• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    2024-05-25 14:39:24XingfanZhaoChanggenPengWeijieTanandKunNiu
    Computers Materials&Continua 2024年4期

    Xingfan Zhao ,Changgen Peng,,? ,Weijie Tan and Kun Niu

    1State Key Laboratory of Public Big Data,College of Computer Science and Technology,Guizhou University,Guiyang,550025,China

    2Guizhou Big Data Academy,Guizhou University,Guiyang,550025,China

    ABSTRACT Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and key management schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.

    KEYWORDS Blockchain;smart contract;rational secret sharing;key management

    1 Introduction

    Key Escrow [1] refers to the storage of decryption keys in a key escrow system (also known as a key recovery system),and in some cases,authorizes third parties to access these keys,which is a key management mechanism for statutory escrow agency.Government and law enforcement agencies’needs to access encrypted data and recover commercial data have made key escrow a popular research topic in the 1990s [2].Key Escrow faces two challenges: the trust level of the key escrow agent and the ability to protect the keys [3].It is easy for a single key escrow party to collaborate with illegal organizations to obtain confidential data,facing widespread user doubts.A single key escrow node also faces the risk of a single point of failure.Therefore,split key escrow has gradually become a new direction for the development of key escrow[4].In this stage,Shamir[5]proposed partial key escrow for DES keys,Lenstra et al.[6]proposed a time-constrained key escrow system,and Micali et al.[7]proposed shared random functions and key escrow schemes.However,based on Shamir[8]and Blakley[9],independently proposed the concept of key dispersed management,using threshold secret sharing as the representative threshold cryptography as the theoretical basis,comprehensively considering the security and implementation difficulty of the scheme,studying threshold key escrow schemes has become the main trend of key split escrow.Therefore,the key to designing a threshold key escrow scheme that meets actual needs lies in studying and developing corresponding threshold secret sharing technology.

    Shamir’s threshold secret sharing and other early-stage secret sharing schemes assumed that the secret distributor and participants were honest without considering deceptive behavior.In response,Chor et al.[10] proposed the concept of verifiable secret sharing (VSS),which added a verification algorithm to the traditional secret sharing scheme.However,this scheme required an interactive process,resulting in low efficiency.Bai et al.[11]proposed a verifiable quantum secret sharing scheme based on d-dimensional Greenberger-Horne-Zeilinger(GHZ)state and analyzed its security against three main quantum attacks:interception retransmission attack,entanglement measurement attack,and honest participant attack.Gentry et al.[12] proposed a non-interactive public verifiable secret sharing(PVSS)scheme for large-scale distributed networks,which can be extended to have hundreds or even thousands of participants to support secure computing in large-scale distributed systems.However,these VSS schemes only consider honest participants and suspected fraudulent participants,without considering the motivations and benefits of each participant.For large-scale institutions like governments or enterprises,key escrow participants are usually bound by political orders,business contracts,and other forms of compulsion,which do not need to consider the self-interested behavior of each participant in the threshold key escrow scheme.Whereas,for online distributed systems like blockchain that target a large number of network users,the traditional threshold key escrow scheme does not have such constraints,resulting in participants who do not upload or upload false key shares still being able to obtain reconstructed keys.

    Halpern et al.[13] considered the selfish behavior of participants and introduced Game theory to secret sharing and secure multi-party computation.They proposed a rational cryptographic protocol represented by rational secret sharing and rational secure multi-party computation for the first time.However,traditional rational secret sharing schemes rely on synchronous communication environments and cannot be applied to distributed systems such as blockchains with asynchronous communication.Kol et al.[14] used cryptographic techniques such as oblivious transfer and secure multi-party computation to construct the first rational secret sharing scheme suitable for asynchronous communication.In addition,Zhang et al.[15]introduced rational cryptography into quantum secret sharing research and proposed a rational quantum secret sharing scheme based on GHZ states,which was implemented on the IBM quantum computer[16].

    The wide application of blockchain and smart contracts in the Internet of Things has enabled the fulfillment of resource sharing and automated transactions without trusted centers [17].The public key cryptography technology widely used in blockchain is highly related to the security of user private keys,user asset security,data security,and identity certification security.As there is no trusted third party in the blockchain system,individuals need to locally store their private keys.Once the device where the private key is stored is lost,data is damaged,or even hacked by hackers,it will lead to the loss or leakage of user data and assets.In this context,blockchain private key escrow solutions based on threshold key management technology have become a research hotspot for blockchain private key protection.However,the currently proposed key management schemes for blockchain private key recovery still adopt traditional VSS technology,without considering the rational self-interest behavior of the escrow users[18];the successfully implemented rational secret sharing schemes on blockchain require the secret sharing participants to deliver deposits in advance[19].These schemes do not meet the individual rational constraint in mechanism design,limiting the application and promotion of corresponding blockchain threshold key escrow design.The main contributions of this paper are as follows:

    We proposed a threshold multi-key escrow management scheme that satisfied individual rational constraints and incentive compatibility: We first designed a reputation mechanism for participants during the key reconstruction phase with the process of uploading and verifying private key fragments and reporting.Then,according to the ratio of contribution to promote the cooperation and behavioral norms of blockchain users,we also proposed a benefit distribution mechanism that relied on a fair process of cooperative gaming.

    We constructed the whole multi-key escrow and reconstruction process based on verifiable random functions(VRF)and analyzed and demonstrated the collusion resistance,security verification ability,incentive compatibility and individual rational constraints of the threshold key escrow scheme through utility function analysis.We also compared it with existing blockchain recoverable key management schemes.

    We used the smart contracts to complete a multi-wallet key escrow simulation,demonstrating the ability of the scheme to manage wallet keys in Ethereum.We analyzed the performance and costs of the scheme,providing possibilities for achieving a distributed rational key management system for blockchain.

    2 Related Work

    2.1 Blockchain and Smart Contract

    Nakamoto et al.[20] proposed Bitcoin,a virtual encrypted currency,and the blockchain transaction structure using Proof of Work and timestamp construction in 2008,which marked the birth of decentralized blockchain technology.Blockchain combines with cryptographic technology ensures traceability,immutability,non-repudiation,and non-counterfeiting of transactions,supporting data security sharing and large-scale collaborative computing,protecting user identity and confidential data privacy,and is suitable for high-privacy and secure distributed application scenarios.Traceability refers to the recording of transaction changes in a blockchain in chronological order,immutability and non-repudiation refer to the inability to modify and deny data written into a blockchain,and non-counterfeiting refers to the inability to forge transactions that can be verified by miners and the entire transaction change record.Blockchain uses hash functions,digital signatures,and distributed consensus fault tolerance to increase the difficulty and cost of attackers falsifying,forging,and denying data operations,enhancing data security.

    Szabo proposed the smart contract,which is a computerized transaction protocol for executing contract terms[21].In the context of blockchain,smart contracts serve as scripts on blockchain and are stored on the blockchain.As smart contracts are located on the blockchain,they have their unique addresses.We trigger their execution by sending transactions to their addresses.Subsequently,smart contracts will be executed independently and automatically on every node in the network according to the data contained in the triggered transaction.Smart contracts on blockchain possess uniqueness,transparency,predictability,and monitoring and tracking capabilities,and have fostered the concept of a decentralized autonomous organization,allowing blockchain to achieve general computing among users without a trusted central node’s supervision [17].Raj et al.[22] proposed a blockchain smart contract scheme for supply chain management,which replaces the trust intermediary with smart contracts,shortens the payment process,reduces the communication cost,and improves the supply chain transaction efficiency.

    2.2 Research on the Security of Blockchain Wallet and Threshold Key Escrow

    Blockchain digital wallets provide users with a convenient way to manage private and public keys,while also enabling them to complete digital asset transfers and transactions,and record details of all transactions.The security of the wallet directly relates to the user’s asset security.The comparison of various blockchain key management schemes is shown in Table 1.The existing common wallet solution types include software wallets[23],hardware wallets[24],and custodial wallets[25],but they all have security risks in terms of centralized private key storage.To address these issues,decentralized secure threshold wallet schemes have emerged,which can split private keys into multiple parts and store them on different nodes,thereby achieving distributed storage and protection of private keys,while also allowing private keys to be restored.Therefore,this secure threshold wallet scheme is considered an effective protection plan.

    Table 1: Comparison of various blockchain key management schemes

    A threshold secret sharing-based threshold signature wallet scheme such as[26]does not support the escrow and recovery of personal user wallet private keys,while a threshold wallet management scheme that meets the needs of personal key escrow and recovery,such as [18],is only applicable to consortium blockchain applications,which requires trusted central nodes and identity authentication mechanisms.In addition,the aforementioned threshold wallet schemes have not taken into account the rational self-interest behavior of participants,resulting in high costs and limited applicability,which cannot be satisfied to the safe escrow needs of public blockchain user wallet keys such as Ethereum.Therefore,designing a private key escrow smart contract based on rational secret sharing is beneficial for achieving the escrow and recovery of public blockchain user private keys in an environment without trusted nodes.

    3 Preliminaries

    3.1 Bilinear Mapping

    Definition 1:Let G1and G2be the additive cyclic group and multiplicative cyclic group of a prime number p,respectively,let g be a generator of G.The mapping e:G1×G1→G2is bilinear if it satisfies the following properties:

    1)Bilinearity:For any m,n∈G1and a,b∈,exists e=e(m,n)ab.

    2)Non-degeneracy:e(g,g)1.

    3)Computability:There exists an efficient algorithm to compute e(m,n)for any m,n∈G1.

    Definition 2:Elliptic Curve Discrete Logarithm Problem(DCELP):Given an elliptic curve E defined over a finite field Fp,with a base point P∈of order n.Q∈Ewhere Q=IP,I∈n,itis difficult to compute I.

    Definition 3:Computational Diffie-Hellman(CDH)Given aP,bP,cP∈G1,it is difficult to compute abP for any a,b∈ZP?.

    Definition 4:Bilinear Diffie-Hellman Problem Given aP,bP,cP∈G1,it is difficult to compute e(P,P)abc for any a,b,c∈This problem relies on the difficulty of the CDH problem in G1.

    3.2 Game Theory Related Knowledge

    3.2.1 Incentive Compatibility

    Incentive compatibility refers to the consistency between individual incentive mechanisms and overall benefits in a game.It includes Bayesian incentive compatibility and dominant strategy incentive compatibility.It should be noted that Bayesian incentive compatibility is a weak concept in games,while dominant strategy incentive compatibility is a strong concept.If a game is dominant strategy incentive compatible,then it must be Bayesian incentive compatible.

    In mechanism design,Bayesian incentive compatibility is considered a sufficient and necessary condition for participants to speak the truth.A game is Bayesian incentive compatible if and only if,for any playeri,any possible private typeθi,and any other players’strategiesσ-i,the following condition is satisfied:

    whereUi(σi,σ-i,θi)represents playeri’s utility when their private type isθi,they choose strategyσi(the true strategy),and the other players choose strategiesσ-i.

    In a game,if each player adopts their dominant strategy regardless of the other players’actions,the game is dominant strategy incentive compatible.Mathematically,a game is dominant strategy incentive compatible if and only if for any playeri,any other player’s strategyσ-i,the following condition is satisfied:

    whereUi(σi,σ-i)represents playeri’s utility when all players adopt strategyσi,σ-i.

    3.2.2 Individual Rationality

    In game theory,individual rationality refers to each player choosing strategies that are beneficial to them in pursuit of their own maximum interests.This is also known as the assumption of rational participants.In mechanism design,individual rationality means designing a game mechanism to ensure that each participant has the motivation to participate and will not obtain a worse result due to participation.

    Mathematically,individual rationality satisfies the following conditions:

    For each participanti,individual rationality requires that their returns after participating in the mechanism are not less than their worst returns from leaving the mechanism,i.e.,

    whereUi(?)represents the returns of participantiwhen they do not participate in the mechanism.

    3.2.3 Fairness of Cooperative Game and Shapley Value Principle

    Fairness is a concept to measure the justice of a game.In Game theory,fairness usually refers to whether a game satisfies some fair principles,such as the symmetry principle in a zero-sum game and the Shapley value principle in a cooperative game.

    In a cooperative game,the Shapley value principle means that each player should get the corresponding reward for his contribution to the game.Specifically,the Shapley value refers to the average contribution of a player to all possible coalitions.If a player’s Shapley value is lower than other players,this situation is also unfair.

    3.2.4 Rational Fairness

    In Game Theory,rational fairness refers to the participants in a game mechanism pursuing their own interests (rationality) while also obtaining fair results.Rational fairness requires participants to consider not only their own interests but also the interests of other participants when choosing strategies,in order to achieve a fair balance.

    Rational fairness should satisfy the following conditions:

    For each participant,rational fairness requires that the chosen strategy is an optimal response,i.e.,

    3.2.5 Resisting Collusion Attack

    In Game Theory,a Collusion Attack refers to participants secretly collaborating or cooperating to devise strategies for their own benefits while disregarding the interests of other participants.This collusion may distort the results of the game,sacrificing fairness and balance.Resisting Collusion Attack refers to a feature of strategic or mechanism design that aims to prevent participants from forming collusion or cooperation that could harm the fairness or balance of the game.

    Reference[27]proposed a definition of a computable anti-collusion equilibrium:in a game Γ=letTrepresent a collusion group andkbe a secure parameter of a cryptographic protocol.Assuming that for each collusion group,the non-collusive strategy isaT,the collusive strategy isand the non-collusion group’s strategy isa-i,we call the strategic combinationa=(a1,...,an)∈Aa computable anti-collusion equilibrium if forPi∈T,there exists a negligible functionε(k)such that the game remains in

    3.3 Verifiable Random Function

    Verifiable Random Function (VRF) [28] is a random function with verification capabilities.It can generate an output and allow a verifier to verify that the output was generated from a specific input and key while maintaining the randomness and unpredictability of the output.Reference [29]proposed an efficient verifiable random function based on bilinear pairs.The scheme includes the following components:

    a)Public-private key generation moduleGen:Input 1k,outputSK=s,PK=gs.

    b)Encryption moduleFSK(x):InputSK,x,outputy=FSK(x)=

    c)Evidence moduleπSK(x):InputSK,x,outputπ=πSK(x)=

    d)Verification moduleVPK(x,y,π):Determine whetheryis the output corresponding tox,input(PK,x,y,π),verify whethere(g·pk,π)=e(g,g)andy=e(g,π)are both true,and output 1 if both are true,otherwise output 0.

    4 Multi-Key Management Scheme Based on Rational Secret Sharing

    Based on the anti-collusion rational secret sharing [27],and taking into account the practical situation of blockchain key escrow,the current and long-term benefits of secret-sharing participants,and the advantages of blockchain smart contracts,a multi-private key management scheme based on rational secret sharing is proposed as follows.

    4.1 System Parameters

    The parameters involved in the proposed scheme are shown in Table 2.

    Table 2: The parameters of the proposed key management scheme

    4.2 Key Generation Phase

    This algorithm is executed by the system administrator to generate public key and private key ofPi.After executing this algorithm,the administrator will exit this program permanently.Especially,the setup algorithm inputs security parameter 1kand generates the public keypkiand the private keyskiby using Shamir’s(t,n)-threshold secret sharing scheme forPi.Moreover,blockchain administrators use multiple servers provided by the blockchain platform to secretly obtain randomly generated two-dimensional point coordinates,reconstruct Lagrange polynomials,and generate private keys by substituting additional random values.Its purpose is to avoid the risk of a single point of failure during the user’s local private key generation process.

    4.3 Key Escrow Negotiation Phase

    As shown in Fig.1,the key escrow user sets a threshold valuetaccording to its own needs,determines the number of participantsnto sign the key escrow agreement based on the active degree of the blockchain nodes andpencrypted keyss0,s1,...,sp-1,then negotiates the cost of the escrow contractM=M1+M2,determines the parameters of the geometric distributionλbased on the estimated benefits of the participants (see Section 6.3 for details) and generates a secure parameterr?∈Z+(Z+is a positive integer set)based on this geometric distribution.The key escrow user learns the addresses of all participants and establishes secure channels with each participant.Send the private keyski(i=1,2,...,n)to the participantithrough a secure channel and upload the public data to the smart contract:a)pki(i=1,2,...,n),b)M=M1+M2.

    Figure 1: Key escrow negotiation process

    4.4 Key Sharing Phase

    Step 2: To avoid duplicate numerical pairs causing failure during the key reconstruction phase,the key escrow user selectsn+p-tsmallest integersd1,d2,...,dn+p-tfrom [p,q-1] -{h(Addi||r)|i=1,2,...,n;r=1,2,...,r?}.

    The process of key sharing phase is shown in Fig.2.

    4.5 Key Reconstruction Phase

    Figure 2: Key sharing process

    Step 3:Performs automatic contract verification of the reported account in order of submission.If the verification result is 0,the reputation value of the reported account will beRvfl-1,and the contribution value will beCvld-1.At the same time,the reporter will be rewarded with a reputation value ofRvld+1 and a contribution value ofCvld+1.If the reporterldhas not uploadedandwithinT1,they can resubmit after theStep 3contract automatic verification is completed and return toStep 2.If the verification result is 1,the reputation value of the reported account will remain unchanged,and the contribution value will beCvfl+1.At the same time,the reporter will be penalized with a reputation value ofRvld-1 and a contribution value ofCvld-1.

    Step 4:WithinT3,the key escrow user calls the local resource to verify the remaining unreported participants one by one.If the participanti’s verification result is 0,the user will report feedback to the contract.After being verified by the contract,Cvi-1,mr-1.If the result is 1,it will continue to verify the participanti+1.Complete the verification of all participants andmr≥t,then proceed toStep 5.

    Step 7: Check ifM2(r)in the current contract is not less than the maximum costLof the next round.If it is,proceed toStep 8;if not,notify the key escrow user to make up the payment(not less thanL-M2(r))withinT5.If the payment is made promptly,proceed toStep 8.If not,the contract will be assigned to each participant with the corresponding contribution valueAi=·M1,andM2(r)will be returned to the key escrow.The contract will be terminated.

    Step 8:The contract executesr+1,and return toStep 1.

    The process of the key reconstruction phase is shown in Fig.3.The algorithm pseudocode mainly executed by the smart contract is shown in Fig.4.

    Figure 3: Key reconstruction process

    Figure 4: Pseudocode for the main algorithms in the smart contract

    5 Scheme Analysis

    5.1 Correctness Analysis

    5.2 Smart Contract Participant Utility Analysis

    ForStep 1,the contract setting does not allow participants to upload duplicate data to avoid“free-riding” behavior in a round of polynomial reconstruction,which would improperly increase the contribution valueCvand allow participants to obtain rewards that do not belong to them.Not allowing participants satisfiedRv<0 to upload data reflects punishment for malicious participants(those who often engage in dishonest behavior).

    ForStep 2toStep 4,participantsldand participantsflcan be viewed as the following extended game (a complete information dynamic game,which means participants know each other’s payoffs,the available actions,and the order in which moves are made):

    The game tree for two players is shown in Fig.5(a>b>c>d>e):

    Figure 5: Participants’game in key reconstruction phase

    It is easy to find that the game has two optimal choices (true,silence) and (false,report) for participantld.For the participantfl,is a strictly dominant strategyσfl="true",and from the perspective of individual rationality,the participant is more inclined to honestly upload their own data.When malicious participants upload false data,the contract can effectively use the reporting mechanism to punish malicious participants promptly.Ultimately,a unique pure strategy Nash equilibrium in the sequential game could be found:honestly uploading data in the data uploading stage and not making false reports in the verification stage.

    ForStep 5toStep 8,there is actually no effective contribution value gain among participants,but only a reputation value reward is given to honest declaration behavior when the key escrow user declares deception to the contract.In principle,the key escrow user has no motivation to deceive,because the key escrow user needs to pay the contract verification overhead,and declaring success only increases the contract polynomial reconstruction overhead by 1 time when the polynomial is not reconstructed successfully.If the key escrow user does not declare reconstruction success inT4whenr=r?,only the amount belonging to the userM2(r)will be consumed by the contract until it is not more than one round of the maximum contract overhead valueLto stop.

    For the entire key escrow protocol,the actual benefits for each participant areUi=Ai=

    5.3 Analysis of Smart Contract Fairness

    5.3.1 Fairness Analysis of Cooperative Game

    5.3.2 Rational Fairness Analysis

    In this scheme,everyone’s choice strategy={"true",("false","report")}∈BRi(s-i)satisfies the requirement of rational fairness.

    5.4 Mechanism Design Analysis

    5.4.1 Fairness Analysis of Cooperative Game

    5.4.2 Personal Rational Analysis

    In the key escrow contract scheme,it was found in the utility analysis in Section 5.2 thatUi=·M1≥0=Ui{?},the condition for personal rationality in mechanism design is satisfied.

    6 Security Analysis

    6.1 Unforgeability of VRF

    First,the challenger setsG1andG2,determines the bilinear transformationeand generatorg.Then,the challenger randomly selectsξ∈{0,1}without revealing it toB.Ifξ=0,let Γ=e(g,g);ifξ=1,then let Γ ∈G2.

    Phase 2:Repeat the process of Phase 1.

    6.2 Threshold Security:No More Than t-1 Participants Cannot Obtain Information about p Encrypted Keys

    Public information(d1,G(d1)),...,consists ofn+p-tnumerical pairs,and no more thann+p-1 numerical pairs can be determined when no more thant-1 participants cooperate,making it impossible to determine a polynomial ofn+p-1 degree as in Eq.(6)and obtain information about the correspondingpencrypted keys.

    6.3 Resisting Collusion Attacks

    7 Performance Analysis

    7.1 Communication Cost

    7.2 User Communication Overhead

    As shown in Table 3,during the key distribution phase,whether it is Ogata’s scheme [30],Ra’s scheme[31],or the proposed scheme in this paper,it is necessary to transmit the corresponding key shares tonserver/participant nodes through secure channels.When the server/participant nodes are honest,Ogata’s scheme[30]only needs to communicate and interact during the reconstruction phase without the verification stage of server information.Ra’s scheme[31]needs to communicate with each server through an interactive verification method and determine whether the corresponding node is malicious.When there areemalicious nodes among the server/participant nodes,the former cannot correctly reconstruct the corresponding escrow key,while the latter needs to communicate with theseemalicious nodes for an additional round during the verification stage.For the proposed scheme in this paper,whether there are malicious nodes or not,in each round of key escrow user node verification,it only needs to obtain the verification information uploaded by each participant from the chain,that is,the communication overhead per round of verification isO(1),and the communication overhead ofr?rounds of verification isO(r?)=Afterr?rounds of iteration,the user reconstructs successfully locally and communicates with the smart contract deployed on the blockchain once,that is,the communication overhead of the reconstruction phase isO(1).However,for the proposed scheme,the overall communication complexity isOdue to the participants broadcasting communication interactions during the reconstruction phase.

    Table 3: User communication overhead comparison

    7.3 Feature Comparison

    As shown in Table 4,the current password-protected secret sharing (PPSS)-based key recovery management schemes for blockchain can meet the key recovery needs of blockchain with semihonest nodes,such as the consortium blockchain[30,31].However,these schemes require interactive verification between users and servers and often require synchronous communication.At the same time,they do not consider the rational self-interested behavior of blockchain,and cannot realize key recovery in more blockchain application scenarios such as the public blockchain.Our scheme uses rational secret sharing and the non-interactive verification method Elliptic Curve VRF(ECVRF)to meet all the requirements in the table,thus realizing the key recovery needs of blockchain users in the asynchronous communication environment of the public blockchain.

    Table 4: Feature comparison

    7.4 Computational Efficiency Analysis

    Based on the calculation efficiency analysis in Ra et al.[31] and the key distribution and reconstruction process proposed in the proposed scheme,we compare the computational complexity of Ogata’s scheme[30],Ra’s scheme[31],and the proposed scheme,as shown in Table 5.

    Table 5: Computational complexity comparison

    The computational complexity of Shamir’s secret sharing is denoted asS,the time complexity of generating random numbers is denoted ask,the time complexity of performing one ECVRF execution is denoted asT,and the number of executions of the proposed scheme during secret reconstruction is denoted asr?.

    As shown in Fig.6,in the key distribution process,when the user only hosts one key,the computational time overhead of the proposed scheme is higher than Ogata’s scheme [30] and Ra’s scheme[31].When the user hosts two keys at once,only in the case ofn=2,the computational time overhead of the proposed scheme is the same as Ogata’s scheme[30],and in other cases,it is lower than Ogata’s scheme[30]and Ra’s scheme[31].When the user hosts three keys at once,the computational time overhead of the proposed scheme is lower than Ogata’s scheme[30]and Ra’s scheme[31].

    Figure 6: Computational efficiency comparison during distribution

    As shown in Fig.7,when the user only hosts one key in the key recovery process,the computational time overhead of the proposed scheme is higher than Ogata’s scheme[30]and Ra’s scheme[31].When the user hosts five keys at once,in the case ofn≥10,the computational time overhead of the proposed scheme is lower than Ogata’s scheme[30]and Ra’s scheme[31].When the user hosts seven keys at once,in the case ofn≥5,the computational time overhead of the proposed scheme is lower than Ogata’s scheme[30]and Ra’s scheme[31].

    We conducted computational cost simulations on a personal computer with a 12th Gen Intel(R)Core(TM)i7-12700H 2.70 GHz CPU and 16.0 GB RAM,using JavaScript language.The number of participants in the proposed scheme is set to ben=1000 and the numberpof private keys that need to be escrowed is denoted asp=5.The computational cost for the negotiation and key sharing stage was 403881 ms,and the computational cost for the key reconstruction stage was 1248453 ms.

    Figure 7: Computational efficiency comparison during recovery

    7.5 Ether Consumption

    Table 6 shows the functions and corresponding Ether costs involved in the smart contract during the refactoring phase of the proposed scheme.However,according to the utility analysis in Section 5.2,participants will comply with the protocol and upload real data without false reporting.In principle,the contract will only execute a polynomial refactoring and hash value verification once,and will not execute the relevant functions of ECVRF(i.e.,serial 2 and 3).

    Table 6: Ether cost

    8 Conclusion

    We proposed a blockchain private key management scheme based on rational secret sharing,which can achieve one-time escrow and recovery of multiple wallet private keys for blockchain private user.This scheme can be applied to the secure backup scenario of digital assets such as blockchain user wallets and encrypted data.The proposed scheme takes into account the self-interested behavior of participants and satisfies individual rational constraints and incentive compatibility.It promotes the cooperation and behavioral norms of blockchain users by designing a reputation mechanism and a revenue distribution mechanism based on contribution value proportion.In addition,the scheme also designed the whole process of multi-key escrow and reconstruction based on verifiable random functions and demonstrated the collusion resistance,security verification ability,communication overhead,computational overhead,incentive compatibility and individual rational constraints through participants’utility function analysis.Finally,the scheme was simulated on Ethereum smart contracts to prove its feasibility on the public blockchain.

    In the future work,in order to make the proposed scheme a long-term blockchain key management protocol,we will consider the evolutionary game of blockchain users,adjust the reputation incentive design in this scheme and improve the efficiency of blockchain private key escrow and recovery.In addition,we will consider extending the management of the blockchain user’s private key from the wallet to more application scenarios of blockchain key management.

    Acknowledgement:I would like to express my deepest gratitude to all those who have supported and guided me throughout the course of this research.

    Funding Statement:This work was supported in part by the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400,in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010,in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017,in part by the Research Project of Guizhou University for Talent Introduction under Grant[2020]61,in part by the Cultivation Project of Guizhou University under Grant [2019]56,in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01],the Science and Technology Program of Guizhou Province(No.[2023]371).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design: Xingfan Zhao and Changgen Peng;supervision: Changgen Peng;data collection: Kun Niu;analysis and interpretation of results: Weijie Tan;draft manuscript preparation: Xingfan Zhao.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:There is no available data and materials.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一本久久精品| 老司机在亚洲福利影院| 2018国产大陆天天弄谢| 国产精品久久久久久人妻精品电影 | 热re99久久国产66热| 免费久久久久久久精品成人欧美视频| 日韩av不卡免费在线播放| 看十八女毛片水多多多| 巨乳人妻的诱惑在线观看| 每晚都被弄得嗷嗷叫到高潮| 高清不卡的av网站| 亚洲av欧美aⅴ国产| 熟女av电影| 美女视频免费永久观看网站| 日日爽夜夜爽网站| 日韩中文字幕视频在线看片| 老鸭窝网址在线观看| 一区二区日韩欧美中文字幕| 久热爱精品视频在线9| 精品一区二区三区av网在线观看 | 日本黄色日本黄色录像| 国产视频一区二区在线看| 欧美日韩视频高清一区二区三区二| 亚洲伊人久久精品综合| 亚洲一区二区三区欧美精品| 熟女av电影| 老司机靠b影院| 在线 av 中文字幕| 91麻豆av在线| 一级毛片黄色毛片免费观看视频| 成人手机av| 精品国产乱码久久久久久男人| 熟女少妇亚洲综合色aaa.| 欧美黑人精品巨大| 啦啦啦啦在线视频资源| av电影中文网址| 9色porny在线观看| 亚洲国产av新网站| 日韩一本色道免费dvd| 深夜精品福利| 极品少妇高潮喷水抽搐| 亚洲欧美激情在线| 曰老女人黄片| 国产成人精品久久二区二区免费| 免费久久久久久久精品成人欧美视频| 成人黄色视频免费在线看| 亚洲九九香蕉| 一本一本久久a久久精品综合妖精| 亚洲国产精品国产精品| 狂野欧美激情性bbbbbb| 久久精品久久精品一区二区三区| 婷婷丁香在线五月| 亚洲熟女精品中文字幕| 国产女主播在线喷水免费视频网站| 国产精品.久久久| 宅男免费午夜| 免费在线观看完整版高清| 久久久久久人人人人人| 热99国产精品久久久久久7| 国产一区二区 视频在线| 精品久久蜜臀av无| 国产极品粉嫩免费观看在线| 母亲3免费完整高清在线观看| 大陆偷拍与自拍| 午夜福利,免费看| 久热这里只有精品99| 成人国产一区最新在线观看 | 美女中出高潮动态图| 久久久久久免费高清国产稀缺| 高清欧美精品videossex| 久久国产亚洲av麻豆专区| 亚洲欧洲精品一区二区精品久久久| 亚洲欧美成人综合另类久久久| 制服诱惑二区| 亚洲精品久久久久久婷婷小说| 久久精品亚洲av国产电影网| cao死你这个sao货| 国产91精品成人一区二区三区 | 国产91精品成人一区二区三区 | 麻豆av在线久日| 久久中文字幕一级| 成人亚洲精品一区在线观看| 欧美激情极品国产一区二区三区| 一本一本久久a久久精品综合妖精| 精品一区二区三卡| 涩涩av久久男人的天堂| 欧美成人精品欧美一级黄| 国产精品一二三区在线看| 一级a爱视频在线免费观看| 高清欧美精品videossex| av电影中文网址| 亚洲欧美一区二区三区久久| 一区二区三区四区激情视频| 人人妻人人添人人爽欧美一区卜| 夫妻午夜视频| 精品久久蜜臀av无| 最新在线观看一区二区三区 | 少妇的丰满在线观看| 在线观看免费午夜福利视频| 精品福利永久在线观看| 久久精品人人爽人人爽视色| 亚洲成色77777| 天天操日日干夜夜撸| 国产男女超爽视频在线观看| 日本黄色日本黄色录像| 久久亚洲国产成人精品v| 午夜免费男女啪啪视频观看| 巨乳人妻的诱惑在线观看| 乱人伦中国视频| 国产高清视频在线播放一区 | 精品高清国产在线一区| 欧美中文综合在线视频| 亚洲国产av影院在线观看| 欧美日韩福利视频一区二区| 国产欧美日韩精品亚洲av| 日韩视频在线欧美| 日韩 欧美 亚洲 中文字幕| av线在线观看网站| 飞空精品影院首页| 女人被躁到高潮嗷嗷叫费观| 九色亚洲精品在线播放| 久久久久国产精品人妻一区二区| 美女国产高潮福利片在线看| 亚洲欧美清纯卡通| 亚洲国产最新在线播放| 99久久99久久久精品蜜桃| 日本av手机在线免费观看| 亚洲av片天天在线观看| 日日夜夜操网爽| 国产亚洲午夜精品一区二区久久| 精品久久蜜臀av无| 两人在一起打扑克的视频| 国产麻豆69| 99热国产这里只有精品6| av福利片在线| 别揉我奶头~嗯~啊~动态视频 | 亚洲av电影在线进入| 午夜福利,免费看| a级片在线免费高清观看视频| 无遮挡黄片免费观看| 伊人久久大香线蕉亚洲五| 国产成人欧美| 久久精品久久久久久久性| 婷婷成人精品国产| 啦啦啦啦在线视频资源| 亚洲精品国产区一区二| 亚洲欧美中文字幕日韩二区| av不卡在线播放| 亚洲精品国产av成人精品| 欧美乱码精品一区二区三区| av国产久精品久网站免费入址| 久久 成人 亚洲| 99久久综合免费| 免费日韩欧美在线观看| 国产精品免费视频内射| 一二三四在线观看免费中文在| 午夜两性在线视频| 老司机靠b影院| 十八禁高潮呻吟视频| 丝瓜视频免费看黄片| 亚洲中文字幕日韩| 欧美成人午夜精品| 亚洲中文字幕日韩| 另类精品久久| 飞空精品影院首页| 人人妻,人人澡人人爽秒播 | 王馨瑶露胸无遮挡在线观看| 久久久精品94久久精品| 午夜激情久久久久久久| 2018国产大陆天天弄谢| av一本久久久久| 丰满迷人的少妇在线观看| av一本久久久久| 免费av中文字幕在线| 久久国产精品人妻蜜桃| 久久99热这里只频精品6学生| 亚洲欧洲精品一区二区精品久久久| 搡老乐熟女国产| 男女高潮啪啪啪动态图| 亚洲五月婷婷丁香| 亚洲七黄色美女视频| 人人妻人人爽人人添夜夜欢视频| 欧美精品高潮呻吟av久久| 成人国产一区最新在线观看 | 国产在线免费精品| 考比视频在线观看| 在线观看一区二区三区激情| 国产亚洲精品第一综合不卡| 91字幕亚洲| 亚洲三区欧美一区| 久久国产精品影院| 五月天丁香电影| 国产在视频线精品| 老司机深夜福利视频在线观看 | 性色av乱码一区二区三区2| 午夜免费观看性视频| 男人添女人高潮全过程视频| 午夜影院在线不卡| 极品少妇高潮喷水抽搐| 亚洲视频免费观看视频| 免费看不卡的av| 九草在线视频观看| 五月开心婷婷网| 成在线人永久免费视频| 免费女性裸体啪啪无遮挡网站| 久久精品成人免费网站| av福利片在线| 午夜免费鲁丝| 在线av久久热| 久久久久国产一级毛片高清牌| 中文字幕色久视频| 自拍欧美九色日韩亚洲蝌蚪91| 国产高清国产精品国产三级| av国产精品久久久久影院| 国精品久久久久久国模美| 热re99久久国产66热| 欧美性长视频在线观看| 国产视频一区二区在线看| 老熟女久久久| 黄片小视频在线播放| 波野结衣二区三区在线| 亚洲欧美精品自产自拍| 午夜av观看不卡| 精品久久蜜臀av无| 青青草视频在线视频观看| 91九色精品人成在线观看| 一边摸一边做爽爽视频免费| 午夜免费成人在线视频| 久久毛片免费看一区二区三区| 国产亚洲欧美在线一区二区| 大型av网站在线播放| 男人操女人黄网站| 精品久久久久久电影网| 亚洲av日韩在线播放| av又黄又爽大尺度在线免费看| 观看免费一级毛片| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美 亚洲 国产 日韩一| 在线十欧美十亚洲十日本专区| 美女国产高潮福利片在线看| 少妇粗大呻吟视频| 国产在线观看jvid| 午夜免费观看网址| 色综合站精品国产| 欧美在线一区亚洲| 一本一本综合久久| 可以免费在线观看a视频的电影网站| 国内久久婷婷六月综合欲色啪| 国产成人av激情在线播放| 国产精品亚洲美女久久久| 黄网站色视频无遮挡免费观看| 国产av在哪里看| 男女床上黄色一级片免费看| 丝袜美腿诱惑在线| 给我免费播放毛片高清在线观看| 国产亚洲欧美98| 亚洲天堂国产精品一区在线| 91九色精品人成在线观看| 国产一级毛片七仙女欲春2 | 真人一进一出gif抽搐免费| 少妇的丰满在线观看| 可以在线观看毛片的网站| 此物有八面人人有两片| 搡老岳熟女国产| 他把我摸到了高潮在线观看| 免费看美女性在线毛片视频| 久9热在线精品视频| 午夜成年电影在线免费观看| 看片在线看免费视频| 亚洲av成人一区二区三| 白带黄色成豆腐渣| 97碰自拍视频| 香蕉av资源在线| 日韩视频一区二区在线观看| 桃红色精品国产亚洲av| 久久这里只有精品19| 高清在线国产一区| 美国免费a级毛片| 侵犯人妻中文字幕一二三四区| 日韩欧美 国产精品| 亚洲精品久久成人aⅴ小说| 亚洲无线在线观看| 一边摸一边抽搐一进一小说| 非洲黑人性xxxx精品又粗又长| 国产片内射在线| 中文资源天堂在线| 午夜激情av网站| 老熟妇仑乱视频hdxx| 国产精品久久久人人做人人爽| 国产精品自产拍在线观看55亚洲| 欧美成人一区二区免费高清观看 | 欧美性长视频在线观看| 12—13女人毛片做爰片一| 国产私拍福利视频在线观看| 两个人视频免费观看高清| 成人国语在线视频| 亚洲 欧美一区二区三区| 亚洲 欧美 日韩 在线 免费| 巨乳人妻的诱惑在线观看| 淫秽高清视频在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 一本精品99久久精品77| 色婷婷久久久亚洲欧美| 无遮挡黄片免费观看| 亚洲狠狠婷婷综合久久图片| 久99久视频精品免费| 啦啦啦观看免费观看视频高清| 国产精品亚洲一级av第二区| 两个人免费观看高清视频| 男女之事视频高清在线观看| 国产日本99.免费观看| 欧美最黄视频在线播放免费| 亚洲中文字幕一区二区三区有码在线看 | 日韩一卡2卡3卡4卡2021年| 亚洲第一电影网av| 午夜激情av网站| 亚洲第一av免费看| av在线天堂中文字幕| 久久久精品国产亚洲av高清涩受| 国产成人av激情在线播放| 黑人巨大精品欧美一区二区mp4| 亚洲欧美日韩无卡精品| 90打野战视频偷拍视频| 好男人在线观看高清免费视频 | 日韩精品免费视频一区二区三区| 两个人视频免费观看高清| 两人在一起打扑克的视频| 韩国av一区二区三区四区| www.自偷自拍.com| 一个人免费在线观看的高清视频| 午夜老司机福利片| 可以在线观看毛片的网站| 每晚都被弄得嗷嗷叫到高潮| 99精品欧美一区二区三区四区| 欧美成狂野欧美在线观看| 精品久久久久久久久久久久久 | 国产精品久久久av美女十八| 免费女性裸体啪啪无遮挡网站| 欧美黄色淫秽网站| 好看av亚洲va欧美ⅴa在| 婷婷精品国产亚洲av在线| 视频区欧美日本亚洲| 热99re8久久精品国产| 色播在线永久视频| 国产av在哪里看| 叶爱在线成人免费视频播放| 首页视频小说图片口味搜索| 国产伦一二天堂av在线观看| 亚洲美女黄片视频| 精品免费久久久久久久清纯| 午夜福利成人在线免费观看| 亚洲国产精品合色在线| 国产主播在线观看一区二区| 久久亚洲真实| 亚洲国产精品久久男人天堂| 国产精品一区二区精品视频观看| 欧美黑人精品巨大| 日韩大码丰满熟妇| 黄片播放在线免费| 黄色 视频免费看| 亚洲久久久国产精品| 国产色视频综合| 亚洲在线自拍视频| 一区二区三区高清视频在线| 亚洲九九香蕉| 久久草成人影院| 曰老女人黄片| 日韩欧美一区视频在线观看| 男女之事视频高清在线观看| 首页视频小说图片口味搜索| 国产亚洲精品一区二区www| 亚洲国产精品sss在线观看| 搡老妇女老女人老熟妇| 婷婷丁香在线五月| 成年版毛片免费区| 国内揄拍国产精品人妻在线 | 在线看三级毛片| 91在线观看av| 天天躁狠狠躁夜夜躁狠狠躁| 欧美zozozo另类| 午夜久久久在线观看| 色哟哟哟哟哟哟| 亚洲av日韩精品久久久久久密| 大香蕉久久成人网| 欧美久久黑人一区二区| 侵犯人妻中文字幕一二三四区| 久久精品国产亚洲av香蕉五月| 视频在线观看一区二区三区| 黄色丝袜av网址大全| 欧美成人午夜精品| 十八禁网站免费在线| 在线观看日韩欧美| 91九色精品人成在线观看| 久久国产乱子伦精品免费另类| 男女之事视频高清在线观看| 性欧美人与动物交配| 欧美乱色亚洲激情| www日本黄色视频网| 国产成人精品久久二区二区91| 亚洲国产精品久久男人天堂| 国产精品99久久99久久久不卡| 两个人免费观看高清视频| 欧美乱妇无乱码| 国产精品电影一区二区三区| 18禁观看日本| 成人午夜高清在线视频 | 欧美在线黄色| 1024视频免费在线观看| 成人欧美大片| 天天躁狠狠躁夜夜躁狠狠躁| 1024视频免费在线观看| 最新美女视频免费是黄的| 老熟妇仑乱视频hdxx| 国产精品自产拍在线观看55亚洲| 国产单亲对白刺激| 一级黄色大片毛片| 亚洲熟妇中文字幕五十中出| 美女 人体艺术 gogo| 免费在线观看视频国产中文字幕亚洲| 国产精品久久久人人做人人爽| 午夜精品久久久久久毛片777| 好看av亚洲va欧美ⅴa在| 色综合亚洲欧美另类图片| 给我免费播放毛片高清在线观看| 午夜日韩欧美国产| 国产成人系列免费观看| 男人的好看免费观看在线视频 | 日韩大尺度精品在线看网址| 国产精品影院久久| 夜夜爽天天搞| 免费在线观看日本一区| 欧美+亚洲+日韩+国产| 久久久久久久午夜电影| 欧美中文综合在线视频| 欧美一区二区精品小视频在线| 少妇裸体淫交视频免费看高清 | 午夜福利视频1000在线观看| 成人欧美大片| 美女午夜性视频免费| 制服诱惑二区| 国产精品乱码一区二三区的特点| 在线免费观看的www视频| 在线av久久热| 亚洲欧洲精品一区二区精品久久久| 男人舔女人的私密视频| 国产精品精品国产色婷婷| 午夜久久久久精精品| 午夜视频精品福利| 天堂√8在线中文| 成人国语在线视频| 精品国产亚洲在线| 欧美日韩乱码在线| 最近最新中文字幕大全电影3 | 亚洲精品美女久久av网站| 欧美一级毛片孕妇| 国产精品综合久久久久久久免费| 男女之事视频高清在线观看| 日本一本二区三区精品| 亚洲欧美日韩无卡精品| 亚洲色图 男人天堂 中文字幕| 99国产精品一区二区三区| www.999成人在线观看| 狂野欧美激情性xxxx| 每晚都被弄得嗷嗷叫到高潮| 最近最新中文字幕大全免费视频| 中文字幕av电影在线播放| 久久精品夜夜夜夜夜久久蜜豆 | videosex国产| 午夜成年电影在线免费观看| 波多野结衣高清无吗| 国产成人精品久久二区二区91| 看免费av毛片| 日本 av在线| 很黄的视频免费| 国产精品99久久99久久久不卡| 露出奶头的视频| 久久国产精品人妻蜜桃| 在线视频色国产色| 午夜精品在线福利| 757午夜福利合集在线观看| 天堂√8在线中文| 亚洲精品国产一区二区精华液| 亚洲 国产 在线| 男人的好看免费观看在线视频 | 香蕉久久夜色| 深夜精品福利| 亚洲欧美精品综合久久99| ponron亚洲| a级毛片在线看网站| 一本综合久久免费| 久久久水蜜桃国产精品网| 色尼玛亚洲综合影院| 日韩成人在线观看一区二区三区| 大香蕉久久成人网| 亚洲一区中文字幕在线| videosex国产| 精品一区二区三区av网在线观看| 国产高清激情床上av| 国产日本99.免费观看| 亚洲一区二区三区色噜噜| 免费搜索国产男女视频| 国产亚洲精品一区二区www| www.999成人在线观看| 精品久久久久久成人av| 日本五十路高清| 国产熟女午夜一区二区三区| 国产亚洲av高清不卡| 两个人视频免费观看高清| 亚洲av片天天在线观看| 美女高潮喷水抽搐中文字幕| 99热这里只有精品一区 | 中文字幕另类日韩欧美亚洲嫩草| xxx96com| 波多野结衣av一区二区av| 嫁个100分男人电影在线观看| 激情在线观看视频在线高清| 长腿黑丝高跟| 成人三级做爰电影| 777久久人妻少妇嫩草av网站| 亚洲精品久久成人aⅴ小说| 午夜免费激情av| 亚洲精品国产一区二区精华液| 国产亚洲精品av在线| 亚洲真实伦在线观看| 精品免费久久久久久久清纯| 色综合婷婷激情| 十八禁网站免费在线| 欧美日韩亚洲国产一区二区在线观看| 男女午夜视频在线观看| 日本一区二区免费在线视频| 精品不卡国产一区二区三区| 男女之事视频高清在线观看| 日日摸夜夜添夜夜添小说| 日韩欧美三级三区| 校园春色视频在线观看| 欧美又色又爽又黄视频| 最近在线观看免费完整版| 少妇 在线观看| 欧美黑人巨大hd| 国产精品亚洲美女久久久| 精品久久久久久久毛片微露脸| 精品久久久久久久久久免费视频| 一a级毛片在线观看| 国产成人欧美在线观看| 日本免费一区二区三区高清不卡| 视频在线观看一区二区三区| 国产精品乱码一区二三区的特点| 色综合站精品国产| 日日爽夜夜爽网站| 国产欧美日韩精品亚洲av| 久久热在线av| 在线永久观看黄色视频| 婷婷丁香在线五月| 午夜福利18| 老司机午夜十八禁免费视频| 亚洲成人久久性| 后天国语完整版免费观看| 一级黄色大片毛片| 午夜福利在线观看吧| 激情在线观看视频在线高清| 国产黄色小视频在线观看| 亚洲av中文字字幕乱码综合 | 精品久久久久久久久久久久久 | 俄罗斯特黄特色一大片| 免费一级毛片在线播放高清视频| www.999成人在线观看| 欧美久久黑人一区二区| 草草在线视频免费看| 法律面前人人平等表现在哪些方面| 精华霜和精华液先用哪个| 最新在线观看一区二区三区| 国产野战对白在线观看| 免费在线观看成人毛片| 成人国产一区最新在线观看| 国产精品美女特级片免费视频播放器 | 久久精品人妻少妇| 可以在线观看的亚洲视频| 午夜福利高清视频| 欧美日韩一级在线毛片| 悠悠久久av| 在线观看日韩欧美| 999久久久国产精品视频| 免费在线观看黄色视频的| 欧美三级亚洲精品| 国产精华一区二区三区| 久久香蕉精品热| 禁无遮挡网站| 亚洲精品中文字幕在线视频| tocl精华| 999精品在线视频| 中文字幕人妻熟女乱码| 国产亚洲精品第一综合不卡| 很黄的视频免费| av中文乱码字幕在线| 97超级碰碰碰精品色视频在线观看| 欧美又色又爽又黄视频| 女警被强在线播放| 老熟妇仑乱视频hdxx| 18禁黄网站禁片午夜丰满| 伊人久久大香线蕉亚洲五| 午夜老司机福利片| 午夜福利在线在线| 桃色一区二区三区在线观看| 国产男靠女视频免费网站| 在线av久久热| 久久国产精品男人的天堂亚洲| 亚洲av电影不卡..在线观看| 国产高清激情床上av| 制服人妻中文乱码| 91麻豆精品激情在线观看国产| 国产久久久一区二区三区| 国产免费av片在线观看野外av| 级片在线观看| 亚洲男人天堂网一区| 怎么达到女性高潮|