {1 ,2,… ,N} ,ID ∈{0,1}*, ?m∈M, Verify((σ,i),m, ID)=True always holds, where {}*? is the string with arbitrary length, and (σ,i) ← Sign(TSKID,i,m,i) andMdenote the message space.

    B. Adversaries Model of ID-KIS Scheme

    We review the security model of ID-KIS scheme in the follows. The oracles, which can be accessed by the adversaryA, are depicted as follows.

    a) Initial key extract query: Given an identity ID, this initial secret key oracle outputs the initial private key TSKID,0and helper key HKIDif this identity has not been queried yet; otherwise, nothing is to be carried out. Then the item (ID, TSKID,0, HKID) is stored into a listL.

    b) Helper key extract query: Given an identity ID, this helper key extract oracle executes the extract algorithm to generate the helper key HKID.

    c) Temporary secret key extract query: Given an identity ID along with the time periodi, this temporary secret key oracle executes the update algorithm to output the temporary secret key TSKID,i.

    d) Signing query: Given a messagemfor ID in the time periodi, this signing oracle outputs a valid signatureσsuch that True ←Verify( m pk,ID,i,σ).

    We define two games, one for formalizing the perfect key-insulated property and the other one for simulating the strong key-insulated property. Note that the adoption of helper key extract queries or initial key extract queries can be considered as the difference between these two games.

    Game 1: LetSbe the challenger with the input of security parameterk.

    ·Sexecutes Setup(k) to get (mpk, msk).

    ·SrunsAonkand mpk. During the simulation,Acan make queries adaptively onto the initial key extract query, temporary secret key extract query, and signing query oracles.

    ·Ais to output a tuple (σ*,i*) for messagem*on identity ID*. We say thatAwins Game 1 if the followingconditions are satisfied:

    1) True ←Verify((σ*,i*),m*,ID*);

    2)Ais disallowed to issue an initial key extract query on identity ID*;

    3) (ID*,i*) has not been submitted to the temporary secret key extract query;

    4) The oracle signing query has never queried with (i*,m*, ID*).

    Definition 2.2An ID-KIS scheme is said to be perfectly key-insulated if there is no probabilistic polynomial-time adversaryAwho wins Game 1 with non-negligible advantages.

    Game 2: LetSbe the challenger with the input of security parameterk.

    ·Sexecutes Setup(k) to get (mpk, msk).

    ·SrunsAonkand mpk. During the simulation,Acan make queries adaptively onto the initial key extract query, helper key extract query, and signing query oracles.

    ·Ais to output a tuple (σ*,i*) for messagem*on identity ID*. We say thatAwins Game 2 if the following conditions are satisfied:

    1) True ←Verify((σ*,i*),m*,ID*);

    2)Ais disallowed to issue an initial key extract query on identity ID*;

    3) The oracle signing query has never queried with (i*,m*, ID*).

    Definition 2.3An ID-KIS scheme is said to be strong key-insulated if there is no probabilistic polynomial-time adversaryAwho wins Game 2 with non-negligible advantages.

    In fact, the attacker who can compromise the helper device is captured in Game 2. During this game, the helper key for the target identity ID*can be extracted by the adversary, while only the temporary secret key can be derived by the adversary in Game 1.

    3. Proposed Scheme

    The concrete construction of the proposed ID-KIS scheme without pairing based on [22] is given in this section, which comprises the following parts.

    Setup: Given a security parameterk, the algorithm works as follows:

    1) Run the parameter generator on the inputkto generate a prime orderq, a multiplicative group G of prime orderq, and a generatorg∈G.

    3) For, compute, where

    Extract: Given a user’s identity { }*ID∈0,1 , PKG generates the initial private key and the helper key as follows:

    3) Return the initial secret key (R,TSKID,0) to the user ID secretly and store the helper key (HKID,R) in the helper.

    Update*: The helper generates the partial temporary secret key PSKID,i,jfor the user ID and time period indicesiandjas follows:

    Update: Given the partial temporary secret key PSKID,i,jand the temporary secret key (R,TSKID,j) =(R,SID,j,TID) for a time periodj, the user associated with the identity ID computes his temporary secret key for time periodias TSKID,i=(R,SID,i,TID), whereSID,i=SID,j+ PSKID,i,j.

    4) Output (Y,R,z,TID) as the signature onmin time periodi.

    Verify: To verify a signature (Y,R,z,TID) signed by user ID on messagesm, the verifier performs the following steps:

    1) Computeh=H3(i,Y,R,m).

    2) Check whether the following equation:

    holds or not. If it holds, accept the signature; else reject it.

    And the correctness of our scheme can be described as

    4. Analysis of Proposed Scheme

    4.1 Security Proof

    Assuming that the DL problem is hard, we now show the security of our ID-KIS scheme as follows.

    Theorem 4.1In the random oracle model, our ID-KIS scheme is perfectly key-insulated under the assumption that the DL problem in G is intractable. If a probabilistic polynomial-time forger Λ has forged a signature in an attack modeled by Game 1 of Definition 2.2, then the DL problem can be solved.

    Proof. Letbe a random instance of the DL problem in G, wheregis a generator of G with the prime orderq, and the elementαis taken uniformly at random in. By using the forgery algorithm Λ, we will construct an algorithmSwhich outputs the DL solutionαin

    H1-queries: To respond toH1-queries, algorithmSmaintains a table of tuples (R,ID,h1) explained below, whereh1is randomly chosen from. We refer to this table as the TABH1. This table is initially empty. When Λ queries the oracleH1at a point (R,ID), algorithmSresponds as follows:

    2) Otherwise,Spicks a randomh1∈G1, adds the tuple (R, ID,h1) to the TABH1, and responds withH1(R,ID) =h1as the answer.

    H2-queries: To respond toH2-queries, algorithmSmaintains a table of tuples (R, ID,TID,i,h2), whereh2is chosen randomly from. We refer to this table as the TABH2. This table is initially empty. When Λ queries the oracleH2at a point (v, ID,i), algorithmSresponds as follows:

    H3-queries: To respond toH3-queries, algorithmSmaintains a table of tuples (i,Y,R,m,h3) explained below, which is named as the TABH3. This table is initially empty. When Λ queries the oracleH3at a point (i,Y,R,m), algorithmSresponds as follows:

    Initial key extract queries: Every time Λ asks for the initial secret key corresponding to an identity ID,Smaintains a table TABSKof tuples (ID,R,SID,0,TID,hkID,i), which is initially empty, and simulates the oracle as follows.

    Temporary secret key queries: When Λ queries a temporary secret key with identity ID and time periodi, algorithmSresponds as follows:

    1) If the query (i,ID) has already appeared in a tuple (ID,R,SID,0,TID,hkID,i) of TABSK, then algorithmSresponds (R,SID,0,TID) as the answer.

    Signing queries: Regarding to the signing queries, the attacker Λ can ask for a valid signature on the messagem∈ {0 ,1}*, the identity ID, and the time periodi. If the item (i,ID) has already appeared in a tuple (ID,R,SID,0,TID,hkID,i) of TABSK, thenSsigns this message using this temporary secret key according to the sign algorithm depicted in Section 3. It outputs the signature (Y,R,z,TID) for the message and stores the value (i,Y,R,m,h3) in table TABH3, whereh3=H3(i,Y,R,m)to keep consistency. If the item (i,ID) has not been queried to temporary secret key oracles,Sperforms the simulation of the temporary secret key oracle and signs the message using the returning secret key.

    The algorithmScan solve the values ofy,r,α, andfrom the above four independent linear equations since onlyy,r,α,are unknown in these equations. Therefore, we can find a solution of the DL problem by outputtingα.

    Theorem 4.2.In the random oracle model, our ID-KIS scheme is strong key-insulated under the assumption that the DL problem in G is intractable. If a probabilistic polynomial-time forger Λ has forged a signature in an attack modeled by Game 2 of Definition 2.3, then the DL problem can be solved.

    The proof is similar to those of Theorem 4.1 and is omitted here.

    Theorem 4.3.The proposed ID-KIS scheme has secure key updates.

    This theorem follows from the fact that for any target identity ID and the corresponding time periodsiandj, only the partial temporary secret key PSKID,i,jalong with the temporary secret keys TSKID,iand TSKID,iwill be revealed.

    4.2 Performance Analysis

    We compare our scheme with the existing ID-KIS schemes[13],[14]in terms of the signature size and computation cost. According to [22], the exponentiation and multiplication are equivalent to point multiplication and point addition in elliptic curve cryptography (ECC), respectively. Thus, our ID-KIS scheme can be implemented by using ECC with. In view of the computational overhead, we only consider the costly operations and we omit the computation efforts which can be pre-computed. Par denotes a pairing operation, SM a scalar multiplications in G1(exponentiation in G), andEan exponential operation in G2(multiplication in G). The pairing computation Par is more time-consuming than multiplication and exponentiation computation, but Par is eliminated in our scheme. Thus, our scheme is more efficient than the existing schemes according to Table 1.

    Table 1: Comparison between our scheme and related work

    5. Conclusions

    In this paper, we have proposed an efficient ID-KIS scheme that does not require any pairing operation in both signing and verification procedures. The scheme offers both perfect key-insulated and strong key-insulated properties. We also prove the security of our scheme under the DL assumption. Compared with previous schemes, our scheme minimizes the computation cost with no extra cost, which favors this scheme’s practical application.

    [1] Y. Dodis, J. Katz, S. Xu, and M. Yung, “Key-insulated public key cryptosystems,” inPorc. ofInt. Conf. on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002, pp. 65-82.

    [2] Y. Dodis, J. Katz J, S. Xu, and M. Yung, “Strong key-insulated signature schemes,” inProc. of the 6th Int. Workshop on Practice and Theory in Public Key Cryptography, Miami, 2002, pp. 130-144.

    [3] G. Itkis. “Intrusion-resilient signatures: generic constructions,or defeating strong adversary with minimal assumptions,” inProc. of the 3rd Int. Conf. on Security in Communication Networks, Amalfi, 2003, pp. 102-118.

    [4] J. Yu, F. Kong, X. Cheng, R. Hao, and J. Fan,“Intrusion-resilient identity-based signature: Security definition and construction,”Journal of Systems and Software, vol. 85, no. 2, pp. 382-391, 2012.

    [5] R. Canetti, S. Halevi, and J. Katz. “ A forward-secure public-key encryption scheme,” inProc. of Int. Conf. on the Theory and Applications of Cryptographic Techniques, Warsaw, 2003, pp. 255-271.

    [6] G. Itkis and L. Reyzin, “Forward-secure signatures with optimal signing and verifying,” inProc. of Int. Conf. on the Theory and Applications of Cryptographic Techniques, Santa Barbara, 2001, pp. 332-354.

    [7] N. González-Deleito, O. Markowitch, and E. Dall’Olio, “A new key-insulated signature scheme,” inProc. of the 6th Int. Conf. on Information and Communications Security, Malaga, 2004, pp. 465-479.

    [8] Z. Le, Y. Ouyang, J. Ford, and F. Makedon, “A hierarchical key-insulated signature scheme in the CA trust model,” inProc. of the 7th Int. Conf. on Information Security, Palo Alto, 2004, pp. 280-291.

    [9] Y. Lee, J. Ahn, S. Kim, and D. Won, “A PKI system for detecting the exposure of a user’s secret key,” inProc. of the 3rd European PKI Workshop: Theory and Practice, Turin, 2006, pp. 248-250.

    [10] G. Ohtake, G. Hanaoka, and K. Ogawa, “An efficient strong key-insulated signature scheme and its application,” inProc. of the 5th European PKI Workshop: Theory and Practice, Trondheim, 2008, pp. 150-165.

    [11] D. H. Yum and P. J. Lee, “Efficient key updating signature schemes based on IBS,”Lecture Notes in Computer Sciencevol. 2898, pp. 167-182, 2003, doi: 10.1007/978-3-540-40974-8_14.

    [12] A. Shamir, “Identity-based cryptosystems and signature schemes,” inProc. of Int. Conf. on the Theory and Applications of Cryptographic Techniques, Santa Barbara, 1985, pp. 47-53.

    [13] Y. Zhou, Z. Cao, and Z. Chai, “Identity based key insulated signature,” inProc. of the 2nd Int. Conf. on Information Security Practice and Experience, Hangzhou, 2006, pp. 226-234.

    [14] J. Weng, S. Liu, K. Chen, and X. Li, “Identity-based key-insulated signature with secure key-updates,” inProc. of the 2nd SKLOIS Conf. on Information Security and Cryptology, Beijing, 2006, pp. 13-26.

    [15] J. Weng, X. Li, K. Chen, and S. Liu, “Identity-based parallel key-insulated signature without random oracles,”Journal of Information Science and Engineering, vol. 24, no. 4, pp. 1143-1157, 2008.

    [16] J. Weng, S. Liu, K. Chen, and X. Li, “Identity-based parallel key-insulated signature: framework and construction,”Journal of Research and Practice in Information Technology, vol. 40, no. 1, pp. 55-68, 2008.

    [17] J. Chen, K. Chen, Y. Wang, X. Li, Y. Long, and Z. Wan,“Identity-based key-insulated signcryption,”Informatica, vol. 23, no. 1, pp. 27-45, 2012.

    [18] H. Wang and Y. Zhang, “Identity-based strong key-insulated ring signature scheme in the standard model,” inProc. of the 7th Int. Conf. on Mobile Ad-hoc and Sensor Networks, Beijing, 2011, pp. 451-455.

    [19] Z. Wan, X. Lai, J. Weng, and Y. Wang, “Identity-based key-insulated proxy signature,”Journal of Electronics (China), vol. 26, no. 6, pp. 853-858, 2009.

    [20] T. Y. Wu, Y. M. Tseng, and C. W. Yu. “ID-based key-insulated signature scheme with batch verification and its novel application,”Int. Journal of Innovative Computing, Information and Control, vol. 8, no. 7, pp. 4797-4810, 2012.

    [21] L. Chen, Z. Cheng, and N. P. Smart. “Identity-based key agreement protocols from pairings,”Int. Journal of Information Security, vol. 6, no. 4, pp. 213-241, 2007.

    [22] J. K. Liu, J. Baek, J. Zhou, Y. Yang, and J. W. Wong,“Efficient online/offline identity-based signature for wireless sensor network,”Int. Journal of Information Security, vol. 9, no. 4, pp. 287-296, 2010.

    [23] D. Pointcheval and J. Stern. “Security arguments for digital signatures and blind signatures,”Journal of Cryptology, vol. 13, no. 3, pp. 361-396, 2000.

    Guo-Bin Zhu was born in Shanxi, China in 1981. He received his B.S. and M.S. degrees from the University of Electronic Science and Technology of China (UESTC), Chengdu in 2002 and 2008, respectively. He is pursuing his Ph.D. degree with the School of Computer Science and Engineering, UESTC. His research interests include network security and cryptography.

    Hu Xiong was born in Guizhou, China in 1982. He received the Ph.D. degree from UESTC, Chengdu in 2009 in information and communication engineering. He is currently an associate professor with the School of Computer Science and Engineering, UESTC. His research interests include network security and cryptography.

    Zhi-Guang Qin was born in Sichuan, China in 1956. He received the Ph.D. degree from UESTC, Chengdu in 1996. He works as a full professor with the School of Computer Science and Engineering and the Dean of the School of Computer Science and Engineering, UESTC. His research interests include information security and wireless networks.

    Manuscript received February 23, 2014; revised April 12, 2014. This work was supported by the National Natural Science Foundation of China under Grant No. 61003230, No. 61370026, No. 61103206, and No. 61300191, and Chongqing Key Lab of Computer Network and Communication Technology under Grant No. CY-CNCL-2012-02.

    G.-B. Zhu is with the School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China (Corresponding author e-mail: zhugb@uestc.edu.cn).

    H. Xiong and Z.-G Qin are with the School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China (e-mail: xionghu.uestc@gmail.com; qinzg@uestc.edu.cn).

    Digital Object Identifier: 10.3969/j.issn.1674-862X.2015.01.007

    黑人猛操日本美女一级片| 18禁裸乳无遮挡动漫免费视频| 在线观看舔阴道视频| 波多野结衣av一区二区av| 老司机午夜福利在线观看视频| 国产色视频综合| 他把我摸到了高潮在线观看| 精品久久久久久,| 精品久久久久久电影网| 亚洲 国产 在线| 国产成人一区二区三区免费视频网站| 90打野战视频偷拍视频| 亚洲片人在线观看| 国产亚洲精品一区二区www | 成人黄色视频免费在线看| 国产精品免费一区二区三区在线 | 91在线观看av| 在线观看免费日韩欧美大片| 久久国产精品男人的天堂亚洲| 日日摸夜夜添夜夜添小说| 国产成人一区二区三区免费视频网站| 午夜亚洲福利在线播放| 少妇被粗大的猛进出69影院| 好看av亚洲va欧美ⅴa在| www.精华液| 一边摸一边抽搐一进一小说 | 无人区码免费观看不卡| 日韩 欧美 亚洲 中文字幕| 欧美黄色淫秽网站| 亚洲,欧美精品.| 久久香蕉精品热| 欧美大码av| 亚洲免费av在线视频| 国产又爽黄色视频| 一级黄色大片毛片| 国产成人av教育| 国产精品.久久久| 亚洲成人免费av在线播放| 久久久久久免费高清国产稀缺| 法律面前人人平等表现在哪些方面| 中国美女看黄片| 亚洲av成人av| 国产亚洲精品久久久久久毛片 | 中文字幕av电影在线播放| 香蕉国产在线看| 色94色欧美一区二区| 动漫黄色视频在线观看| 精品第一国产精品| 中文字幕最新亚洲高清| 露出奶头的视频| 午夜福利一区二区在线看| 纯流量卡能插随身wifi吗| 黑人操中国人逼视频| 成年版毛片免费区| 麻豆成人av在线观看| 亚洲va日本ⅴa欧美va伊人久久| 免费一级毛片在线播放高清视频 | 黑人巨大精品欧美一区二区mp4| www日本在线高清视频| 男男h啪啪无遮挡| 高潮久久久久久久久久久不卡| 法律面前人人平等表现在哪些方面| 国产成人欧美在线观看 | 亚洲国产精品合色在线| 免费在线观看视频国产中文字幕亚洲| xxxhd国产人妻xxx| 男女高潮啪啪啪动态图| 欧洲精品卡2卡3卡4卡5卡区| 精品欧美一区二区三区在线| 亚洲成a人片在线一区二区| 亚洲人成电影免费在线| 国产极品粉嫩免费观看在线| 69精品国产乱码久久久| 久久久久国内视频| 99国产精品一区二区蜜桃av | 免费观看a级毛片全部| 免费人成视频x8x8入口观看| 天天影视国产精品| videos熟女内射| 婷婷精品国产亚洲av在线 | 99re在线观看精品视频| 国产精品亚洲一级av第二区| 色老头精品视频在线观看| 精品久久久久久久久久免费视频 | 在线国产一区二区在线| 高清av免费在线| 国产成人精品在线电影| 日韩欧美三级三区| 午夜91福利影院| av超薄肉色丝袜交足视频| 国产一区二区三区综合在线观看| av线在线观看网站| 婷婷成人精品国产| www.熟女人妻精品国产| 99久久精品国产亚洲精品| 99国产精品一区二区蜜桃av | 久久久国产精品麻豆| 色老头精品视频在线观看| 日本wwww免费看| av线在线观看网站| 国产精品99久久99久久久不卡| 久久久久精品国产欧美久久久| 99香蕉大伊视频| 丰满的人妻完整版| 搡老岳熟女国产| 欧美av亚洲av综合av国产av| 老司机亚洲免费影院| 亚洲综合色网址| 无人区码免费观看不卡| 最近最新免费中文字幕在线| 99re6热这里在线精品视频| 热99久久久久精品小说推荐| 国产一区有黄有色的免费视频| 妹子高潮喷水视频| 又紧又爽又黄一区二区| 国产成人精品久久二区二区免费| 亚洲欧洲精品一区二区精品久久久| av福利片在线| 亚洲黑人精品在线| 亚洲精品粉嫩美女一区| 欧美黑人精品巨大| 精品亚洲成a人片在线观看| 精品国产亚洲在线| 女人爽到高潮嗷嗷叫在线视频| 精品一区二区三区av网在线观看| 久久久国产一区二区| 午夜福利在线观看吧| 在线天堂中文资源库| www.自偷自拍.com| 亚洲av片天天在线观看| tocl精华| 黄色片一级片一级黄色片| 满18在线观看网站| 欧美日韩中文字幕国产精品一区二区三区 | 18禁国产床啪视频网站| 精品人妻1区二区| 女同久久另类99精品国产91| 老熟妇乱子伦视频在线观看| 成人18禁高潮啪啪吃奶动态图| 国产精品免费大片| 亚洲免费av在线视频| 欧美成狂野欧美在线观看| 色精品久久人妻99蜜桃| 黑丝袜美女国产一区| 国产伦人伦偷精品视频| 亚洲av熟女| 精品国产一区二区三区久久久樱花| 五月开心婷婷网| 91精品三级在线观看| 99久久人妻综合| 国产欧美日韩一区二区三区在线| 色老头精品视频在线观看| 亚洲午夜理论影院| 午夜成年电影在线免费观看| 人人妻人人澡人人看| 在线观看免费午夜福利视频| 欧美色视频一区免费| 国产熟女午夜一区二区三区| 精品熟女少妇八av免费久了| x7x7x7水蜜桃| 国产精品美女特级片免费视频播放器 | 国产国语露脸激情在线看| 欧美精品人与动牲交sv欧美| 在线观看午夜福利视频| 国产黄色免费在线视频| 国产精品偷伦视频观看了| 99国产精品免费福利视频| 在线观看一区二区三区激情| av视频免费观看在线观看| 亚洲第一青青草原| 欧美黄色片欧美黄色片| 日韩精品免费视频一区二区三区| 一区福利在线观看| 高清视频免费观看一区二区| av有码第一页| 国产男女超爽视频在线观看| 免费高清在线观看日韩| 中文字幕人妻丝袜一区二区| 中文字幕人妻丝袜一区二区| а√天堂www在线а√下载 | 黑人猛操日本美女一级片| 人妻丰满熟妇av一区二区三区 | av不卡在线播放| 一边摸一边抽搐一进一出视频| 欧美性长视频在线观看| 丁香六月欧美| 在线观看免费视频日本深夜| 飞空精品影院首页| 黑人巨大精品欧美一区二区mp4| 亚洲欧美精品综合一区二区三区| 黄色 视频免费看| 亚洲全国av大片| 丝瓜视频免费看黄片| 欧美老熟妇乱子伦牲交| 女人久久www免费人成看片| 最近最新中文字幕大全免费视频| 亚洲五月天丁香| 后天国语完整版免费观看| 亚洲精华国产精华精| 国产成人精品在线电影| 俄罗斯特黄特色一大片| 在线天堂中文资源库| 国产伦人伦偷精品视频| 亚洲免费av在线视频| 日韩欧美三级三区| 亚洲av美国av| 国产精品自产拍在线观看55亚洲 | 久久99一区二区三区| 91成年电影在线观看| 国产成人精品在线电影| 精品国产一区二区三区久久久樱花| 人成视频在线观看免费观看| 黄片大片在线免费观看| av超薄肉色丝袜交足视频| 亚洲五月婷婷丁香| 亚洲欧美激情综合另类| 欧美丝袜亚洲另类 | 午夜福利影视在线免费观看| 丝袜美足系列| 热99国产精品久久久久久7| 免费一级毛片在线播放高清视频 | 久久久久久免费高清国产稀缺| 一边摸一边做爽爽视频免费| 精品福利观看| 欧美性长视频在线观看| 精品国产超薄肉色丝袜足j| 丰满饥渴人妻一区二区三| 国产深夜福利视频在线观看| 一区二区日韩欧美中文字幕| 村上凉子中文字幕在线| 国产91精品成人一区二区三区| 91精品三级在线观看| 成人免费观看视频高清| 精品国产乱码久久久久久男人| 亚洲欧美一区二区三区黑人| 18禁美女被吸乳视频| 久久久国产成人免费| 校园春色视频在线观看| 成熟少妇高潮喷水视频| 国产人伦9x9x在线观看| 亚洲欧洲精品一区二区精品久久久| av天堂久久9| 亚洲成人手机| 99精品在免费线老司机午夜| 亚洲午夜理论影院| 手机成人av网站| 亚洲国产欧美日韩在线播放| 亚洲av成人不卡在线观看播放网| 欧美av亚洲av综合av国产av| 黄色女人牲交| 波多野结衣av一区二区av| 黑人巨大精品欧美一区二区蜜桃| tube8黄色片| 深夜精品福利| 夜夜爽天天搞| 中国美女看黄片| 十分钟在线观看高清视频www| 国产片内射在线| 欧美精品啪啪一区二区三区| 一边摸一边抽搐一进一出视频| 国产精品免费视频内射| 悠悠久久av| 日韩成人在线观看一区二区三区| 热99久久久久精品小说推荐| 日韩欧美一区视频在线观看| 久久精品国产清高在天天线| 日韩视频一区二区在线观看| 欧美精品人与动牲交sv欧美| 视频区图区小说| 十分钟在线观看高清视频www| 精品第一国产精品| 麻豆成人av在线观看| 亚洲精品成人av观看孕妇| 国产精品影院久久| 精品乱码久久久久久99久播| 精品国产乱码久久久久久男人| 极品教师在线免费播放| 欧美成狂野欧美在线观看| av福利片在线| 美女 人体艺术 gogo| 黄片播放在线免费| 高潮久久久久久久久久久不卡| 香蕉久久夜色| 18禁观看日本| 国产一区有黄有色的免费视频| 19禁男女啪啪无遮挡网站| 夜夜爽天天搞| 很黄的视频免费| 午夜久久久在线观看| 一本综合久久免费| 一进一出抽搐gif免费好疼 | 久久精品国产综合久久久| netflix在线观看网站| 麻豆成人av在线观看| 欧美 日韩 精品 国产| 亚洲美女黄片视频| 午夜影院日韩av| 日本黄色日本黄色录像| 久久99一区二区三区| 精品久久久久久电影网| 成人18禁高潮啪啪吃奶动态图| 午夜日韩欧美国产| 美女视频免费永久观看网站| 精品国产美女av久久久久小说| 黄色女人牲交| 免费观看人在逋| 热99re8久久精品国产| 久久人人爽av亚洲精品天堂| 欧美性长视频在线观看| 亚洲全国av大片| 国产欧美亚洲国产| 国产有黄有色有爽视频| 久久久国产成人免费| 高清在线国产一区| 91老司机精品| 欧美日韩国产mv在线观看视频| 国产精品1区2区在线观看. | 91字幕亚洲| 美女午夜性视频免费| 亚洲熟妇熟女久久| 高清毛片免费观看视频网站 | 女同久久另类99精品国产91| 侵犯人妻中文字幕一二三四区| 亚洲欧美精品综合一区二区三区| 嫩草影视91久久| av视频免费观看在线观看| 午夜福利在线免费观看网站| 国产97色在线日韩免费| 免费在线观看视频国产中文字幕亚洲| 乱人伦中国视频| 女性生殖器流出的白浆| 精品国产一区二区久久| xxxhd国产人妻xxx| 欧美激情久久久久久爽电影 | 叶爱在线成人免费视频播放| 日本wwww免费看| 人人妻人人添人人爽欧美一区卜| 亚洲午夜精品一区,二区,三区| 国产精品久久久人人做人人爽| 欧美日韩视频精品一区| 又黄又粗又硬又大视频| 亚洲第一青青草原| 午夜福利在线观看吧| 久久久久久亚洲精品国产蜜桃av| 欧美精品亚洲一区二区| 久久精品国产亚洲av香蕉五月 | 美女国产高潮福利片在线看| 91成人精品电影| 成在线人永久免费视频| 十八禁人妻一区二区| 精品一区二区三区四区五区乱码| 免费在线观看日本一区| 超碰97精品在线观看| 亚洲久久久国产精品| 久久午夜亚洲精品久久| 黑人欧美特级aaaaaa片| 久久国产精品影院| 精品乱码久久久久久99久播| 电影成人av| 欧美另类亚洲清纯唯美| 国产成+人综合+亚洲专区| 日本vs欧美在线观看视频| 丰满迷人的少妇在线观看| 欧美日韩av久久| 国产又色又爽无遮挡免费看| 国产成人影院久久av| 中文字幕最新亚洲高清| av电影中文网址| 国产精品影院久久| 国产一区二区三区在线臀色熟女 | 欧美激情极品国产一区二区三区| 国产成人精品在线电影| 91麻豆精品激情在线观看国产 | 久久国产精品男人的天堂亚洲| 精品国产乱码久久久久久男人| 777米奇影视久久| 精品高清国产在线一区| 亚洲成人免费av在线播放| 99国产综合亚洲精品| 波多野结衣一区麻豆| 亚洲欧美日韩高清在线视频| 999久久久国产精品视频| 老汉色av国产亚洲站长工具| 国产欧美日韩综合在线一区二区| 99国产精品99久久久久| 亚洲美女黄片视频| 人成视频在线观看免费观看| 久久影院123| 国产视频一区二区在线看| 国产欧美日韩精品亚洲av| 欧美成狂野欧美在线观看| 亚洲情色 制服丝袜| 激情视频va一区二区三区| 男女床上黄色一级片免费看| 欧美色视频一区免费| 久久精品亚洲精品国产色婷小说| 国产av一区二区精品久久| 午夜福利在线观看吧| 看免费av毛片| 亚洲美女黄片视频| 又大又爽又粗| 午夜日韩欧美国产| 日韩欧美一区二区三区在线观看 | 两人在一起打扑克的视频| 亚洲午夜精品一区,二区,三区| 亚洲男人天堂网一区| 国产区一区二久久| 又紧又爽又黄一区二区| 岛国毛片在线播放| 国产单亲对白刺激| 日韩中文字幕欧美一区二区| 女性生殖器流出的白浆| 大片电影免费在线观看免费| 久久久久久久国产电影| 久久精品国产亚洲av高清一级| 久久久久久久久免费视频了| 午夜影院日韩av| 国产色视频综合| 757午夜福利合集在线观看| 日本黄色日本黄色录像| 女人被狂操c到高潮| 成人特级黄色片久久久久久久| 日韩熟女老妇一区二区性免费视频| 中出人妻视频一区二区| 日本黄色视频三级网站网址 | 伦理电影免费视频| 悠悠久久av| 日本a在线网址| 欧美久久黑人一区二区| 99国产极品粉嫩在线观看| 51午夜福利影视在线观看| 国产精品一区二区免费欧美| 韩国精品一区二区三区| 母亲3免费完整高清在线观看| 夜夜躁狠狠躁天天躁| 在线视频色国产色| 成人黄色视频免费在线看| 又黄又粗又硬又大视频| 捣出白浆h1v1| 国产精品永久免费网站| 欧美日韩亚洲高清精品| 亚洲国产欧美一区二区综合| 9色porny在线观看| 欧美日韩黄片免| 90打野战视频偷拍视频| 法律面前人人平等表现在哪些方面| 亚洲精品一卡2卡三卡4卡5卡| 欧美激情极品国产一区二区三区| 久久久久久亚洲精品国产蜜桃av| 老司机午夜福利在线观看视频| 日韩中文字幕欧美一区二区| 黄色视频不卡| 欧美成人免费av一区二区三区 | 精品久久久久久,| 1024视频免费在线观看| www.熟女人妻精品国产| 欧美 日韩 精品 国产| 国产有黄有色有爽视频| 校园春色视频在线观看| 亚洲三区欧美一区| 丝袜美腿诱惑在线| av天堂久久9| 久久久国产欧美日韩av| 精品福利永久在线观看| 成人18禁高潮啪啪吃奶动态图| 久久久久久久国产电影| 中文字幕人妻丝袜制服| 高清在线国产一区| 精品人妻1区二区| 狠狠狠狠99中文字幕| 午夜成年电影在线免费观看| 每晚都被弄得嗷嗷叫到高潮| 久久中文字幕一级| 成人18禁在线播放| 天天躁夜夜躁狠狠躁躁| cao死你这个sao货| 久久影院123| 无遮挡黄片免费观看| 欧美亚洲 丝袜 人妻 在线| 91在线观看av| 久久精品国产亚洲av香蕉五月 | 国产1区2区3区精品| 日韩欧美一区视频在线观看| 天天躁日日躁夜夜躁夜夜| 亚洲第一av免费看| 视频区图区小说| 韩国av一区二区三区四区| 久热这里只有精品99| 国产欧美日韩综合在线一区二区| 久久精品亚洲熟妇少妇任你| 国产欧美亚洲国产| 免费av中文字幕在线| 久久久精品区二区三区| 久久国产精品大桥未久av| 一级片'在线观看视频| 不卡一级毛片| 人成视频在线观看免费观看| 亚洲中文日韩欧美视频| 亚洲精品一二三| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲成人免费电影在线观看| 国产精品自产拍在线观看55亚洲 | 婷婷成人精品国产| 亚洲av电影在线进入| 亚洲国产中文字幕在线视频| 乱人伦中国视频| 超色免费av| 亚洲va日本ⅴa欧美va伊人久久| a级片在线免费高清观看视频| 久久香蕉激情| 成年版毛片免费区| 久久久久久久午夜电影 | 欧美成狂野欧美在线观看| 亚洲自偷自拍图片 自拍| 精品乱码久久久久久99久播| 久久久久视频综合| 欧美日韩亚洲高清精品| 电影成人av| 王馨瑶露胸无遮挡在线观看| 国产精品免费一区二区三区在线 | 久久热在线av| 国产又色又爽无遮挡免费看| 精品国产一区二区久久| 亚洲专区国产一区二区| 天堂中文最新版在线下载| 亚洲午夜理论影院| 久久久水蜜桃国产精品网| av天堂久久9| 国产一区在线观看成人免费| 精品久久久久久电影网| 午夜视频精品福利| 欧美成狂野欧美在线观看| 九色亚洲精品在线播放| 精品国产乱码久久久久久男人| 国产1区2区3区精品| 一二三四社区在线视频社区8| 欧美久久黑人一区二区| 久久天堂一区二区三区四区| 欧美一级毛片孕妇| 精品亚洲成a人片在线观看| 欧美人与性动交α欧美精品济南到| 免费在线观看影片大全网站| 国产成人一区二区三区免费视频网站| 亚洲美女黄片视频| 精品午夜福利视频在线观看一区| 在线观看免费视频网站a站| 久久午夜综合久久蜜桃| www.999成人在线观看| 黄片播放在线免费| 亚洲成av片中文字幕在线观看| xxxhd国产人妻xxx| 色94色欧美一区二区| 久久精品亚洲精品国产色婷小说| 亚洲国产欧美一区二区综合| 变态另类成人亚洲欧美熟女 | 成年版毛片免费区| 99riav亚洲国产免费| 国产一区二区三区视频了| 久久性视频一级片| 天堂俺去俺来也www色官网| 在线观看午夜福利视频| 黑人巨大精品欧美一区二区mp4| 国产伦人伦偷精品视频| 久久精品亚洲精品国产色婷小说| 99国产综合亚洲精品| 国产在视频线精品| 丝袜美腿诱惑在线| 国产亚洲精品一区二区www | 黄色丝袜av网址大全| av视频免费观看在线观看| 欧美日韩亚洲国产一区二区在线观看 | 天天躁日日躁夜夜躁夜夜| 精品久久久久久久毛片微露脸| 一级毛片高清免费大全| 91成年电影在线观看| 精品久久久精品久久久| 国产av精品麻豆| 亚洲一区二区三区不卡视频| 欧美日韩亚洲综合一区二区三区_| 在线国产一区二区在线| 国产精品.久久久| 久久国产亚洲av麻豆专区| videosex国产| 一区二区三区国产精品乱码| 色94色欧美一区二区| 99久久99久久久精品蜜桃| 国产av精品麻豆| av电影中文网址| 天堂中文最新版在线下载| 搡老熟女国产l中国老女人| 俄罗斯特黄特色一大片| 国产亚洲精品一区二区www | 国产片内射在线| 久久精品国产清高在天天线| 国产在线精品亚洲第一网站| 亚洲男人天堂网一区| 免费在线观看日本一区| 美女高潮到喷水免费观看| 亚洲成人手机| videosex国产| 久久精品国产综合久久久| 国产精品av久久久久免费| 午夜91福利影院| 欧美激情高清一区二区三区| 咕卡用的链子| 午夜亚洲福利在线播放| 激情在线观看视频在线高清 | 99久久99久久久精品蜜桃| 国产av精品麻豆| 国产精品久久久久成人av| 亚洲av日韩在线播放| 成年版毛片免费区| 中国美女看黄片| 不卡一级毛片| 久久久精品国产亚洲av高清涩受|