• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    2016-12-05 01:31:30LiuJianhua劉建華WuQianhongLiuJianweiShangTao
    High Technology Letters 2016年2期
    關(guān)鍵詞:劉建華

    Liu Jianhua (劉建華), Wu Qianhong, Liu Jianwei, Shang Tao

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    Liu Jianhua (劉建華)②*, Wu Qianhong**, Liu Jianwei**, Shang Tao**

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as identity-based proxy multi-signature (IBPMS). In this paradigm, multiple proxy signer candidates are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.

    multi-signature, E-transaction, delegation, provable security, information security

    0 Introduction

    Digital signature protocols allow message transmissions among a group of users with non-repudiation, user identification, and message authentication. Many variants of signatures such as blind signature[1], proxy signature[2], multi-proxy signature[3], and proxy multi-signature (PMS for short)[4]have been proposed to meet different application demands, among which, the proxy signature protocol is constructed to empower a signee to issue a message on behalf of another signee.

    Proxy multi-signature plays an critical role in the following scenarios. There may be real estate owned bym(m>1) entities, any legal transaction that wants to sell or rent out the assets must be permitted by all themowners. In other words, it must be signed jointly by all the entities, or signed by their designated proxy signers. For the latter case, any transaction of the real estate needs to be executed with the permission issued by all the owners’ proxy signers. One practical solution to the problem is to allow multiple proxy signers in a proxy multi-signature, each owner has his/her own proxy signer.

    The PMS scheme[5]needs only one round broadcast operation for each original signer during the proxy key generation phase. The proxy multi-signature schemes in Refs[4-6] do not provide formal definition or security model. Cao et al. proposed an ID-based proxy multi-signature scheme which used bilinear pairings[7].

    The existing PMS schemes (e.g., Ref.[5-9]) only allow one proxy signer candidate. This limitation may incur a bottleneck to the PMS schemes in some applications. Multi-proxy multi-signature[10,11]allow multiple original signer to delegate their signing capability to a group of proxy signers. Consider a scenario where a real estate owned by multiple owners needs to be rent out or sold. Suppose the owners delegate their signing capability to some proxy signers. If there is only one single proxy signer allowed to sign on behalf of the owners, then the single proxy signer’s relationships with the owners are different from each other. He/She may issue some transaction documents which will meet some owners’ interests but damage the interests of other owners. To address the drawback, a plausible solution is to allow the owners to choose their own proxy signers, any owner can designate a proxy signer. A transaction document is legal if and only if all the proxy signers sign on it. Another issue in existing PMS schemes is their communication complexity. Each original signer needs two-round broadcast operations. It’s critical to reduce the number of interaction rounds.

    Contribution of the study: Motivated by the above observations and the work of Ref.[12], this work revisits proxy multi-signatures. The contribution consists of two folds. First, a general framework to identity-based proxy multi-signature (IBPMS) is presented. In IBPMS, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates and any proxy signer candidate can sign a document on behalf of all the original signers alone. Second, an IBPMS scheme is proposed which is provably secure under standard computational assumptions. A striking feature of the IBPMS scheme is that it demands only one time of broadcasting operation for each original signer during the proxy key generation phase.

    The rest of this paper is organized as follows. Some background knowledge associated with the work is given in Section 1. The outline of the proxy multi-signature scheme and security model are given in Section 2. In Section 3, a proxy multi- signature scheme from bilinear pairing is presented. Its formal security proofs will be given in Section 4. In Section 5, the efficiency of the proposed scheme is compared with some related work. conclusion is given in Section 6.

    1 Syntax

    In the conventional proxy signature definition, a proxy signer can sign a message on behalf of an original signer under the delegation of the original signer. In Ref.[13], Huang, et al. proposed a security model of a proxy signature scheme. This model is the most widespread used one for the security analysis. A delegation usually is produced by the original signer through an algorithm whose inputs are private key and a certain message. Therefore, a delegation can be seen as a special signature signed by the original signer(In most cases, it is a signature on a warrant).

    Usually, there is only a single proxy signer in a PMS scheme[5-8]. All the original signers delegate their signing capability to one proxy signer. If the designated proxy signer is unavailable for something unexpected, then the protocol will be collapsed. Therefore, the proxy signer may be a bottleneck of a PMS scheme. One efficient solution to reduce the bottleneck effect is to increase the number of proxy signers and each proxy signer can sign a message on behalf of all the original signers separately.

    1.1 Protocol variables and member relationship

    Traditional proxy multi-signature[7]is a type T2scheme, a traditional multi-proxy signature scheme[3]is a type T4scheme, a (t,n) threshold proxy signature schemes[14]is a type T4scheme.

    1.2 Bilinear parings

    The bilinear map can be constructed by suitable modification in Weil[15]or Tate pairings[16]. The group equipped with such a map is called a bilinear group, on which the Decisional Diffie-Hellman problem is able to be solved within a polynomial-time while the computational Diffie-Hellman problem is believed hard[17].

    2 Modelling identity-based proxy multi-signature

    Inspired by the works of Cao, et al.[7], Wang, et al.[18], and Rajeev, et al.[8], and Pointcheval[19], a formal definition and security model for identity-based proxy multi-signature schemes are given.

    2.1 Definition of identity-based proxy multi-signature schemes

    In an identity-based proxy multi-signature scheme, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates, in such a way that any proxy signer candidate can sign a document on behalf of all the original signers alone. LetA1,A2,…,Ambe the original signers andB1,B2,…,Bnbe the proxy signer candidates designated byA1,A2,…,Am. For 1≤i≤m, Aihas an identity IDAi, for 1≤j≤n,Bjhas an identity IDBj.

    Definition 1 An identity-based proxy multi-signature scheme is a tuple IBPMS=(Setup; Extract; Sign; Veri; PMGen; PMSign; PMVeriT).

    Setup: On the input security parameterl, PKG generates public parametersParaof the system and a master secret keys. PKG publishesParaand keeps confidential master keys.

    Extract: Input master secret keys, public parametersParaand an identityID, and output the private keySIDofID. PKG will use this algorithm to generate private keys for all entities participating in the scheme and send the private keys to their respective owners through a secure channel.

    PMGen: This is a protocol jointly executed by all the candidate proxy signers and all original signers. Input IDA1,…,IDAm,IDB1,…,IDBn, the original signers’ private keys SIDA1,…,SIDAmand the delegation warrant ω which includes the type of the information delegated, the period of delegation, all the candidate proxy signers, etc. Any candidate proxy signerBj(j=1,…,n) can output a proxy signing key skBjby inputting his secret key SIDBj. The proxy signing key skBjcan be used byBjto produce proxy multi-signature on behalf of the original signers.

    2.2 Security model

    A formal security model for an identity-based proxy multi-signature scheme based on the work of Refs[7,8,20] is given. It is considered that adversary A tries to forge a proxy multi-signature working against a single honest user 1. User 1 can be an original signer or a proxy signer adaptively. A is allowed to access standard signing oracle, delegation oracle, and proxy multi-signature oracle.

    The goal of adversary A is to produce one of the following forgeries:

    Consider the following game:

    (1) Setup: The challenger runs the algorithm Setup of the proxy multi-signature scheme and provides the public parametersParato A.

    (2) Hash query: A can access the hash oracle, challenger X responds through the hash oracle and maintains LH1, LH2and LH3for each hash query.

    (3) Extract query: Adversary A can ask for the private key of any user IDi(IDi≠ID1). The challenger responds by running the Extract algorithm and returns the private key SIDito A.

    (5) Delegation query: A is allowed to request for the proxy signing key on the warrant ω and the identity IDi(IDi≠ID1). The user 1 may be either one of the original signers or one of the proxy signers.

    Definition 2 ID-based proxy multi-signature forger A (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks them+nusers ID-based proxy multi-signature scheme by the adaptive chosen message and givenIDattack if: A runs in time at mostt, and A makes at mostqHqueries to the hash queries, at mostqEqueries to the extraction queries, at mostqsqueries to the signing queries, at mostqpsqueries to the delegation queries and at mostqpmsqueries to the proxy multi-signature queries, and the success probability of A is ε at least.

    Definition 3 An ID-based proxy multi-signature scheme is (t,qH,qE,qs,qps,qpms,m+n,ε)-secure against adaptive chosen message and givenIDattack, if there is no adversary who can (t,qH,qE,qs,qps,qpms,m+n,ε)-break it.

    3 Proposed identity-based proxy multi- signature scheme

    In this section, an identity-based proxy multi-signature (IBPMS for short) scheme is presented based on the ID-based aggregate signature scheme[12]and IBPMS scheme[8]. The scheme has following phases: Setup, Extract, Sign, Veri, PMGen, PMSign, PMVeri.

    Extract: For a user withID, PKG computes its public key as QID=H1(ID)∈G1and private key asSID=sQID. Thus original signerAi, has its public key QAi(for i=1,…,m) and corresponding private key SIDAi. Similarly, for thenproxy signers, the public keys are QIDBjand corresponding private keys are SIDBj(forj=1,…,n).

    The Sign and Veri algorithm above is the same algorithm as the Shim’s IBS scheme[12], and for short the Shim’s IBS scheme is denoted as SIBS.

    PMGen: In this phase, the original signers perform the following job to make a message warrant ω, jointly with the proxy signers. ω includes some specific information about the message, restrictions on the message, time of delegation, identity of original and proxy signers, period of validity, and so on. Unlike the traditional proxy multi-signature schemes, the warrant ω in our scheme will declare a proxy signer group {Bj|1≤j≤n}, any Bjcan sign a message on the behalf of the original signers {Ai|1≤i≤m}.

    WBj=skBj+xjh4Ppub

    2. Checks whether or not the proxy signerBjis on the authorized list in the warrant ω. If not, stop. Otherwise, continue.

    Our PMS scheme allowsncandidates of proxy signingB1,…,Bn. Ifn=1, then our PMS scheme is a traditional PMS scheme, namely a T2proxy signature scheme; Ifn>1, then the PMS scheme is a T5proxy signature scheme.

    If set the number of proxy signersn>1 in the PMS scheme, and use the PMS scheme to be a traditional PMS scheme, that is to say, a message can be checked as valid when one of the proxy signers signs on it. In this situation, the proposed PMS scheme enjoys better robustness than a traditional PMS scheme, because, a traditional PMS scheme will not work if the unique proxy signer is not available. Thus a T5scheme enjoys better robustness than a T2scheme if a message needs only one proxy signer to sign on it.

    An e-transaction application instance: Suppose there is a real estate owned by multiple entities needed to be sold out. The owners authorize proxy signers to sign e-transaction documents. If there is only one single proxy signer allowed to sign messages on behalf of all the owners, then how to choose the single proxy signer admitted by all owners is another open problem. The relationship between the single proxy signer and ownerAiis different from that between the single proxy signer and owner Aj(i≠j). By using the proposed PMS scheme, each owner is allowed to choose her/his own proxy signer, thenmoriginal signers havenproxy signers, therem=n. Any e-transaction document can be verified as valid only if all thenproxy signers sign on it. The whole process containsmtimes PMSign signing andmtimes PMVeri verifying.

    4 Analysis of the scheme

    4.1 Correctness

    1. The correctness of delegation process:

    2. The correctness of PMSign and PMVeri algorithms from the following equalities:

    4.2 Security proof

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms)

    +(1-1/(qE+1))qs+qps+qpms)-1ε’

    t≤t’-CG1(qH1+qH2+qH3+qH4+2qE

    +3qs+3qps+3qpms+9)

    whereeis the base of natural logarithms, and CG1is the time of computing a scalar multiplication and inversion onG1.

    Proof. Suppose adversary (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks the proxy multi-signature scheme. X is given X=xP and Y=yP. Its goal is to output xY=xyP. X interacts with A as follows:

    Setup: Algorithm X initializes A withPpub=Xas a system’s master public key. A selects an identityID1.

    H1-queries: At any time A can query the random oracle OH1. To respond to these queries, X maintains a list LH1of tuples (IDi,Qi,bi,ci) . When an identityIDiis submitted to the OH1, X responds as follows:

    (1) If the queryIDialready appears on the list LH1in some tuple (IDi,Qi,bi,ci), then algorithm X responds withH1(IDi)=Qi.

    (2) Otherwise, X generates a random coin c∈{0,1} such that Pr[c=0]=λ.

    (4) Algorithm X adds the tuple (IDi,Qi,bi,ci) to the list LH1and responds to A withH1(IDi)=Qi.

    H2-queries: A can query the random oracle OH2. X maintains a list LH2of tuples (ωi,vi). When a warrant ωiis submitted to the OH2, X responds as follows:

    (1) If the query ωialready appears on the list LH2in some tuple (ωi,vi) then algorithm X responds with H2(ωi)=vi.

    H3-queries: At any time A can query the random oracle OH3with (ω,V). X maintains a list LH3of tuples (ω,V,η). X responds as follows:

    Extraction queries: Let IDi(i≠1) be a private key extraction query issued by algorithm A.

    (1) X runs the above algorithm for responding toH1-queries to obtain a Qi∈G1such that H1(IDi)=Qi. Let (IDi,Qi,bi,ci) be the corresponding tuple on the list LH1. Ifci=0, then X outputs “failure” and terminates.

    (2) Otherwiseci=1 and Qi=biP. Define SIDi=biPpub. It is seen that SIDi=bixP=xQiand therefore SIDiis the private key associated with the public keyIDi. Returns SIDi. The probability of success is 1-λ.

    Delegation queries:

    Case 2: A requests to interact withID1, whereID1plays the role of one of the original signers. To responds to this query, A generates a warrant ω, and requestsID1to sign ω and receives a response (WA1,VA1,ω). X returns a partial proxy signing key skBjwhich involves (WA1,VA1,ω) and adds ((WA1,VA1),…,(WAm,VAm),ω,skBj) to Lpso.

    Hence the above provided proxy signing key which involves (WAi,VAi) is valid. The probability of success is 1-λ.

    (2) X runs the above algorithm for responding toH2-queries on ω, recovers (ω,v) on LH2list.

    (3) Ifc= 0, then X returns “failure” and terminates. Ifc=1, H1(IDAi)=bAiP or H1(IDBj)=bBjP.

    Hence, the probability thatCdoes not abort during the simulation is (1-λ)qE+qps+qpms.

    Output: If X does not terminate as a result of A’s extraction query and proxy multi-signature query, then A’s view is identical to its view in the real attack.

    And it holds that

    X succeeds if all of these events happen.

    Pr[E1∧E2∧E3]

    =Pr[E1]Pr[E2|E1]Pr[E3|E1∧E2].

    Since A makes at mostqEqueries to the Extraction oracle and Pr[c=1]=1-λ, then Pr[E1]=λ(1-λ)qE. If X does not abort as a result of A ’s Extraction query then A ’s view is identical to its view in the real attack. Hence, Pr[E2|E1]≥ε. X will abort only if A generates a forgery such thatc=1. Hence, Pr[E3|E1∧E2]≥1/(1-λ). Thus, the probability of success is at least λ(1-λ)qEε.

    Hence the success probability that X solves the CDHP in the above game is at least:

    ((1-λ)qE+(1-λ)qE+qpms+(1-λ)qE+qs+qps+qpms)λε Set λ=1/(qE+1), we can deduce that

    ((1-1/(qE+1))qE+(1-1/(qE+1))qE+qpms+(1-1/(qE+1))qE+qs+qps+qpms)1/(qE+1)ε≥(1/e)·1/(qE+1)·(1+(1-1/(qE+1))qpms+(1-1/(qE+1))qE+qs+qps+qpms)ε≥ε′.

    Therefore

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms

    +(1-1/(qE+1))qE+qs+qps+qpms)-1ε′

    For the running time, one can observe that the running time of X is the same as A running time plus the time taken to respond to qH1,qH2,qH3,qH4hash queries,qEextraction queries,qssigning queries,qpsdelegation queries andqpmsproxy multi-signature queries, and the time to transform A ’s final forgery into the CDH solution. Hence, the total running time is at most t+CG1(qH1+qH2+qH3+qH4+2qE+3qs+3qps+3qpms+9)≤t′ as required.

    5 Comparison

    The efficiency of the scheme is compared with the schemes in Refs[6-8]. In Table 1,Edenotes the exponentiation operation inG2,Mdenotes the point scalar multiplication operation inG1,Pdenotes the pairing operation and NoPS denotes the number of proxy signer candidates. The broadcasting round in which each original signer needs to execute in the PMGen is denoted by BREO.

    Table 1 Performance analysis

    From Table 1, it can be seen that the proposed scheme is more efficient than the schemes in Refs[6-8]. Especially, the PMS scheme demands only one round broadcasting operation for each original signer, and the proxy signer candidates is not unique. These two characteristics make our PMS scheme more practical and efficient than the other schemes. It is supposed a valid message only needs the signature of one of the proxy signers.

    6 Conclusion

    In this work, a novel proxy multi-signature scheme is presented. The proposed proxy multi-signature scheme demands only one round broadcasting operation for each original signer during the proxy key generation phase. The scheme allows multiple proxy signers, improves the reliability of the PMS scheme. A formal security proof for the proposed scheme is also proposed.

    [1] Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In: Proceeding of the Public Key Cryptography, Miami, USA, 2003. 31-46

    [2] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages.IEICETransactionsonFundamentalsofElectronicsCommunications&ComputerSciences, 1996, E79-A(9):1338-1353

    [3] Cao F, Cao Z F. A secure identity-based multi-proxy signature scheme.ComputersandElectricalEngineering,2009, 35:86-95

    [4] Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme.ElectronicsLetters, 2000, (36):527-528

    [5] Li X X, Chen K F, Li S Q. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Proceedings of the 5th International Conference on Parallel and Distributed Computing, Application and Technologies, Singapore, 2004, 2004.591-595

    [6] Li X X, Chen K F. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.AppliedMathematicsandComputation, 2005,169(1):437-450

    [7] Cao F, Cao Z. A secure identity-based proxy multi-signature scheme.InformationSciences, 2009, 179(3):292-302

    [8] Rajeev A S, Sahadeo P. Efficient ID-based proxy multisignature scheme secure in random oracle.FrontiersofComputerScience, 2012, 6(4):421-428

    [9] Du H, Wen Q. Certificateless proxy multi-signature.InformationSciences, 2014, 276:21-30

    [10] Asaar M R, Salmasizadeh M, Susilo W. An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants.ComputerJournal, 2013,58(4):1021-1039

    [11] Sahu R A, Padhye S. Identity-based multi-proxy multisignature scheme provably secure in random oracle model.TransactionsonEmergingTelecommunicationsTechnologies, 2015,26(4):547-558

    [12] Shim K. An ID-based aggregate signature scheme with constant pairing computations.TheJournalofSystemsandSoft-ware, 2010, 83:1873-1880

    [13] Huang X Y, Mu Y, Willey S, et al. Proxy signature without random oracles. In: Proceedings of the Mobile ad-hoc and Sensor Networks, Hong Kong, China, 2006. 473-484

    [14] Zhang K. Threshold proxy signature schemes.LectureNotesinComputerScience, 1997, 1396: 191-197

    [15] Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proceedings of the Crypto, Santa Barbara, USA, 2001. 213-229

    [16] Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for fr-reduction.IEICETransactionsonFundamentals, 2001, 5:1234-1243

    [17] Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In: Proceedings of the Public key Cryptopraphy, Cheju Island, Korea, 2001. 104-118

    [18] Wang Q, Cao Z, Wang S. Formalized security model of multiproxy signature schemes. In: Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, China, 2005. 668-672

    [19] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures.JournalofCryptology, 2000, 13:361-396

    [20] Shao Z. Improvement of identity-based proxy multi-signature scheme.JournalofSystemsandSoftware, 2009, 85:794-800

    Liu Jianhua, born in 1983. He received his Ph.D degrees in School of Electronic and Information Engineering of Beihang University in 2013. He also received his B.S. and M.S. degrees from China West Normal University in 2006 and 2009 respectively. His research interests include information security.

    10.3772/j.issn.1006-6748.2016.02.012

    ①Supported by the National Basic Research Program of China (No. 2012CB315905), the National Natural Science Foundation of China (No. 61272501), the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China (No. J2013-31, Q2014-48).

    ②To whom correspondence should be addressed. E-mail: ljh2583265@163.comReceived on Aug. 22, 2015

    猜你喜歡
    劉建華
    學(xué)走鋼絲的樂樂羊
    凡事無絕對
    你不知道的“胡”“番”“?!薄把蟆?/a>
    有趣的“兒化”
    摘蘋果
    幼兒園(2020年17期)2020-12-30 12:22:50
    “灬”表示什么
    大雪人
    大白鵝
    搟面條
    掉鞭炮
    女人高潮潮喷娇喘18禁视频| 人妻丰满熟妇av一区二区三区| 88av欧美| www.色视频.com| 中文字幕久久专区| 最近最新中文字幕大全免费视频| 观看美女的网站| 18禁国产床啪视频网站| 亚洲精品在线观看二区| 亚洲成人久久性| 国产黄片美女视频| 岛国在线观看网站| 久久久久免费精品人妻一区二区| 淫妇啪啪啪对白视频| 99热这里只有是精品50| xxx96com| 成熟少妇高潮喷水视频| 国产麻豆成人av免费视频| 国产中年淑女户外野战色| 嫁个100分男人电影在线观看| 一个人免费在线观看电影| 日本免费a在线| 亚洲,欧美精品.| 成人三级黄色视频| 国产午夜精品久久久久久一区二区三区 | 成年女人毛片免费观看观看9| 国内精品久久久久久久电影| 最近在线观看免费完整版| 久久久国产成人免费| 日韩有码中文字幕| 欧美乱妇无乱码| 日本一二三区视频观看| 色精品久久人妻99蜜桃| 久久久久国内视频| 在线观看美女被高潮喷水网站 | 免费一级毛片在线播放高清视频| 九色国产91popny在线| 99久久成人亚洲精品观看| 欧美日韩亚洲国产一区二区在线观看| 国产精品久久久久久久久免 | 国产精品,欧美在线| 91麻豆精品激情在线观看国产| 国产精品三级大全| 久久久成人免费电影| 欧美bdsm另类| 一区福利在线观看| 搡老岳熟女国产| 国产精品av视频在线免费观看| 此物有八面人人有两片| 久久久久亚洲av毛片大全| 日本五十路高清| 亚洲成人中文字幕在线播放| 在线观看免费视频日本深夜| 亚洲色图av天堂| 国产精品久久久久久久电影 | 久久天躁狠狠躁夜夜2o2o| 日韩欧美精品免费久久 | 国产成人影院久久av| av女优亚洲男人天堂| 女人被狂操c到高潮| 日韩欧美在线二视频| 91在线观看av| 婷婷亚洲欧美| 亚洲成人久久性| 欧美一区二区国产精品久久精品| 国产精品综合久久久久久久免费| 欧美3d第一页| 亚洲中文日韩欧美视频| 精品一区二区三区视频在线 | 久久精品国产99精品国产亚洲性色| а√天堂www在线а√下载| 午夜两性在线视频| 免费看光身美女| 国产成人啪精品午夜网站| 女人被狂操c到高潮| 久99久视频精品免费| 十八禁人妻一区二区| 搡老妇女老女人老熟妇| 天堂动漫精品| 精品电影一区二区在线| 老司机在亚洲福利影院| 亚洲av中文字字幕乱码综合| 亚洲男人的天堂狠狠| 蜜桃亚洲精品一区二区三区| 十八禁人妻一区二区| 女生性感内裤真人,穿戴方法视频| 五月伊人婷婷丁香| 在线十欧美十亚洲十日本专区| 啦啦啦韩国在线观看视频| 欧洲精品卡2卡3卡4卡5卡区| 午夜激情欧美在线| 国产精品嫩草影院av在线观看 | 久久精品91无色码中文字幕| а√天堂www在线а√下载| 亚洲精品国产精品久久久不卡| 国产精品久久久久久精品电影| 午夜福利在线在线| 亚洲成人久久性| 亚洲国产高清在线一区二区三| 国产精品亚洲美女久久久| 高潮久久久久久久久久久不卡| 欧美激情在线99| 1000部很黄的大片| 无人区码免费观看不卡| 淫秽高清视频在线观看| 日本成人三级电影网站| 免费看日本二区| 国产野战对白在线观看| 日本成人三级电影网站| 欧美色欧美亚洲另类二区| 热99在线观看视频| 久久久久久久久中文| 淫妇啪啪啪对白视频| 一本精品99久久精品77| 成年女人毛片免费观看观看9| 久久久久性生活片| 可以在线观看的亚洲视频| 男人的好看免费观看在线视频| 噜噜噜噜噜久久久久久91| 少妇人妻一区二区三区视频| 欧美不卡视频在线免费观看| 99久久99久久久精品蜜桃| a级一级毛片免费在线观看| 熟女少妇亚洲综合色aaa.| 亚洲欧美日韩高清专用| 日日干狠狠操夜夜爽| 国内毛片毛片毛片毛片毛片| 成年女人永久免费观看视频| 99精品欧美一区二区三区四区| 亚洲激情在线av| 热99在线观看视频| 久久人人精品亚洲av| 欧美一区二区精品小视频在线| 熟女电影av网| 激情在线观看视频在线高清| netflix在线观看网站| 丁香六月欧美| 啦啦啦韩国在线观看视频| 国产高清三级在线| 熟女少妇亚洲综合色aaa.| 亚洲精品456在线播放app | 久久精品国产综合久久久| 国产成+人综合+亚洲专区| 日韩大尺度精品在线看网址| 亚洲人与动物交配视频| 免费观看的影片在线观看| 少妇的逼好多水| 天堂√8在线中文| 女人高潮潮喷娇喘18禁视频| 国产日本99.免费观看| 在线观看日韩欧美| 亚洲成人久久爱视频| 老司机午夜福利在线观看视频| 最新中文字幕久久久久| 国产精品久久久久久久久免 | 搡老妇女老女人老熟妇| 美女黄网站色视频| 久久久成人免费电影| 99久久精品热视频| 一级a爱片免费观看的视频| 久久久久亚洲av毛片大全| 人人妻人人澡欧美一区二区| 精品人妻1区二区| 亚洲中文字幕一区二区三区有码在线看| 欧美绝顶高潮抽搐喷水| 18+在线观看网站| 啦啦啦观看免费观看视频高清| 国内久久婷婷六月综合欲色啪| 一卡2卡三卡四卡精品乱码亚洲| 欧美黄色淫秽网站| 可以在线观看的亚洲视频| 午夜福利视频1000在线观看| 免费搜索国产男女视频| 日本a在线网址| 亚洲av电影在线进入| 俄罗斯特黄特色一大片| 亚洲av免费在线观看| 日本精品一区二区三区蜜桃| 他把我摸到了高潮在线观看| 亚洲精品成人久久久久久| 欧美在线黄色| 久久精品国产亚洲av香蕉五月| 亚洲 国产 在线| 老司机在亚洲福利影院| 婷婷精品国产亚洲av| e午夜精品久久久久久久| 久久久久久久久久黄片| 欧美av亚洲av综合av国产av| 国产高潮美女av| 日韩中文字幕欧美一区二区| 最近最新中文字幕大全电影3| a级一级毛片免费在线观看| 精品国产超薄肉色丝袜足j| 欧美+亚洲+日韩+国产| 天堂动漫精品| 最近最新中文字幕大全免费视频| 三级毛片av免费| 日本一本二区三区精品| www日本在线高清视频| 国产高清视频在线播放一区| 一级a爱片免费观看的视频| 九九热线精品视视频播放| 欧美色视频一区免费| 亚洲男人的天堂狠狠| 国产亚洲精品av在线| 999久久久精品免费观看国产| 一a级毛片在线观看| 国内毛片毛片毛片毛片毛片| 久久性视频一级片| 内地一区二区视频在线| 一本精品99久久精品77| 国产精品99久久久久久久久| 精品国产亚洲在线| 3wmmmm亚洲av在线观看| 麻豆国产97在线/欧美| 国产亚洲精品久久久com| 精品日产1卡2卡| 亚洲中文日韩欧美视频| 一区二区三区高清视频在线| 男女做爰动态图高潮gif福利片| 亚洲av熟女| 色综合欧美亚洲国产小说| 香蕉久久夜色| 精品电影一区二区在线| 国产私拍福利视频在线观看| 亚洲黑人精品在线| 午夜福利成人在线免费观看| 在线观看舔阴道视频| 成人av一区二区三区在线看| 久久中文看片网| 欧美成狂野欧美在线观看| 亚洲人成电影免费在线| 亚洲国产精品久久男人天堂| 99国产精品一区二区三区| 亚洲国产精品999在线| 成人特级av手机在线观看| 高清毛片免费观看视频网站| 国产久久久一区二区三区| 欧美精品啪啪一区二区三区| 国产三级中文精品| 宅男免费午夜| 性色avwww在线观看| 色视频www国产| 国产精品99久久久久久久久| 亚洲真实伦在线观看| 噜噜噜噜噜久久久久久91| 99热6这里只有精品| 国产av麻豆久久久久久久| 午夜福利在线观看免费完整高清在 | 男女做爰动态图高潮gif福利片| 深爱激情五月婷婷| 成人性生交大片免费视频hd| 精品一区二区三区av网在线观看| 小说图片视频综合网站| 欧美午夜高清在线| 丝袜美腿在线中文| 欧美极品一区二区三区四区| 日日摸夜夜添夜夜添小说| 国产视频一区二区在线看| 国产主播在线观看一区二区| 丝袜美腿在线中文| 人妻久久中文字幕网| 激情在线观看视频在线高清| www日本黄色视频网| 免费人成视频x8x8入口观看| 欧美极品一区二区三区四区| 少妇高潮的动态图| 久久精品人妻少妇| 少妇的逼好多水| 老鸭窝网址在线观看| 老司机福利观看| 99久久九九国产精品国产免费| eeuss影院久久| 亚洲五月天丁香| 亚洲av电影不卡..在线观看| 又黄又爽又免费观看的视频| 成人三级黄色视频| 亚洲av第一区精品v没综合| 欧美成人免费av一区二区三区| 欧美激情久久久久久爽电影| 国内揄拍国产精品人妻在线| 亚洲国产精品成人综合色| 老司机午夜福利在线观看视频| 国产毛片a区久久久久| 欧美+亚洲+日韩+国产| 久久久久久大精品| 免费在线观看亚洲国产| 欧美绝顶高潮抽搐喷水| 国产一区在线观看成人免费| 两个人视频免费观看高清| 法律面前人人平等表现在哪些方面| www日本在线高清视频| 婷婷六月久久综合丁香| 欧美xxxx黑人xx丫x性爽| 久久国产精品人妻蜜桃| 欧美日韩综合久久久久久 | av片东京热男人的天堂| 丁香六月欧美| 婷婷精品国产亚洲av在线| 综合色av麻豆| 日韩有码中文字幕| 麻豆一二三区av精品| 伊人久久大香线蕉亚洲五| 欧美一区二区亚洲| 国内少妇人妻偷人精品xxx网站| 国产真实伦视频高清在线观看 | 国内久久婷婷六月综合欲色啪| 在线观看66精品国产| 亚洲激情在线av| 免费观看的影片在线观看| 国产高清videossex| 亚洲 欧美 日韩 在线 免费| 久久精品国产清高在天天线| 精品欧美国产一区二区三| 成人一区二区视频在线观看| 精品人妻偷拍中文字幕| 久久精品综合一区二区三区| 久久久久性生活片| e午夜精品久久久久久久| 国产色爽女视频免费观看| 亚洲 欧美 日韩 在线 免费| 亚洲18禁久久av| 欧美色视频一区免费| 人人妻人人看人人澡| 亚洲精品一区av在线观看| 日日干狠狠操夜夜爽| 国产久久久一区二区三区| 白带黄色成豆腐渣| 亚洲av免费在线观看| 亚洲人成电影免费在线| 国产熟女xx| 国产真实伦视频高清在线观看 | 亚洲成av人片在线播放无| 午夜影院日韩av| 男女视频在线观看网站免费| 国产又黄又爽又无遮挡在线| 中文字幕av成人在线电影| 亚洲狠狠婷婷综合久久图片| 首页视频小说图片口味搜索| 日韩国内少妇激情av| 美女免费视频网站| 综合色av麻豆| 婷婷丁香在线五月| 夜夜看夜夜爽夜夜摸| 久久久国产精品麻豆| 狂野欧美激情性xxxx| 国产精品1区2区在线观看.| 久久中文看片网| 久99久视频精品免费| 欧美绝顶高潮抽搐喷水| 九九久久精品国产亚洲av麻豆| 日韩欧美精品免费久久 | 国产成人a区在线观看| 国内少妇人妻偷人精品xxx网站| 精品免费久久久久久久清纯| 99久久成人亚洲精品观看| 身体一侧抽搐| 亚洲欧美一区二区三区黑人| 色视频www国产| 三级男女做爰猛烈吃奶摸视频| 国产黄a三级三级三级人| 亚洲人成电影免费在线| 搞女人的毛片| 国产精品av视频在线免费观看| 国产成人影院久久av| 亚洲av中文字字幕乱码综合| www日本黄色视频网| 青草久久国产| 亚洲国产日韩欧美精品在线观看 | 欧美另类亚洲清纯唯美| 三级国产精品欧美在线观看| 深爱激情五月婷婷| 国产成人啪精品午夜网站| 悠悠久久av| 久久6这里有精品| 怎么达到女性高潮| 亚洲美女黄片视频| 午夜老司机福利剧场| 国产欧美日韩精品一区二区| 国产高潮美女av| 搡老妇女老女人老熟妇| 国产探花在线观看一区二区| 最好的美女福利视频网| 国产精品 国内视频| aaaaa片日本免费| 免费av不卡在线播放| 99国产综合亚洲精品| 中文在线观看免费www的网站| 亚洲成人精品中文字幕电影| 男插女下体视频免费在线播放| 欧美日本视频| 香蕉av资源在线| 亚洲av不卡在线观看| 国产主播在线观看一区二区| 午夜福利视频1000在线观看| 国产精品亚洲美女久久久| 亚洲av成人av| 成年人黄色毛片网站| 国产精品一区二区免费欧美| 国产探花极品一区二区| 欧美黑人欧美精品刺激| 狂野欧美激情性xxxx| 久久久久久人人人人人| 超碰av人人做人人爽久久 | 久久久国产成人精品二区| 丁香六月欧美| 国内少妇人妻偷人精品xxx网站| 欧美成人性av电影在线观看| 成人一区二区视频在线观看| 男女做爰动态图高潮gif福利片| 亚洲成人久久爱视频| 婷婷亚洲欧美| 长腿黑丝高跟| 欧美成人免费av一区二区三区| 国产精品野战在线观看| 国产三级在线视频| 午夜福利视频1000在线观看| 国产伦在线观看视频一区| 久久精品影院6| 午夜福利成人在线免费观看| 色哟哟哟哟哟哟| 99国产精品一区二区蜜桃av| 国产成人av激情在线播放| 亚洲成人中文字幕在线播放| 国产精品美女特级片免费视频播放器| 香蕉久久夜色| 欧美黑人欧美精品刺激| 99久国产av精品| 大型黄色视频在线免费观看| 两个人视频免费观看高清| 成人欧美大片| 久久这里只有精品中国| 熟女人妻精品中文字幕| 欧美日韩精品网址| 综合色av麻豆| 国产v大片淫在线免费观看| 日本黄色视频三级网站网址| 少妇裸体淫交视频免费看高清| 最新美女视频免费是黄的| 午夜影院日韩av| 欧美日韩福利视频一区二区| 日本成人三级电影网站| 中文字幕人妻丝袜一区二区| www日本在线高清视频| 午夜影院日韩av| 精品欧美国产一区二区三| 免费av不卡在线播放| 观看美女的网站| 国产欧美日韩精品一区二区| 香蕉av资源在线| 精品午夜福利视频在线观看一区| 精品国产超薄肉色丝袜足j| 久久久精品欧美日韩精品| 久久久精品大字幕| 国内揄拍国产精品人妻在线| 日本撒尿小便嘘嘘汇集6| 国产一区二区三区视频了| 99久久无色码亚洲精品果冻| 好看av亚洲va欧美ⅴa在| 床上黄色一级片| svipshipincom国产片| 亚洲美女黄片视频| 午夜激情福利司机影院| 每晚都被弄得嗷嗷叫到高潮| 成人无遮挡网站| 亚洲国产欧美网| 色吧在线观看| 法律面前人人平等表现在哪些方面| 欧美日本亚洲视频在线播放| 精品一区二区三区视频在线 | 超碰av人人做人人爽久久 | 好男人电影高清在线观看| 日韩高清综合在线| 亚洲国产精品合色在线| 偷拍熟女少妇极品色| 国产激情偷乱视频一区二区| 波多野结衣高清作品| 尤物成人国产欧美一区二区三区| 色在线成人网| 1024手机看黄色片| 欧美最新免费一区二区三区 | 国产精品av视频在线免费观看| 国产亚洲欧美98| 国产乱人视频| 欧美成狂野欧美在线观看| 国产精品98久久久久久宅男小说| 18禁美女被吸乳视频| 亚洲成av人片在线播放无| 亚洲内射少妇av| 国产在线精品亚洲第一网站| 搡女人真爽免费视频火全软件 | 精品熟女少妇八av免费久了| 亚洲欧美日韩东京热| 天天添夜夜摸| 免费一级毛片在线播放高清视频| 亚洲精品美女久久久久99蜜臀| 国产aⅴ精品一区二区三区波| 亚洲国产精品sss在线观看| 97超级碰碰碰精品色视频在线观看| 在线天堂最新版资源| 国产精品久久久久久人妻精品电影| 欧美+日韩+精品| 亚洲性夜色夜夜综合| 少妇的逼水好多| 国产av不卡久久| 亚洲在线自拍视频| 久久久成人免费电影| 亚洲久久久久久中文字幕| 女人高潮潮喷娇喘18禁视频| 无人区码免费观看不卡| 又粗又爽又猛毛片免费看| 51国产日韩欧美| 欧美三级亚洲精品| av视频在线观看入口| 久久精品亚洲精品国产色婷小说| 噜噜噜噜噜久久久久久91| 啦啦啦韩国在线观看视频| 国产精品,欧美在线| 国产综合懂色| 欧美午夜高清在线| www.熟女人妻精品国产| 午夜影院日韩av| 又爽又黄无遮挡网站| 最好的美女福利视频网| 国内精品久久久久久久电影| 三级国产精品欧美在线观看| 桃红色精品国产亚洲av| 日本成人三级电影网站| 色精品久久人妻99蜜桃| 色老头精品视频在线观看| 精品久久久久久久毛片微露脸| 99久久精品一区二区三区| 99热只有精品国产| 久久久久久久亚洲中文字幕 | 午夜福利欧美成人| 久久草成人影院| 黄色视频,在线免费观看| 窝窝影院91人妻| 亚洲精品粉嫩美女一区| 欧美一级a爱片免费观看看| 精品国产三级普通话版| svipshipincom国产片| 久久亚洲精品不卡| 精品久久久久久成人av| av国产免费在线观看| 99久国产av精品| 18禁黄网站禁片免费观看直播| 又爽又黄无遮挡网站| 成人三级黄色视频| 久久精品国产99精品国产亚洲性色| 婷婷精品国产亚洲av在线| 热99re8久久精品国产| 在线观看av片永久免费下载| 精品一区二区三区视频在线 | 国模一区二区三区四区视频| 成人国产综合亚洲| 男女视频在线观看网站免费| 国产精品亚洲美女久久久| 天美传媒精品一区二区| 成人国产综合亚洲| 欧美在线一区亚洲| 国产精品1区2区在线观看.| 免费看十八禁软件| 九九在线视频观看精品| 毛片女人毛片| 免费在线观看影片大全网站| 国产麻豆成人av免费视频| 2021天堂中文幕一二区在线观| 美女 人体艺术 gogo| 午夜福利18| 精品99又大又爽又粗少妇毛片 | 99久久精品一区二区三区| 国产亚洲欧美在线一区二区| 免费人成在线观看视频色| 亚洲国产欧美人成| 国产亚洲精品av在线| 免费大片18禁| 又黄又爽又免费观看的视频| 99久久无色码亚洲精品果冻| 国产精品98久久久久久宅男小说| 高清毛片免费观看视频网站| 欧美三级亚洲精品| 欧美日韩福利视频一区二区| 国产三级在线视频| 精品日产1卡2卡| 一进一出好大好爽视频| 国产高清三级在线| 国产三级黄色录像| 小蜜桃在线观看免费完整版高清| 久久久国产精品麻豆| 国产伦一二天堂av在线观看| 国产黄色小视频在线观看| 国产精品98久久久久久宅男小说| www.www免费av| 国产高潮美女av| 国产中年淑女户外野战色| 午夜影院日韩av| 老司机福利观看| 一区福利在线观看| 国产 一区 欧美 日韩| 亚洲熟妇熟女久久| 韩国av一区二区三区四区| 日日干狠狠操夜夜爽| 亚洲av二区三区四区| 男插女下体视频免费在线播放| 91久久精品电影网| 日本撒尿小便嘘嘘汇集6| 欧美在线黄色| 午夜久久久久精精品| 免费高清视频大片| 欧美高清成人免费视频www| 国产黄色小视频在线观看| 国语自产精品视频在线第100页| 国产亚洲精品久久久com| 国产免费一级a男人的天堂|