• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identity-Based Encryption from Lattices with Small Cipher Size

    2022-12-04 07:40:10WANGZiqingTANGDianhuaandLIFagen
    電子科技大學學報 2022年6期

    WANG Ziqing, TANG Dianhua,2*, and LI Fagen

    (1. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 611731;2. The 30th Research Institute of China Electronic Technology Group Corporation Chengdu 610041)

    Abstract Identity-based encryption (IBE) is very attractive because it does not have certificate management issues. However, the IBEs based on the bilinear Diffie-Hellman problem cannot resist quantum attacks. In order to ensure security under quantum attacks, lattice-based IBE is proposed. However, the existing lattice-based IBEs usually not only have a large ciphertext size but also can only encrypt a few bits of plaintext information in one ciphertext. In this paper, we propose a new lattice-based IBE scheme based on learning with errors (LWE) and its ring version. For the setting l=n, our scheme can encrypt the plaintext twice long of other schemes in one ciphertext. Then we prove that our scheme can achieve the indistinguishability of ciphertexts against adaptively chosen identity and chosen plaintext attack (IND-ID-CPA) in the random oracle.

    Key words IBE; lattice-based cryptography; LWE; ring LWE Received date: 2022 - 01 - 04; Revised date: 2022 - 03 - 01

    Identity-Based encryption (IBE) was first proposed by Shamir[1]in 1985. Compared with public key infrastructure (PKI), the public keys of users in IBE schemes are derived directly from identities like e-mail addresses or phone numbers instead of being generated by users. The private keys are generated and distributed to users by a trusted authority (TA) who has a master key. As TA will guarantee that the private keys are sent to the users with the corresponding identities, IBE does not have certificate management problems. The IBE schemes based on the bilinear Diffe-Hellman problem may face the threat of quantum attacks. However, since there is no quantum algorithm that can effectively solve the hard problems of lattice, the lattice-based IBE schemes are considered to be able to maintain the security under quantum attacks. In 2008, Ref. [2] proposed the first latticebased IBE named GPV, which is based on learning with errors (LWE) problem[3]. The scheme achieves indistinguishability of ciphertexts against adaptively chosen identity and chosen plaintext attack (IND-IDCPA) under random oracle. The random oracle model assumes that the adversary can not attack the hash function and the standard oracle doesnot have this assumption, which means that the standard model has better security. In 2010, Ref. [4] proposed the first lattice-based IBE scheme under the standard model.However, the IBE schemes under the standard model have larger size of parameters and ciphertext than the IBE schemes under the random oracle. In the same year, Ref. [5-6] proposed some more efficient latticebased IBE schemes under the standard model. The above schemes use the trapdoor generation algorithm to generate a uniformly random matrix and a short basis. The trapdoor generation algorithm was proposed by Ref. [7] in 1999 and then improved by Ref. [8] in 2009. In 2012, Ref. [9] gave a new method to generate trapdoors for lattices. The size of the output matrix of their algorithm is smaller than that of previous work.They also gave the trapdoor generation algorithm that can be used for ring. To reduce the size of public parameter and ciphertext, in 2016, Ref. [10] proposed an IBE scheme based on RLWE. In 2018, Ref. [11]proposed another RLWE-based IBE scheme with smaller ciphertext size than Katsumata’s[10]. Ref. [12]proposed a RLWE-based IBE with short parameters in 2020. The encryption of the above schemes can be seen as a variant of dual Regev PKE[2], which makes these schemes have large ciphertexts.

    In this paper, we propose a new LWE-based IBE scheme with a small size of ciphertext. We also give the ring version of our scheme. The proposed scheme is IND-ID-CPA secure under the random oracle.Compared with GPV[2], if we set the parameterl=n,the length of the plaintext that our scheme can encrypt is twice of GPV’s[2]without the increase of ciphertext size.

    1 Preliminaries

    1.1 Notation

    The base of logarithmic used in this paper is always 2. We use Zqto represent Z∩[0,q) whenqis a positive integer. ■r■ represents the nearest integer of the real numberr. When the value ofris the middle value of the two nearest integers, it is rounded up.■r」represents round down operation. We use lowercase bold letters to represent column vectors, such as a.Specifically, 0 represents the zero vector. We use |r| to represent the absolute value of the numberr. The dot product operation of vectors is represented as 〈·,·〉.x←Dmeans thatxis sampled from the distributionD. WhenDis a finite set, it means being uniformly sampled fromD. In particular, we useDZq,σto represent a discrete gaussian distribution with the parameter σ on Zq. We use capital bold letters to denote matrices. | |·||∞r(nóng)epresents the infinite norm and||·||represents the Euclidean norm. The Gram-Schmidt order orthogonalization of matrixAis denoted byA?. We useRqto represent Zq[x]/(xn+1).

    1.2 Lattices and Hard Problems

    It has been proved that the decision LWE problem is as hard as some worst-case hard problems onn-dimensional lattices under a quantum reduction.

    Ref. [15] proved that whens←DZnq,αq, the LWE problem is still hard. This form of LWE is called normal form LWE.

    Definition 4[16](ring learning with errors(RLWE)) For integersn≥1,q≥2, a real number α ∈(0,1), a uniformly random elements∈Rq, we can define a distribution R LWEn,q,αoverRq×Rqas this:

    wherea←Rqande←DRq,αq.

    The RLWE problem and its normal form have also been proved as hard as some worst-case hard problems on lattices under a quantum reduction.

    1.3 Algorithms

    The paper introduces some algorithms for lattices which are important for building a encryption scheme.

    Lemma 4[18]There exists a PPT algorithm SamplePre(a,Ta,u,σ) that can output a vectorx∈Rmqwhich satisfiesaTx=uand follows a discrete gaussian distribution of parameter σ.TAis the trapdoor ofa.

    2 The IBE Scheme

    The IBE scheme uses the TrapGen and SamplePre algorithms to generate the master public key, master secret key and users' secret keys, which is similar with other LWE-based IBE schemes. The main difference between our scheme and others is in the encryption. Compared with other LWE-based schemes, the first part of ciphertexts of our scheme can also encrypt messages. While other schemes only encrypt the message in the second part of ciphertexts.This makes our scheme encrypt more bits than other schemes. To encrypt messages, our scheme uses LWE instances to mask the plaintext. As the LWE instances(A,As+e)are indistinguishable from uniformly random,As+e+ΔmandAs+e+AΔmwill also be indistinguishable from uniformly random vector,where Δ isq/2.

    2.1 Construction Based on LWE

    Our IBE scheme is described as follows:

    Setup(1λ): The PKG chooses an odd prime numberq>2, positive integersn,m,l,k, a real number σand a hash functionsH:{0,1}k→Znq×n×Znq×l, wherekis the length of an identity andlis the length of the second part of message. The first part of the output ofHis an invertible matrix. Then it runs TrapGen(n,m,q)to generate a uniformly random matrixA∈Znq×mand a short basisTA∈Zmq×mof the lattice Λ⊥q(A). The PKG sets the master public key mpk=Aand master secret key msk=TA. Finally, the PKG publishes the parameters p aram=(n,m,l,q,σ,A,H).

    2.2 Correctness

    Theorem 1 The decrypt algorithm can recover the message from ciphertext correctly if the following inequations are hold.

    2.3 Security

    We first give the definition of IND-ID-CPA.Then we prove that our scheme can achieve IND-IDCPA security.

    Definition 5 For a IBE scheme P(Setup,Extract, Enc, Dec), a challengerCand an adversaryA,the IND-ID-CPA game is described as follows.

    SetupCruns the Setup algorithm to generate the public parameters param, master public keympk and master secret key msk, then sends param andmpk toA.

    Phase 1Acan make secret key extraction queries for any identity id. The challengerCruns Extract(p aram,id,msk ) to generate the secret keysk and sends it toA.

    ChallengeAselects an identity id*which has not been queried in phase 1 and two different messagesm0,m1and sends them toC.Crunsc←Enc(p aram,id*,mb) and responsesctoA, wherebis a uniformly random bit.

    Phase 2Acan repeat Phase 1. The only restriction is that he can’t query the secret key of i d*.

    GuessAoutputs a bitb′.

    If there does not exist any polynomial adversaryAthat achieves non-negligibleAdv(A)=|Pr[b′=b]-Pr[b′≠b]|, we say thatPis IND-ID-CPA secure. If the target identity is submitted before the setup, the game is named indistinguishability of ciphertexts against selectively chosen identity and chosen plaintext attack(IND-sID-CPA).

    Theorem 2 If there exists a polynomial adversaryAthat can break the IND-ID-CPA secure of the scheme described in section 3.1 in the random oracle model, then there exists a polynomial algorithm that can solve the normal form decision-LWE problem.

    Proof We show that how to use the adversaryAto construct an algorithmCthat can answer the normal form LWE oracleO. We setCto be the challenger of the IND-ID-CPA game. First,Cqueries the oracleOand getsm+linstances (ai,bi)∈Znq×Zq. ThenCuses these instances to combine two matricesA1∈Zmq×n,A2∈Zlq×nand two vectorsb1∈Zmq,b2∈Zlq,where every row of matrices isaiand every component of vectors isbi. The rank of the matrixA1must ben. If not,Ccan repeat the query until he gets a ranknmatrix. After this,Cperforms the game withAas follows.

    SetupCgenerates the public params of the IBE scheme as follows.

    Secret key queries WhenAqueries the secret key for an id,Csearches the saved tuple (Q,id,U1id,U2id,S1id,S2id) from the history of the hash oracle query. (We assume that every id has been queried in hash query before secret key query.) IfS1id=⊥ andS2id=⊥,Caborts and outputs a random bit. Else,Creturns (S1id,S2id) toA.

    If the instances returned byOare uniformly random vectors, the challenge ciphertext is uniformly random and completely hides the information ofb. If the instances returned byOare normal LWE instances,then the challenge ciphertext will be a valid encryption of mbfor identity i d*.

    Acan make more secret key queries after the challenge phase with the restriction that it can’t make the secret key query for identity id*. After that,Aoutputs a bitb′toC. Ifb′=b,Coutputs 1, elseCoutputs 0.

    IfCdose not abort, the interaction between oracleO, algorithmCand adversaryAwill be as shown in Figure 1.

    By a standard argument,Cwill not abort during the game with the probability 1/QH. IfCdoes not abort, it means that the target identity submitted byAis the identity queried by theI-th hash query. In this case, if the challenge ciphertext is uniformly random,the probabilityb′=bis 1/2. (Which means that the instances returned byOare uniformly random.) If the challenge ciphertext is a valid encryption, the probabilityb′=bis 1/2+Adv(A). (Which means that the instances returned byOare LWE instances.) So the advantage thatCcan distinguish LWE instances from uniformly random vectors is Adv(A)/QH. Thus, ifAhas an non-negligible advantage to break the IND-IDCPA security, thenChas a non-negligible advantage to solve decision normal LWE problem.

    Fig. 1 The interaction between O,C and A.

    2.4 Construction Based on RLWE

    Our ring version IBE scheme is described as follows:

    Setup(1λ): The PKG chooses positive integersn,m,q,k,l, two real number σ,θ and a hash functionsH:{0,1}l→Rq×Rq, wherelis the length of an identity. The first part of the output ofHis an invertible element ofRq. Then PKG runs TrapGen(n,m,q,θ) to generate a random vectora∈Rmqand a short basisTa∈R(qm-k)×kof the lattice Λ⊥q(a). The PKG sets the master public key mpk=aand master secret key msk=Ta. Finally, the PKG publishes the parametersparam=(n,m,l,q,k,σ,θ,a,H).

    The proof is similar as that in section 3.2, so we omit it.

    Assume that the decision-RLWE problem is hard,the ring version IBE is IND-ID-CPA secure. The proof of the security of the ring version IBE is similar as that in section 2.3, so we omit it.

    3 Comparison

    We compare the correctness conditions for our scheme with the conditions for GPV[2]and ABB[5]. The security model and the error term in the decryption results of our scheme, GPV[2]and ABB[5]are listed in Table 1. (The schemes used for comparison are multi bits encryption version.)

    Table 1 Correctness condition of three schemes

    The correctness condition of our scheme is similar with GPV[2]. The difference between GPV[2]and our scheme is that our scheme needs to guarantee the second inequation. As we can set the distribution parameters of secret random vectore1to be the same as the distribution parameters ofe2, the second inequation will always hold as long as the first inequation holds. Thus, the parameter setting of GPV[2]can be used for our scheme without losing correctness and security. ABB[5]has more decryption noise because of the standard model. The length of the error term used in ABB's[5]encryption is 2m. The distribution of the outputs of S ampleLeft is the same as the outputs of S amplePre except the length of outputs.Therefore, the parameter setting that guarantee the correctness of ABB[5]can also guarantee the correctness of our scheme.

    Compared with other lattice-based IBE schemes,our scheme can encrypt more bits in a ciphertext,which means that our scheme can achieve smaller ciphertext size than other lattice-based IBE schemes when the length of the plaintext is fixed. To encrypt more bits, the size of secret key of our IBE scheme is bigger than that of other schemes. However, the ratio of the size of secret key to the size of plaintext is not greater than that of other schemes. The comparison of the ciphertext size, secret key size and plaintext size is shown by Table 2. To encryptklbits, one can just divide it intokpieces and encrypt each piece to getkciphertexts. However, the ratio of the ciphertext size to the plaintext size of each scheme will not be changed,as every ciphertext only corresponds to a piece of plaintext withlbits.

    Table 2 Comparison of ciphertext size, secret key size and plaintext size

    When the parametersn,m,l,qof schemes are chosen, our scheme can encryptl+nbits in a ciphertext whose size is (m+l)logq, while other LWEbased schemes can only encryptlbits in a ciphertext with the same ciphertext size. Ifl=n, the length of message that our scheme can encrypt is twice of other schemes, and the size of the ciphertext is not bigger than that of other schemes.

    The disadvantage of our scheme is the computation cost. Our scheme needs to perform one more discrete gaussian sampling and vector addition in encryption than other schemes. In decryption, our scheme needs to perform two more matrix multiplications, and one more vector subtraction.However, as our scheme is able to transmitnmore bits, we think the performance penalty of adding these computations is acceptable.

    4 Conclusion

    In this paper, we propose an IBE scheme and its ring version based on LWE/RLWE problem and prove that our schemes is IND-ID-CPA secure under the random oracle model. Compared with previous latticebased IBE schemes, the computation cost of encryption and decryption of the proposed schemes is more than others, but our schemes can encrypt more message without increasing the size of ciphertext.

    在线观看免费日韩欧美大片| 国产成人系列免费观看| 国产高清激情床上av| 变态另类丝袜制服| 一本久久中文字幕| 少妇的丰满在线观看| 波多野结衣巨乳人妻| 午夜激情av网站| 亚洲美女黄片视频| 成在线人永久免费视频| 免费不卡黄色视频| 亚洲av成人一区二区三| 一进一出抽搐gif免费好疼| 亚洲,欧美精品.| 日本a在线网址| 免费不卡黄色视频| 成人永久免费在线观看视频| 国产精品影院久久| 一个人免费在线观看的高清视频| 别揉我奶头~嗯~啊~动态视频| 国内久久婷婷六月综合欲色啪| 老司机深夜福利视频在线观看| 国产精品影院久久| 欧美日韩亚洲综合一区二区三区_| 日韩有码中文字幕| 看黄色毛片网站| 女人被躁到高潮嗷嗷叫费观| 国产一区二区在线av高清观看| 久久性视频一级片| 九色国产91popny在线| 精品福利观看| 99re在线观看精品视频| 99热只有精品国产| 午夜免费观看网址| 脱女人内裤的视频| 可以在线观看毛片的网站| 亚洲av成人一区二区三| 在线观看66精品国产| 日本免费一区二区三区高清不卡 | 久久人人精品亚洲av| 男人舔女人下体高潮全视频| 国产91精品成人一区二区三区| 婷婷六月久久综合丁香| 91精品三级在线观看| 一二三四社区在线视频社区8| 露出奶头的视频| 两个人视频免费观看高清| 久久久久久久久久久久大奶| 成年人黄色毛片网站| 一进一出抽搐动态| 可以免费在线观看a视频的电影网站| 亚洲国产精品久久男人天堂| 国内精品久久久久精免费| 精品久久久精品久久久| 日韩精品中文字幕看吧| 动漫黄色视频在线观看| 国产av在哪里看| 精品人妻在线不人妻| 免费高清视频大片| 满18在线观看网站| 99在线视频只有这里精品首页| 国内精品久久久久精免费| 亚洲精品中文字幕在线视频| 国产精品日韩av在线免费观看 | 国产欧美日韩一区二区三区在线| 午夜福利欧美成人| 日韩欧美一区二区三区在线观看| 成人三级黄色视频| 男人舔女人的私密视频| 久久久国产欧美日韩av| 自线自在国产av| 美女免费视频网站| 欧美老熟妇乱子伦牲交| 淫秽高清视频在线观看| 亚洲五月天丁香| 一区在线观看完整版| 精品日产1卡2卡| 亚洲情色 制服丝袜| 9191精品国产免费久久| 老熟妇乱子伦视频在线观看| 色哟哟哟哟哟哟| 欧美在线黄色| 少妇被粗大的猛进出69影院| 女性生殖器流出的白浆| 69av精品久久久久久| 女警被强在线播放| 国产在线精品亚洲第一网站| 亚洲va日本ⅴa欧美va伊人久久| 欧美日本亚洲视频在线播放| av网站免费在线观看视频| 欧美丝袜亚洲另类 | 一区二区三区精品91| 日本vs欧美在线观看视频| 国产极品粉嫩免费观看在线| 中文字幕最新亚洲高清| 一二三四在线观看免费中文在| 一级毛片女人18水好多| 久久久久久亚洲精品国产蜜桃av| 亚洲情色 制服丝袜| 国产99白浆流出| 国产精品免费一区二区三区在线| 深夜精品福利| 亚洲av美国av| 亚洲国产欧美日韩在线播放| 91字幕亚洲| 日韩 欧美 亚洲 中文字幕| 天堂动漫精品| 亚洲久久久国产精品| 男女做爰动态图高潮gif福利片 | 国产精华一区二区三区| 黄色视频,在线免费观看| 成人手机av| 亚洲成a人片在线一区二区| www.熟女人妻精品国产| 麻豆一二三区av精品| 一级黄色大片毛片| 国产一区在线观看成人免费| 在线免费观看的www视频| 亚洲中文av在线| 丰满的人妻完整版| 女生性感内裤真人,穿戴方法视频| 丝袜美腿诱惑在线| 成人手机av| 午夜老司机福利片| 最近最新中文字幕大全电影3 | 在线国产一区二区在线| 一二三四在线观看免费中文在| 97碰自拍视频| 亚洲第一av免费看| 久久精品91蜜桃| 国产又爽黄色视频| 亚洲久久久国产精品| 国产成人精品在线电影| 成人手机av| 亚洲欧美精品综合久久99| 我的亚洲天堂| 少妇熟女aⅴ在线视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲自拍偷在线| 国产亚洲精品第一综合不卡| 日本免费一区二区三区高清不卡 | 香蕉久久夜色| 50天的宝宝边吃奶边哭怎么回事| 亚洲国产欧美网| 午夜激情av网站| 国产在线观看jvid| videosex国产| 91av网站免费观看| 欧美丝袜亚洲另类 | 狂野欧美激情性xxxx| 麻豆一二三区av精品| ponron亚洲| 国产午夜精品久久久久久| 亚洲精品美女久久久久99蜜臀| 亚洲五月婷婷丁香| 亚洲情色 制服丝袜| 黑人巨大精品欧美一区二区mp4| 久久精品国产清高在天天线| 久久天躁狠狠躁夜夜2o2o| 在线播放国产精品三级| 老司机在亚洲福利影院| 午夜福利一区二区在线看| 丝袜美腿诱惑在线| 美女高潮到喷水免费观看| 一进一出抽搐动态| 国产熟女xx| 色老头精品视频在线观看| 少妇粗大呻吟视频| 亚洲精品美女久久av网站| av网站免费在线观看视频| 日本在线视频免费播放| 91在线观看av| 日韩精品青青久久久久久| 久热这里只有精品99| 宅男免费午夜| 电影成人av| 欧美中文日本在线观看视频| 国产精品永久免费网站| 久热爱精品视频在线9| 国产主播在线观看一区二区| 免费看十八禁软件| 最新美女视频免费是黄的| 国产精品99久久99久久久不卡| 久久国产乱子伦精品免费另类| 长腿黑丝高跟| 国产亚洲欧美在线一区二区| 日韩欧美一区视频在线观看| 99久久久亚洲精品蜜臀av| 自线自在国产av| 午夜a级毛片| 久久久国产欧美日韩av| 亚洲美女黄片视频| АⅤ资源中文在线天堂| 日本免费a在线| 国产黄a三级三级三级人| 日日干狠狠操夜夜爽| 十分钟在线观看高清视频www| 9191精品国产免费久久| netflix在线观看网站| 此物有八面人人有两片| 亚洲第一青青草原| 啪啪无遮挡十八禁网站| 久久久久久久精品吃奶| av天堂久久9| 精品国产乱子伦一区二区三区| 亚洲三区欧美一区| 国产又色又爽无遮挡免费看| 精品免费久久久久久久清纯| 久久午夜亚洲精品久久| 别揉我奶头~嗯~啊~动态视频| 两个人看的免费小视频| 欧美精品亚洲一区二区| 欧美+亚洲+日韩+国产| 亚洲国产精品sss在线观看| 国内毛片毛片毛片毛片毛片| 国内毛片毛片毛片毛片毛片| 欧美人与性动交α欧美精品济南到| 18禁黄网站禁片午夜丰满| 丝袜美足系列| 国产野战对白在线观看| 国产精品日韩av在线免费观看 | 欧美日韩精品网址| 亚洲欧美日韩无卡精品| 精品国产乱码久久久久久男人| 别揉我奶头~嗯~啊~动态视频| 免费一级毛片在线播放高清视频 | 99riav亚洲国产免费| 午夜免费激情av| 女人被狂操c到高潮| 高潮久久久久久久久久久不卡| 人人澡人人妻人| 国产一级毛片七仙女欲春2 | 一二三四社区在线视频社区8| 国产成人精品在线电影| 男女之事视频高清在线观看| 欧美日韩乱码在线| 叶爱在线成人免费视频播放| 亚洲九九香蕉| 成年女人毛片免费观看观看9| 欧美日本视频| 人人妻人人澡欧美一区二区 | 又黄又粗又硬又大视频| 亚洲伊人色综图| 国产精品一区二区三区四区久久 | 国产成人系列免费观看| 免费少妇av软件| 69av精品久久久久久| 在线av久久热| 国产成人免费无遮挡视频| 色在线成人网| 国产高清有码在线观看视频 | ponron亚洲| 美女高潮喷水抽搐中文字幕| 久久久水蜜桃国产精品网| 黄片小视频在线播放| 黄片小视频在线播放| 夜夜爽天天搞| 免费看美女性在线毛片视频| 在线观看午夜福利视频| 亚洲天堂国产精品一区在线| 日本免费一区二区三区高清不卡 | 中文字幕精品免费在线观看视频| 久久精品aⅴ一区二区三区四区| 亚洲黑人精品在线| 日本在线视频免费播放| 99久久久亚洲精品蜜臀av| 黄频高清免费视频| 91大片在线观看| 精品人妻1区二区| 91成年电影在线观看| 色播亚洲综合网| 中文字幕最新亚洲高清| 亚洲五月色婷婷综合| 美女高潮喷水抽搐中文字幕| 一个人免费在线观看的高清视频| 亚洲av电影不卡..在线观看| 国产免费男女视频| 国产精品久久久久久精品电影 | 国产欧美日韩一区二区精品| 日日爽夜夜爽网站| 亚洲中文字幕一区二区三区有码在线看 | 香蕉国产在线看| 国产成人av激情在线播放| 一区二区三区激情视频| 精品乱码久久久久久99久播| 久久久久久久午夜电影| 国产三级黄色录像| 免费人成视频x8x8入口观看| 两性夫妻黄色片| 欧美一级毛片孕妇| 窝窝影院91人妻| 色播在线永久视频| 免费看a级黄色片| 51午夜福利影视在线观看| 成人三级做爰电影| 亚洲欧美激情在线| 久久精品影院6| 午夜精品久久久久久毛片777| 韩国av一区二区三区四区| 国产xxxxx性猛交| 人成视频在线观看免费观看| 午夜免费鲁丝| 亚洲av成人不卡在线观看播放网| 欧美日韩亚洲综合一区二区三区_| 亚洲avbb在线观看| 亚洲国产高清在线一区二区三 | 久久欧美精品欧美久久欧美| 亚洲欧美一区二区三区黑人| 欧美中文综合在线视频| 在线观看www视频免费| 国产成人精品在线电影| 午夜福利成人在线免费观看| 日本黄色视频三级网站网址| 亚洲无线在线观看| 夜夜夜夜夜久久久久| 黄色视频,在线免费观看| bbb黄色大片| 亚洲一区二区三区不卡视频| 在线观看一区二区三区| 又大又爽又粗| 真人做人爱边吃奶动态| 一个人观看的视频www高清免费观看 | 午夜成年电影在线免费观看| 一边摸一边做爽爽视频免费| 亚洲中文av在线| 91麻豆av在线| 亚洲熟女毛片儿| 亚洲av日韩精品久久久久久密| 大码成人一级视频| 一级a爱视频在线免费观看| 国产欧美日韩精品亚洲av| 99久久精品国产亚洲精品| av免费在线观看网站| 女生性感内裤真人,穿戴方法视频| 自拍欧美九色日韩亚洲蝌蚪91| 女同久久另类99精品国产91| 男女床上黄色一级片免费看| 欧美黄色淫秽网站| 亚洲精品国产区一区二| 成人手机av| 夜夜看夜夜爽夜夜摸| 日本 欧美在线| 日韩精品中文字幕看吧| 一个人观看的视频www高清免费观看 | 日韩成人在线观看一区二区三区| 精品一区二区三区四区五区乱码| 波多野结衣高清无吗| 久久香蕉激情| 日韩免费av在线播放| 国产欧美日韩一区二区精品| 亚洲国产欧美日韩在线播放| 国产熟女午夜一区二区三区| 男人舔女人的私密视频| 极品人妻少妇av视频| 黑人巨大精品欧美一区二区蜜桃| 免费不卡黄色视频| 国产精品久久久av美女十八| 色综合欧美亚洲国产小说| 国产在线观看jvid| 午夜老司机福利片| 亚洲成人免费电影在线观看| 国产精品二区激情视频| 日本欧美视频一区| 中文字幕人妻熟女乱码| 国产成+人综合+亚洲专区| 两个人免费观看高清视频| 1024视频免费在线观看| 午夜福利影视在线免费观看| 搡老岳熟女国产| 国产精品 国内视频| 一级毛片高清免费大全| 亚洲国产精品999在线| 香蕉丝袜av| 国产av一区在线观看免费| 日韩欧美国产一区二区入口| 国产成人精品无人区| 国产99久久九九免费精品| 欧美av亚洲av综合av国产av| 后天国语完整版免费观看| 女性被躁到高潮视频| 岛国视频午夜一区免费看| 十分钟在线观看高清视频www| 激情视频va一区二区三区| 国产av精品麻豆| 久久人妻av系列| 午夜影院日韩av| tocl精华| 亚洲午夜精品一区,二区,三区| 一二三四社区在线视频社区8| 欧美一级毛片孕妇| 午夜精品国产一区二区电影| av超薄肉色丝袜交足视频| 精品国产乱子伦一区二区三区| 在线观看免费视频网站a站| 国产成人一区二区三区免费视频网站| 神马国产精品三级电影在线观看 | 亚洲熟妇熟女久久| 男男h啪啪无遮挡| 亚洲av电影在线进入| 国产亚洲精品av在线| 香蕉丝袜av| 757午夜福利合集在线观看| 最近最新中文字幕大全免费视频| 一级a爱视频在线免费观看| 18禁裸乳无遮挡免费网站照片 | 嫩草影视91久久| 精品国产一区二区久久| 国产成人系列免费观看| 成人18禁在线播放| 欧美黄色片欧美黄色片| 看片在线看免费视频| 黑丝袜美女国产一区| 熟妇人妻久久中文字幕3abv| 一级片免费观看大全| 女同久久另类99精品国产91| 69精品国产乱码久久久| 午夜免费成人在线视频| 国产成人欧美在线观看| 国产精品久久久人人做人人爽| 91大片在线观看| 一二三四社区在线视频社区8| 麻豆一二三区av精品| 黄色视频,在线免费观看| 超碰成人久久| 在线观看午夜福利视频| 女人被躁到高潮嗷嗷叫费观| 国产麻豆69| 亚洲欧美日韩无卡精品| 欧美国产日韩亚洲一区| 亚洲男人天堂网一区| 国产精品野战在线观看| 黄频高清免费视频| 精品少妇一区二区三区视频日本电影| 国产欧美日韩一区二区精品| 人人妻人人澡欧美一区二区 | www.999成人在线观看| 真人做人爱边吃奶动态| а√天堂www在线а√下载| 九色亚洲精品在线播放| 国产av又大| 波多野结衣高清无吗| 成年女人毛片免费观看观看9| 久久亚洲精品不卡| 91老司机精品| 国产一区二区三区在线臀色熟女| 757午夜福利合集在线观看| 又大又爽又粗| 大型黄色视频在线免费观看| www国产在线视频色| 男女做爰动态图高潮gif福利片 | 午夜福利18| 无人区码免费观看不卡| 国产一区在线观看成人免费| 国产精品一区二区免费欧美| 国产一区二区三区在线臀色熟女| 一边摸一边抽搐一进一出视频| 中国美女看黄片| 999精品在线视频| 日韩一卡2卡3卡4卡2021年| 97人妻精品一区二区三区麻豆 | 麻豆一二三区av精品| 国产亚洲精品久久久久5区| av免费在线观看网站| 真人一进一出gif抽搐免费| 久久欧美精品欧美久久欧美| 亚洲男人的天堂狠狠| 在线免费观看的www视频| 精品久久久久久久人妻蜜臀av | 丝袜美足系列| 免费人成视频x8x8入口观看| 老汉色∧v一级毛片| 亚洲人成伊人成综合网2020| 日本 av在线| 午夜免费鲁丝| 18禁国产床啪视频网站| 亚洲国产中文字幕在线视频| 久久久久久免费高清国产稀缺| 亚洲国产高清在线一区二区三 | 久久精品91蜜桃| 成人亚洲精品一区在线观看| 91大片在线观看| 亚洲视频免费观看视频| 99久久综合精品五月天人人| 日韩欧美国产一区二区入口| 国产国语露脸激情在线看| 国产成人欧美| 国产精华一区二区三区| 欧美成人午夜精品| 久久精品91无色码中文字幕| 欧美日韩精品网址| 久久久久久久久久久久大奶| 9热在线视频观看99| 啪啪无遮挡十八禁网站| 熟妇人妻久久中文字幕3abv| 国产一区二区三区在线臀色熟女| 久久久久久久久中文| 久久久国产精品麻豆| 麻豆一二三区av精品| 国产亚洲欧美在线一区二区| 一级毛片精品| 视频区欧美日本亚洲| 91精品国产国语对白视频| 亚洲熟妇中文字幕五十中出| √禁漫天堂资源中文www| 乱人伦中国视频| 好男人在线观看高清免费视频 | 国产精品99久久99久久久不卡| 日本 欧美在线| 手机成人av网站| 亚洲黑人精品在线| www日本在线高清视频| 亚洲精品美女久久av网站| 中文字幕最新亚洲高清| 一区二区日韩欧美中文字幕| 欧美黄色淫秽网站| 伊人久久大香线蕉亚洲五| 国产欧美日韩综合在线一区二区| 少妇粗大呻吟视频| 别揉我奶头~嗯~啊~动态视频| 成人av一区二区三区在线看| 91国产中文字幕| 999久久久国产精品视频| 亚洲欧美激情综合另类| 国产av在哪里看| 精品国产一区二区久久| 亚洲伊人色综图| 很黄的视频免费| 日韩欧美国产一区二区入口| 午夜老司机福利片| 国产真人三级小视频在线观看| 老司机福利观看| 欧美av亚洲av综合av国产av| 女人被狂操c到高潮| 男女午夜视频在线观看| 精品久久久久久成人av| 97人妻精品一区二区三区麻豆 | 亚洲欧美一区二区三区黑人| 一级黄色大片毛片| 中国美女看黄片| 久久香蕉精品热| 久久久久九九精品影院| 女同久久另类99精品国产91| 操出白浆在线播放| 在线观看66精品国产| 一本久久中文字幕| 国产亚洲av高清不卡| 亚洲五月婷婷丁香| 国产欧美日韩一区二区三区在线| 亚洲成a人片在线一区二区| 人人妻人人澡欧美一区二区 | 一区二区三区高清视频在线| av视频在线观看入口| 女同久久另类99精品国产91| www.www免费av| 亚洲一区二区三区色噜噜| 国产av又大| 男人舔女人的私密视频| 性欧美人与动物交配| 91麻豆精品激情在线观看国产| 久久影院123| 国产一区二区在线av高清观看| 亚洲av成人一区二区三| 国产精品自产拍在线观看55亚洲| 国产熟女xx| av视频在线观看入口| 国产亚洲精品久久久久久毛片| 在线观看免费午夜福利视频| 亚洲欧美日韩无卡精品| 校园春色视频在线观看| 精品人妻在线不人妻| 精品国内亚洲2022精品成人| 欧美激情极品国产一区二区三区| 亚洲精品av麻豆狂野| or卡值多少钱| 老司机深夜福利视频在线观看| av超薄肉色丝袜交足视频| 日本黄色视频三级网站网址| 热99re8久久精品国产| av在线播放免费不卡| 国产成人啪精品午夜网站| 国产91精品成人一区二区三区| 亚洲情色 制服丝袜| 亚洲熟妇熟女久久| 国产成+人综合+亚洲专区| 这个男人来自地球电影免费观看| 国产高清视频在线播放一区| 国产区一区二久久| 国产又爽黄色视频| 黄色a级毛片大全视频| 久久久久久久午夜电影| 国产精品亚洲美女久久久| 免费人成视频x8x8入口观看| 999精品在线视频| 久久久久九九精品影院| 欧美一区二区精品小视频在线| 久久久久久亚洲精品国产蜜桃av| 亚洲片人在线观看| 九色国产91popny在线| 精品久久久久久久毛片微露脸| 一边摸一边抽搐一进一出视频| 69精品国产乱码久久久| 久久国产乱子伦精品免费另类| 国产精品1区2区在线观看.| 久9热在线精品视频| 久久国产精品男人的天堂亚洲| 午夜久久久在线观看| 国产一卡二卡三卡精品| 免费观看精品视频网站| videosex国产| 日韩国内少妇激情av| 精品欧美国产一区二区三| 波多野结衣高清无吗| 国产成人啪精品午夜网站| 午夜福利,免费看| 色综合婷婷激情|