• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    2022-11-11 10:47:48GangXuYiboCaoShiyuanXuXinLiuXiuBoChenYiyingYuandXiaojunWang
    Computers Materials&Continua 2022年9期

    Gang Xu,Yibo Cao,Shiyuan Xu,Xin Liu,Xiu-Bo Chen,Yiying Yu and Xiaojun Wang

    1School of Information Science and Technology,North China University of Technology,Beijing,100144,China

    2School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,014010,China

    3Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,100876,China

    4School of Electronic Engineering,Dublin City University,Dublin,Ireland

    Abstract: With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search (PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further, the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly, we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result, which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least, through security analysis, our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.

    Keywords: Lattice cryptography; searchable encryption; blockchain; privacy protection;log system;information security;applied cryptography

    1 Introduction

    With the advancement of the big data period,more and more log files containing private data are being stored by data owners in the cloud,facing significant privacy threats and challenges.Searchable encryption is a technology for searching the log ciphertext based on keyword trapdoors.In this technology, data users can obtain the search trapdoors based on the searching keywords provided to the servicer.Then, the servicer executes a search algorithm to search for the matching ciphertext to correctly retrieve the data required by the user without recovering the plaintext,which significantly protects data privacy.At the beginning of the 21st century,Song et al.[1]put forward the new academic concept of searchable encryption for the first time.They completed the first research plan for the search problem of encrypted data.Further,searchable encryption can be divided into two categories,whether the encryption key and the decryption key are the same.The encryption key and decryption key of symmetric searchable encryption are the same,which cannot guarantee data security.Generally,it is only used when the owner and user of the log file are the same people,and it fails to satisfy most applications.

    In 2004, Boneh et al.[2] focused on searching for specific encrypted mailboxes to define the concept of Public-key Encryption with Keyword Search(PEKS)and gave a specific implementation.PEKS has different encryption and decryption keys, which can achieve the effect of sharing data information between data owners and data users so that searchable encryption can be applied to more practical scenarios.Many researchers have since improved and optimised the PEKS scheme to achieve faster search efficiency.Xu et al.[3] proposed Searchable Public Key Ciphertext with Hidden Structure(SPCHS),enabling the fastest possible search of keywords without compromising the encrypted keywords’contextual security.Cui et al.[4] proposed the concept of key aggregation searchable encryption and adopted the Key-Aggregate Searchable Encryption(KASE)scheme.In this scheme,the data owner is only required to issue a public key to the data users who share many files,which is helpful for the effective management of the key and makes this scheme easier to use in practical situations.Song et al.[5]proposed two searchable encryption schemes,FAST and FASTIO,to achieve forward privacy,dramatically improving I/O efficiency and reducing communication overhead.

    However, traditional PEKS faces the problem of the untrustworthiness of the servicer, which is fortunately solved to a certain extent by the emergence of blockchain technology.Blockchain,proposed by Nakamoto[6]in 2008,is a distributed public ledger that records all transactions into the block without third-party control and ensures the security and fairness of each transaction.At present,the vigorous development of blockchain technology is favoured by many researchers[7-16].Wang et al.[17] proposed a scheme that uses blockchain technology to store the hash value of users’private data and the attribute set of third-party applications,which realises secure one-to-many transmission of personal data.Xu et al.[18] avoided the intervention of third-party agencies through blockchain technology and established a multi-party security system.However,blockchain can solve the problem of the untrustworthiness of third-party organisations.Based on this idea, Li et al.[19] proposed a searchable encryption scheme (SSE-using-BC)based on blockchain technology, storing encrypted data on a decentralised blockchain.It avoids the intervention of centralised service providers and ensures the privacy of encrypted data.In 2019, Chen et al.[20] proposed a searchable encryption scheme for Electronic Health Records (EHR).Researchers used logical expressions to generate an EHR index and store it in the blockchain to ensure the EHR index’s immutability, integrity, and traceability.In 2020, Nie et al.[21] used searchable encryption to safeguard the privacy of data information and applied the Ethereum blockchain to solve the fairness problem in the search process.Chen et al.[22] designed a new Blockchain-based Searchable Public-key Encryption Scheme with Forward and Backward Privacy (BSPEFB), which largely avoids the adaptive leakage-exploiting attacks of searchable encryption technology in the Vehicle Social Network (VSN)and reflects the practicality of the scheme.

    Although the above scheme has improved the problem of the untrustworthiness of the service party in the searchable encryption process, with the rapid development of quantum computing[23], the Shor algorithm realises the rapid decomposition of large prime factors [24].As a result,malicious users with a quantum computer can launch a keyword guessing attack based on quantum computing,causing searchable encryption schemes based on traditional cryptography to lose security and privacy.As a result, more researchers have devoted themselves to proposing a post-quantum method.Nabil et al.[25] proposed that the traditional blockchain scheme is vulnerable to attacks by quantum adversaries.It designed the first post-quantum security signature scheme with public key re-randomisation by providing a deterministic wallet scheme with a post-quantum structure.However,lattice-based cryptography has the highest efficiency and low communication overhead among many post-quantum schemes,and is thus the most promising technology.

    In a nutshell,we propose a searchable encryption scheme based on lattice for log systems in the blockchain.Then,we describe our main contributions as follows:

    1.Firstly, we propose a searchable encryption scheme based on lattice cryptography to resist keyword guessing attacks under quantum computing.

    2.Secondly, blockchain technology is applied to replace the authoritative and trusted party in the scheme to ensure the honesty and credibility of the server.

    3.Finally, we conduct a security analysis of our scheme and compare it with other schemes,demonstrating its feasibility and efficiency.

    2 Preliminary

    Definition 1(Lattice)Suppose thata1,a2,...,am∈Rnaremlinearly independent vectors,then the set of linear combinations is called latticeL,denoted byL=L(A)={x1·a1+x2·a2+···+xm·am|xi∈Z},where the matrixA= {a1,a2,...,am} ∈Rn×mis called a basis ofL,mis called the rank ofL,andnis called the dimension ofL.Whenm=n,Lis called full rank.

    Definition 2(Dual Lattice)Suppose thatL(A) is the lattice composed of basesA∈Rn×m, then define the dual lattice as:L*={x∈Rn|〈x,y〉∈Z,?y∈L}.

    Definition 3(q-ary Lattice)Setqis a positive integer,given a matrixA∈Zn×mand vectoru∈Znq,we define:

    Obviously,Lq(A) andL⊥q (A) are dual lattices of each other, and(A) can be obtained by translation(A).

    Definition 4(Discrete Gaussian Distribution)Suppose thatDL,σ,cis a discrete Gaussian distribution defined on latticeLwith a vectorcas the center andσas a parameter,and the specific expression form is:such thatWhenc=0,it records asDL,σ.

    Lemma 1(TrapGen)[26]Supposeq≥2,andm≥2nlogq,TrapGen algorithm outputs a matrixA∈which is a statistically approximation to auniform distribution and the basisTA∈Zm×mof(A)satisfying‖TA‖≤O(nlogq)and

    Lemma 2(SamplePre)[27]SetTAis the basis of(A),the parametersand the vectoru∈,and then SamplePre algorithm outputs a vectorεthat is statistically close to,satisfyingAε=umodq.

    Lemma 3(SampleL)[28] Suppose a positive integerm >n,q >2, given a latticeL⊥q (A), setTAas the basis ofL⊥q (A), matrixB∈parameters, and vectoru∈Znq, then SampleL algorithm outputs a vectorε, which is statistically close toDL⊥q,s, satisfying(A|B)ε=umodq.

    Lemma 4(SampleR)[28] Suppose a positive integerm >n,q >2, given a lattice), setTBas the basis ofL⊥q (B), matrixA∈,R∈, parametersmax‖x‖=1‖Rx‖and vectoru∈Znq,then SampleR algorithm outputs a vectorεwhich is close tosatisfying(A|AR+B)ε=umodq.In particular,ifR∈{-1,1}m×m,then we obtain

    Lemma 5(Gaussian Sampling)[27] Knowing the centrec, parameterσ, and an implicit safety parameterpof a distribution,the algorithm randomly selects an integerx←Z ∩[c-σ·t,c+σ·t]and outputsxwith a certain probability andxis close toDZ,σ,c.

    Definition 5(ISIS problem)Suppose it is an integerq,matrixA∈,a real numberβ >0 and a vectorv,and there is a non-zero vectorεsatisfyingAε=vmodqand‖ε‖≤β.

    3 Design of Our Scheme

    3.1 Blockchain Architecture and Transaction Design

    The structure of the blockchain and transaction constructed in this paper is shown in Fig.1.The keyword ciphertext attribute and number attribute are added to the transaction.The keyword ciphertext attribute is formed by the data owner encrypting the keyword with the data user’s public key,and the number attribute records the number corresponding to the keyword.Based on this,the smart contract traverses the ciphertext of each keyword according to the search trapdoor uploaded by the data user and returns the number corresponding to the qualified keyword to the cloud storage platform.In this way,data owners and data users can share data.

    Figure 1:Blockchain and transaction structure

    3.2 Our Scheme Architecture

    The architecture of our scheme shows in Fig.2.The roles participating in this scheme include data owner,cloud storage platform,blockchain network,and data user.Their roles in the system are as follows:

    (1)Data owner.A data owner is the owner of the log file.He/she divides the log file,generates a number set,and extracts a valid keyword set to store the encrypted log file information in the cloud storage platform.In addition,he/she calculates the keyword ciphertext set corresponding to the log and then uploads the data index to the blockchain.The main problem faced by our scheme is that malicious users perform keyword guessing attacks under quantum computing on the keyword ciphertext,so our scheme focuses on the description of the encryption process of keywords.

    (2)Cloud storage platform.Cloud storage platform receives and stores the encrypted log file uploaded by the data owner.After getting the permission of the smart contract, the cloud storage platform returns the specific log file ciphertext to the data user.

    Figure 2:Scheme architecture

    (3)Blockchain network.By designing the algorithm in the smart contract,it receives the keyword ciphertext uploaded by the data owner and the trapdoor transmitted by the data user.After receiving a query request from a user, the query is performed according to a specific algorithm, and then the query result is returned to the cloud storage platform.The cloud storage platform is notified whether to send the ciphertext of the log file to the data user.

    (4)Data user.A data user is responsible for making a query request to the smart contract.Thus,he/she gets the ciphertext of the corresponding logfile from the cloud storage platform and obtains the plaintext of the log file after decryption.

    3.3 Related Algorithm Definition

    Definition 6The searchable encryption scheme based on lattice includes:

    (1)(p,pkown,skown,pkre,skre,$charge,$fund) ←Initialize(λ):We input the security parametersλof the architecture,output parametersp,the key held by the data owner(pkown,skown),the key held by the data user(pkre,skre),the single search price$charge of the blockchain,and the initial deposit value$fund of the data user.

    (2)(I,CF) ←Encrypt(F,pkown,skown,pkre): Firstly, the data owner generates a number setNand then takes the effective keywordsWi(1 ≤i≤n) in the log file under each number to generate a keyword setW= {W1,W2,...;,Wn}.Then, the data owner inputs the private keyskownand the public keypkreto encrypt the keyword set to obtain the ciphertextCW.Furthermore,we combineCWandNto get the data indexI,and the data index performs the chain operation.Finally,the log file is encrypted with the data user’s public keypkre,and the ciphertextFis obtained and uploaded to the cloud storage platform.

    (3)T←TrapGenerate(pkre,Wi):The algorithm takes the keywordWito be searched as well as the data user’s public keypkreas input.Then,the data user calculates and outputs the corresponding trapdoor T and uploads it to the blockchain network.

    (4)NW←Verify(I,T): The algorithm is executed by the smart contract in the blockchain.According to the indexItransmitted to the blockchain and the trapdoorTgenerated by the data user,the smart contract executes theVerifyalgorithm to search for the keyword ciphertext that matches the trapdoorT.If the corresponding ciphertext is found,the numberNWof the ciphertext will be returned to the cloud storage platform.

    4 Detailed Description of Our Scheme

    4.1 Initialise(λ)

    Initialise algorithm includes system initialisation, key initialisation, and blockchain network initialisation.In this algorithm, the system sets a series of parameters required for execution and distributes keys to the main participants of the system.The specific processInitialise(λ) is defined as follows:

    (1)System initialisation.A series of system parameters(n,m,q)are specified,where q is a prime number, and the system runs the initialisation program to generate the system parametersp.In this process, the system uses the input parameters to construct Znqand, selects a random vectorvfrom the Znq, and randomly selects two matricesM1andM2from the.Then, it sets the hash functionsrequired by the system and outputsp={n,m,q,v,M1,M2,H1,H2}.

    (2)Key initialisation.The system inputs the parameter p, Lemma 1 outputs the matrixMand the basisTof the latticeL(M) and satisfiesandMT= 0modq.Then, the system obtains the public-private key pair(pk,sk): =(M,T).Through the above process, the key(pkown,skown): =(Mown,Town)of the data owner and the key(pkre,skre): =(Mre,Tre)of the data user can be obtained,and then the system will transmit the generated key to the data owner and data user securely and confidentially.

    (3)Blockchain network initialisation.The data owner initialises the single search cost$charge on the blockchain network.The data user uses a unique identity ID to register an identity account on the blockchain network and set the deposit$fund of ID.

    4.2 Encrypt(F,pkown,skown,pkre)

    Encrypt algorithm includes log file encryption and keyword encryption.At this stage,this paper mainly studies the process of keyword encryption.The specific stepsEncrypt(F,pkown,skown,pkre)are as follows:

    (1)Preparation stage.The data owner will divide the log fileF,namelyF=(b1,b2,...,bn).After that, each division is numbered to generate a number setN=(1,2,...,n).Fori= 1,2,...,n,each keywordWiare extracted from each divisionbi.Finally, we obtain a keyword setW=(W1,W2,...,Wn).

    (2)Log file encryption.The data owner uses the public keypkreof the data used to encrypt each division of the log file and generates the corresponding log file ciphertextCbito form the ciphertext setThen,the data owner uploadsCFto the cloud storage platform.

    (3)Keyword encryption.The data owner randomly samples a vectorrand a noise vectoryin Znq.Then,for anyWi∈W,the data owner calculates:whereR∈{-1,1}.It is known that is the hash functionH1set by the system during the initialisation process.Then,the data owner randomly chooses a bitω∈{0,1}and calculates the corresponding hash valueAccording to Lemma 2,the data owner can obtain a vectorε,which satisfiesMownε=modq.In addition,the data owner calculates a parameter·ωfor each keyword ciphertext.The ciphertext corresponding to,and each division in the ciphertext corresponds to the number set to generate a ciphertext index

    (4)Keyword ciphertext uploading.The data owner uses the private key to generate a digital signature for the hash valueof each keyword ciphertext, generates the corresponding transaction,and submits the transaction to the master node.Then all nodes in the blockchain execute the consensus algorithm.The master node packs the transaction in a period together to form a block and then sends it to the slave node,which receives the block delivery by the master node and verifies the transaction in it.The verification process is as follows:the slave node extractspkownstored in the transaction from the node to decrypt and obtain the hash valueof the keyword ciphertext.Ifthe slave node announces that the verification is successful.Otherwise,the data may have been tampered with,and the slave node returns this transaction to the data owner.Assuming that the maximum number of malicious nodes that can exist in the consensus algorithm isf,if the number of verifications isNT >f+1,each node on the blockchain will store the block.

    4.3 TrapGenerate(pkre,Wi)

    The data user inputs their public keypkreand keywordWiintoTrapGenerate(pkre,Wi).According to Lemma 3,the algorithm generates a vectorTsatisfying(Mre|M1+M2·Wi)T=vmodq.Then,Twill be outputted as a trapdoor and sent to the consensus node on the blockchain.

    4.4 Verify(I,T)

    Before runningVerify(I,T), the smart contract will compare the value of the deposit$fund of data user ID and the single search cost $charge.If $fund<$charge, It returnsto the data user that the cost is insufficient.If $fund ≥$charge, the smart contract automatically executesVerifyto search for the keyword ciphertext and its number that match the user trapdoor in the data index set.Verifytakes data indexand trapdoorTas input.First,the algorithm enumerates the keyword ciphertextCWi (1 ≤i≤n)inI.For each ciphertext,calculate:then it can be concludedω= 1, otherwiseω= 0.Then the algorithm calculates the hash value, if it existsj∈[1,n] and satisfiesMreεj=modq,cWj′is the target keyword ciphertext corresponding to the trapdoorT.Finally,the numberNW=jof the keyword ciphertext is returned by the algorithm to the cloud storage platform.

    The cloud storage platform finds the ciphertext of the corresponding log file according to the index value and transmits it to the data user.To obtain the plaintext of the log file,the data user decrypts the ciphertext.

    Proof:For the method of restoring the value during the search and verification process,we give the proof as follow:

    5 Security Analysis

    5.1 Credibility

    This solution is based on the blockchain network,which can ensure the honesty and credibility of search results and primarily resist malicious attacks by illegal users on the server.The keyword search process does not involve any third parties in the decentralised blockchain network, and the nodes conduct open and transparent interactions based on transactions.All transactions and operations are recorded on the block.The characteristics of traceability and non-tampering can ensure the fairness and credibility of each search operation.In addition, each transaction initiated in the blockchain network requires the payment of a particular cost, which effectively avoids the possibility of illegal users undermining the program’s regular operation through malicious and exhaustive means.

    5.2 Unforgeability of Keyword Ciphertext

    In this scheme, the keyword ciphertext of the log file is unforgeable, its security can be reduced to ISIS hardness,and it effectively resists keyword guessing attacks initiated by illegal users equipped with quantum computers,thereby ensuring privacy of the plaintext.

    Theorem 1For any adversary A in polynomial time, the difficulty of forging the ciphertext of a keyword is equal to the difficulty of solving the difficult problem of ISIS currently.

    Proof:Assuming that adversary A cracks the unforgeability of the ciphertext with a non-negligible probability,it is equivalent to constructing a challenger C capable of solving ISIS problems.

    (1)Initialisation.Suppose adversary A initiates a keyword guessing attack on the system by forging the keyword ciphertext.In that case,challenger C executes the Setup algorithm to generate a series of parameters required by the system and sends the parameterspto adversary A.Then, C initiates an inquiry to the random prophecy and obtains the parametersMown*, which will be used as the public key of the data owner.Finally,C randomly selects a matrix∈as the data user’s public key and simultaneously dispatches two public keys to A.

    (2)Inquiry phase 1.For any ciphertextCWiwith differentω∈ {0,1} keywords, ifCWi=andw=w*, the challenger C calculatesH1(cW,ω) and returns it to adversary A, and addsto the list.Otherwise,C randomly obtainsεwhich obeys(Mown*),σaccording to Lemma 5,then calculatesH1(cW,ω)=Mown*εmodqand adds(CW,ω,H1(cW,ω))to the list.

    (3)Inquiry phase 2.For the keywordWi(1 ≤i≤n) that adversary A initiates an inquiry,challenger C calculatesand generates the first partcWiof the ciphertext.After obtainingεwhich obeysaccording to Lemma 5, challenger C will sendto adversary A.

    (4)Forgery phase.In this phase, adversary A will forge a ciphertextrelated to the keywordWi*(1 ≤i≤n).To begin with, A gets a trapdoorT*through Lemma 2 and sends it to challenger C.Then C calculates,thenω*=1,otherwiseω*=0,and returns a second partε*of the ciphertext of the key set forged by A.In this process,C cannot obtain information related to this ciphertext by asking a random oracle.Therefore,the keyword ciphertextis forged by A,which is a solution to ISIS hardness.

    Analysis:Assuming thatε*is a part of the effective keyword ciphertextCWi, and satisfyingmodq.If adversary A forges the keyword ciphertextwith probabilityp, it notices thatNis the number of times which the Inquiry phase 1 is executed in polynomial time.So, we obtain the probability that C successfully obtains the satisfying conditionis at least.Therefore,in the current situation,Challenger C has at least the advantageto break the assumption of ISIS hardness.In summary, the difficulty of adversary A forging the correct keyword ciphertext can be reduced to the difficulty of solving the ISIS hardness.

    6 Comprehensive Evaluation Analysis

    Our paper proposes a searchable encryption scheme based on lattice for log systems combined with blockchain.The test environment is a 64-bit Windows system with 16GB of memory.And the experimental process is completed by the local virtual machine Ubuntu 16.04.6.As shown in Tab.1,we compare the scheme in this paper with the schemes[30,31]in terms of methodology and hardness assumptions.

    Table 1: Comparison of methodologies and hardness assumption

    Through comparison,the common point between the literature[30]and our scheme is that they both use searchable encryption to ensure the fairness and credibility of the system environment.However, our scheme still provides the security of keyword ciphertexts facing quantum computing attacks.Consequently,the privacy of log files is well protected.

    After that, in order to compare the differences between the literature [31] and our proposed scheme in the trapdoor cost, verify algorithm cost, ciphertext size, and trapdoor size, Tab.2 defines the acronyms used in the experimental process,and Tab.3 shows the performance comparison results.

    Table 2: Glossary

    Table 3: Performance comparison

    Since our scheme uses the trapdoor generation algorithm based on lattice theory and mainly relies on the addition and multiplication of vectors, the overall efficiency of our scheme is superior to traditional cryptography.

    Fig.3 shows the changing trend of the keyword search time under not introducing the blockchain and introducing the blockchain.Since the search operation in the blockchain requires more cost for on-chain transactions,the keyword search time is increased,but the credibility and traceability of the search results can be guaranteed.However,with the linear growth in the number of keywords,the time spent in the blockchain transaction will become insignificant compared to the time used to search for keywords,so the time is less and less affected by the blockchain transaction time.

    Figure 3:Comparison of schemes

    7 Conclusion

    To solve the keyword guessing attacks launched by quantum attackers and the untrustworthiness of service providers,this paper designs and proposes a searchable encryption scheme based on lattice for log systems in the blockchain.The application of a lattice-based encryption algorithm makes the scheme resist quantum computing and ensures the security of the keyword ciphertext.At the same time, blockchain technology is employed to separate the keyword ciphertext search from the log file storage.Due to the keyword search is performed by designing a smart contract that ensures the reliability of the search results when the credibility of the servicer is unknown.According to the security analysis and experimental simulation, our scheme is secure in quantum attacks while being highly efficient.In the future,we will introduce forward security and optimize computational cost.

    Funding Statement:This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202101),NSFC(Grant Nos.62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology,the Natural Science Foundation of Inner Mongolia(2021MS06006),Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产无遮挡羞羞视频在线观看| 精品福利观看| 亚洲成人免费电影在线观看| 国产精品久久久av美女十八| 亚洲人成77777在线视频| 91国产中文字幕| 成人18禁在线播放| 一二三四在线观看免费中文在| 欧美日本亚洲视频在线播放| 琪琪午夜伦伦电影理论片6080| 国产精品偷伦视频观看了| 丰满人妻熟妇乱又伦精品不卡| 99国产精品一区二区三区| 精品电影一区二区在线| 亚洲中文av在线| 欧美成狂野欧美在线观看| 黄色丝袜av网址大全| 好看av亚洲va欧美ⅴa在| 亚洲全国av大片| 老汉色av国产亚洲站长工具| 久久香蕉激情| 日日夜夜操网爽| 精品一区二区三区视频在线观看免费 | 色哟哟哟哟哟哟| 欧美黑人精品巨大| 亚洲精华国产精华精| 一级片'在线观看视频| 国产伦一二天堂av在线观看| 国产三级在线视频| 国产成人精品久久二区二区91| 97超级碰碰碰精品色视频在线观看| 亚洲 欧美一区二区三区| 久久久久久免费高清国产稀缺| 在线永久观看黄色视频| 欧美乱妇无乱码| 成人影院久久| 日韩国内少妇激情av| 咕卡用的链子| 中国美女看黄片| 操出白浆在线播放| 色精品久久人妻99蜜桃| 亚洲av第一区精品v没综合| 久久九九热精品免费| av天堂久久9| 国产精品免费视频内射| 男女床上黄色一级片免费看| 免费在线观看黄色视频的| 一级毛片女人18水好多| 日韩精品青青久久久久久| 长腿黑丝高跟| 视频区图区小说| 看片在线看免费视频| 国产精品综合久久久久久久免费 | 宅男免费午夜| 国产精品偷伦视频观看了| 两个人看的免费小视频| 大型黄色视频在线免费观看| 国产亚洲精品久久久久5区| 亚洲成a人片在线一区二区| 丝袜美足系列| 新久久久久国产一级毛片| 大陆偷拍与自拍| 97超级碰碰碰精品色视频在线观看| 精品国产国语对白av| 国产精品影院久久| 国产精品av久久久久免费| 欧美黄色淫秽网站| 国产精品久久久久成人av| 波多野结衣av一区二区av| 久久中文字幕一级| svipshipincom国产片| 水蜜桃什么品种好| 午夜福利欧美成人| 桃红色精品国产亚洲av| 啦啦啦在线免费观看视频4| 午夜视频精品福利| 99精国产麻豆久久婷婷| 熟女少妇亚洲综合色aaa.| 老司机在亚洲福利影院| 18禁国产床啪视频网站| 99精品久久久久人妻精品| 欧美最黄视频在线播放免费 | 一个人免费在线观看的高清视频| 国产精品久久视频播放| 欧美中文日本在线观看视频| 亚洲午夜理论影院| 老司机靠b影院| 男女下面进入的视频免费午夜 | 美女福利国产在线| 亚洲成人久久性| 99热只有精品国产| 男人的好看免费观看在线视频 | 欧美不卡视频在线免费观看 | 亚洲自拍偷在线| videosex国产| 国产黄a三级三级三级人| 9191精品国产免费久久| 国产精品久久久久成人av| 欧美亚洲日本最大视频资源| 99在线人妻在线中文字幕| 麻豆国产av国片精品| 日日夜夜操网爽| 日韩欧美国产一区二区入口| 男女之事视频高清在线观看| 久久午夜综合久久蜜桃| 老汉色∧v一级毛片| 久久精品国产亚洲av香蕉五月| 亚洲欧美日韩高清在线视频| 亚洲成a人片在线一区二区| 高清在线国产一区| 最新美女视频免费是黄的| 在线播放国产精品三级| 亚洲专区国产一区二区| 国产在线观看jvid| 国产亚洲欧美在线一区二区| 女警被强在线播放| 精品国产乱子伦一区二区三区| 韩国av一区二区三区四区| 一本综合久久免费| 国产精品免费视频内射| 国产亚洲精品第一综合不卡| 亚洲第一青青草原| 欧美激情高清一区二区三区| 三级毛片av免费| 国产激情欧美一区二区| 一级a爱视频在线免费观看| 女人高潮潮喷娇喘18禁视频| 国产精品香港三级国产av潘金莲| 宅男免费午夜| 国产成人精品久久二区二区91| 十八禁人妻一区二区| 精品无人区乱码1区二区| 国产成人精品久久二区二区91| 一边摸一边抽搐一进一小说| 亚洲一卡2卡3卡4卡5卡精品中文| 正在播放国产对白刺激| 精品久久久久久久久久免费视频 | 亚洲国产欧美日韩在线播放| 国产欧美日韩一区二区三| 国产亚洲精品久久久久5区| 久99久视频精品免费| 国产97色在线日韩免费| 精品国产乱子伦一区二区三区| 国产aⅴ精品一区二区三区波| 亚洲专区字幕在线| 成人国产一区最新在线观看| 免费av毛片视频| 天天添夜夜摸| 欧美成狂野欧美在线观看| 欧美丝袜亚洲另类 | 欧美激情极品国产一区二区三区| 免费搜索国产男女视频| 夜夜夜夜夜久久久久| 怎么达到女性高潮| 亚洲精品中文字幕在线视频| 久久天堂一区二区三区四区| 电影成人av| 中出人妻视频一区二区| av电影中文网址| 999久久久国产精品视频| 久久精品影院6| 国产精品成人在线| 狂野欧美激情性xxxx| 搡老乐熟女国产| 美国免费a级毛片| 999久久久精品免费观看国产| 欧美日韩亚洲高清精品| 少妇被粗大的猛进出69影院| 日本免费a在线| av片东京热男人的天堂| 在线观看www视频免费| 亚洲av电影在线进入| 精品久久久久久成人av| 久久人人97超碰香蕉20202| 男女之事视频高清在线观看| 窝窝影院91人妻| 国产成人系列免费观看| 久久九九热精品免费| 咕卡用的链子| 亚洲av成人av| 欧美一级毛片孕妇| 亚洲精品中文字幕在线视频| 欧美日韩亚洲综合一区二区三区_| 久久伊人香网站| 悠悠久久av| 久久人妻熟女aⅴ| xxx96com| 精品久久久久久,| 免费看十八禁软件| 高清欧美精品videossex| 在线永久观看黄色视频| 国产精品秋霞免费鲁丝片| 9热在线视频观看99| 99国产精品免费福利视频| 国产亚洲欧美98| 一二三四在线观看免费中文在| 亚洲中文av在线| 法律面前人人平等表现在哪些方面| 色哟哟哟哟哟哟| 丝袜美腿诱惑在线| 97超级碰碰碰精品色视频在线观看| 香蕉国产在线看| 精品国产一区二区三区四区第35| 日本五十路高清| 黄色女人牲交| 国产免费现黄频在线看| av网站免费在线观看视频| 精品午夜福利视频在线观看一区| 91精品国产国语对白视频| 中文亚洲av片在线观看爽| 午夜福利免费观看在线| 精品第一国产精品| 欧美一区二区精品小视频在线| 国产一区二区三区在线臀色熟女 | 国产一区二区三区在线臀色熟女 | 免费在线观看视频国产中文字幕亚洲| 亚洲伊人色综图| 久久久久久大精品| 亚洲第一欧美日韩一区二区三区| 国产精品久久久久成人av| 亚洲国产精品sss在线观看 | 精品国产乱子伦一区二区三区| 亚洲 欧美 日韩 在线 免费| 免费在线观看完整版高清| 日韩人妻精品一区2区三区| 国产日韩一区二区三区精品不卡| 国产高清视频在线播放一区| 久久精品国产清高在天天线| 久久精品成人免费网站| 亚洲欧美日韩高清在线视频| 在线观看免费视频日本深夜| 欧美激情 高清一区二区三区| 国产精品美女特级片免费视频播放器 | 淫秽高清视频在线观看| x7x7x7水蜜桃| 看黄色毛片网站| 黑人巨大精品欧美一区二区mp4| 亚洲国产毛片av蜜桃av| 午夜免费激情av| 成人永久免费在线观看视频| 亚洲熟妇熟女久久| 成人18禁高潮啪啪吃奶动态图| 午夜影院日韩av| 男人操女人黄网站| 欧美成人午夜精品| 99国产精品一区二区蜜桃av| 无限看片的www在线观看| 亚洲熟妇中文字幕五十中出 | 免费在线观看完整版高清| 中出人妻视频一区二区| 国产男靠女视频免费网站| 中文欧美无线码| 亚洲国产精品合色在线| 欧美日韩亚洲综合一区二区三区_| 夜夜躁狠狠躁天天躁| 国产不卡一卡二| 久久久精品国产亚洲av高清涩受| 身体一侧抽搐| 又大又爽又粗| 亚洲av五月六月丁香网| 亚洲国产精品一区二区三区在线| 午夜福利影视在线免费观看| 午夜福利在线免费观看网站| 丁香六月欧美| 成年人免费黄色播放视频| 日本三级黄在线观看| av中文乱码字幕在线| 久久精品亚洲av国产电影网| 麻豆成人av在线观看| 中文字幕人妻丝袜制服| 亚洲av成人一区二区三| 欧美激情极品国产一区二区三区| 我的亚洲天堂| 久久精品国产清高在天天线| svipshipincom国产片| 久久国产乱子伦精品免费另类| 69精品国产乱码久久久| 亚洲专区国产一区二区| 久久久久久久久久久久大奶| 国产精品乱码一区二三区的特点 | 欧美黄色片欧美黄色片| 日韩高清综合在线| 天堂影院成人在线观看| 中文亚洲av片在线观看爽| 一个人免费在线观看的高清视频| 亚洲情色 制服丝袜| 亚洲片人在线观看| 欧美另类亚洲清纯唯美| 国产三级在线视频| 色婷婷av一区二区三区视频| 亚洲伊人色综图| 久久久国产成人免费| 黑人巨大精品欧美一区二区mp4| 亚洲av第一区精品v没综合| 午夜日韩欧美国产| 90打野战视频偷拍视频| 啦啦啦在线免费观看视频4| 亚洲成人国产一区在线观看| 黄色丝袜av网址大全| 国产一区在线观看成人免费| 国产精品亚洲av一区麻豆| 自线自在国产av| 后天国语完整版免费观看| 国产精品免费视频内射| 色精品久久人妻99蜜桃| 黄色成人免费大全| 国产成人精品无人区| 久久精品国产综合久久久| 日本黄色日本黄色录像| 我的亚洲天堂| 91精品三级在线观看| 在线播放国产精品三级| 另类亚洲欧美激情| 国产精品永久免费网站| 美女午夜性视频免费| 亚洲欧美激情综合另类| 乱人伦中国视频| 亚洲人成电影免费在线| 三上悠亚av全集在线观看| 欧美乱妇无乱码| 国产精品亚洲一级av第二区| 午夜福利在线观看吧| 又黄又爽又免费观看的视频| 黄频高清免费视频| 国产免费男女视频| 久久人妻熟女aⅴ| 亚洲欧美一区二区三区久久| 俄罗斯特黄特色一大片| 在线国产一区二区在线| 久久久国产精品麻豆| 50天的宝宝边吃奶边哭怎么回事| 亚洲久久久国产精品| 91大片在线观看| 80岁老熟妇乱子伦牲交| 国产片内射在线| 在线观看一区二区三区| 欧洲精品卡2卡3卡4卡5卡区| av视频免费观看在线观看| 精品欧美一区二区三区在线| 精品国产一区二区三区四区第35| 成人亚洲精品av一区二区 | 国产精品永久免费网站| 国产精品国产av在线观看| 亚洲avbb在线观看| 久热这里只有精品99| av网站在线播放免费| 日韩成人在线观看一区二区三区| 成人国语在线视频| 亚洲欧美日韩无卡精品| 人妻久久中文字幕网| 日本欧美视频一区| 亚洲欧美精品综合久久99| 亚洲成人免费av在线播放| 亚洲成a人片在线一区二区| 日韩欧美国产一区二区入口| 夜夜夜夜夜久久久久| av中文乱码字幕在线| 精品久久久久久电影网| 色在线成人网| 人妻久久中文字幕网| 国产真人三级小视频在线观看| 中出人妻视频一区二区| 亚洲精品久久成人aⅴ小说| 精品午夜福利视频在线观看一区| 一区福利在线观看| 在线播放国产精品三级| 亚洲,欧美精品.| 精品第一国产精品| 天堂√8在线中文| 黄色a级毛片大全视频| 国产精品免费一区二区三区在线| 国产精品一区二区免费欧美| 欧美日本中文国产一区发布| 国产成人免费无遮挡视频| 亚洲精品粉嫩美女一区| 久久国产亚洲av麻豆专区| 国产一区二区激情短视频| 啦啦啦在线免费观看视频4| 亚洲精品粉嫩美女一区| 99久久99久久久精品蜜桃| 久久久精品欧美日韩精品| 国产亚洲精品综合一区在线观看 | 少妇 在线观看| 久久天躁狠狠躁夜夜2o2o| 97人妻天天添夜夜摸| 日韩人妻精品一区2区三区| 少妇 在线观看| 十八禁人妻一区二区| 成人特级黄色片久久久久久久| 又大又爽又粗| 亚洲成人久久性| 精品熟女少妇八av免费久了| 日韩精品青青久久久久久| 日本撒尿小便嘘嘘汇集6| 欧美日本亚洲视频在线播放| av网站在线播放免费| 国产高清激情床上av| 色尼玛亚洲综合影院| 日韩欧美一区视频在线观看| 男女高潮啪啪啪动态图| 精品乱码久久久久久99久播| 怎么达到女性高潮| 精品久久久久久久毛片微露脸| 咕卡用的链子| 久久99一区二区三区| 老熟妇乱子伦视频在线观看| 久久久久久久精品吃奶| 久久香蕉精品热| 欧美成狂野欧美在线观看| 成人av一区二区三区在线看| 免费在线观看亚洲国产| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲国产中文字幕在线视频| 1024香蕉在线观看| 亚洲精品av麻豆狂野| 91成年电影在线观看| 黑人操中国人逼视频| 日韩欧美免费精品| 欧美精品亚洲一区二区| 午夜精品在线福利| 乱人伦中国视频| 国产单亲对白刺激| 国产蜜桃级精品一区二区三区| 丰满迷人的少妇在线观看| 亚洲精品美女久久久久99蜜臀| 啦啦啦在线免费观看视频4| 亚洲av电影在线进入| 无限看片的www在线观看| 69av精品久久久久久| 亚洲专区国产一区二区| 麻豆国产av国片精品| 波多野结衣高清无吗| 国产亚洲欧美98| 美女午夜性视频免费| 高清在线国产一区| 在线天堂中文资源库| 午夜日韩欧美国产| 日本 av在线| √禁漫天堂资源中文www| 国产一区在线观看成人免费| 国产aⅴ精品一区二区三区波| www.999成人在线观看| 中文字幕高清在线视频| 日本a在线网址| 97人妻天天添夜夜摸| 久久性视频一级片| 国产精品影院久久| 免费久久久久久久精品成人欧美视频| 国产一卡二卡三卡精品| 麻豆一二三区av精品| 99国产综合亚洲精品| 在线十欧美十亚洲十日本专区| a级毛片在线看网站| 精品国产超薄肉色丝袜足j| 女警被强在线播放| 搡老岳熟女国产| 伦理电影免费视频| 女性生殖器流出的白浆| 欧美 亚洲 国产 日韩一| 1024视频免费在线观看| 少妇粗大呻吟视频| 狂野欧美激情性xxxx| 少妇被粗大的猛进出69影院| 国产99久久九九免费精品| 日韩三级视频一区二区三区| 精品久久久久久久久久免费视频 | 久久天躁狠狠躁夜夜2o2o| 一本大道久久a久久精品| 成人亚洲精品一区在线观看| 91国产中文字幕| 少妇粗大呻吟视频| 成年女人毛片免费观看观看9| 国产高清激情床上av| 亚洲欧美日韩高清在线视频| 叶爱在线成人免费视频播放| 麻豆成人av在线观看| 在线观看日韩欧美| 亚洲自拍偷在线| 久久久久精品国产欧美久久久| 在线天堂中文资源库| 成人永久免费在线观看视频| 又大又爽又粗| 自线自在国产av| 成人三级做爰电影| 中文字幕人妻丝袜一区二区| 日韩免费高清中文字幕av| 1024视频免费在线观看| 久久人人97超碰香蕉20202| 99久久综合精品五月天人人| 国产成年人精品一区二区 | 电影成人av| 悠悠久久av| 亚洲成国产人片在线观看| 国产一卡二卡三卡精品| 国产亚洲精品综合一区在线观看 | 12—13女人毛片做爰片一| e午夜精品久久久久久久| av欧美777| 看免费av毛片| 久久精品国产亚洲av高清一级| 天堂俺去俺来也www色官网| 日韩一卡2卡3卡4卡2021年| 精品人妻在线不人妻| 欧美最黄视频在线播放免费 | 精品卡一卡二卡四卡免费| 久久99一区二区三区| 亚洲精品国产区一区二| 成年女人毛片免费观看观看9| 国产精品免费一区二区三区在线| 咕卡用的链子| 高清毛片免费观看视频网站 | 99香蕉大伊视频| 美女大奶头视频| 精品第一国产精品| 香蕉丝袜av| 久久香蕉精品热| 色婷婷av一区二区三区视频| 亚洲激情在线av| 午夜免费鲁丝| 满18在线观看网站| 成人av一区二区三区在线看| av网站在线播放免费| 老汉色av国产亚洲站长工具| 757午夜福利合集在线观看| 亚洲色图 男人天堂 中文字幕| 在线视频色国产色| 人人澡人人妻人| 国产有黄有色有爽视频| 动漫黄色视频在线观看| 首页视频小说图片口味搜索| 欧美老熟妇乱子伦牲交| 日韩免费高清中文字幕av| 大香蕉久久成人网| 欧美av亚洲av综合av国产av| 国产aⅴ精品一区二区三区波| 99国产综合亚洲精品| 亚洲熟女毛片儿| 夜夜夜夜夜久久久久| 亚洲成人国产一区在线观看| 国产成+人综合+亚洲专区| 一区二区三区精品91| 久久人人精品亚洲av| 久久人妻av系列| 免费观看人在逋| 一区二区三区激情视频| 国产97色在线日韩免费| 99精品欧美一区二区三区四区| 中文字幕精品免费在线观看视频| tocl精华| 男女下面进入的视频免费午夜 | 免费在线观看亚洲国产| 久久天堂一区二区三区四区| av电影中文网址| 欧美成狂野欧美在线观看| 亚洲第一av免费看| 一级毛片精品| 午夜福利在线观看吧| av中文乱码字幕在线| 丰满迷人的少妇在线观看| 国产亚洲精品久久久久5区| 999精品在线视频| 国产亚洲欧美精品永久| 视频区欧美日本亚洲| 黑人巨大精品欧美一区二区mp4| av片东京热男人的天堂| 男女床上黄色一级片免费看| 久久久久国产精品人妻aⅴ院| 中文字幕人妻熟女乱码| 久热这里只有精品99| 91在线观看av| 欧美成狂野欧美在线观看| 99re在线观看精品视频| 麻豆一二三区av精品| 免费看十八禁软件| 精品久久久久久,| 脱女人内裤的视频| 欧美在线一区亚洲| 国产精品影院久久| 精品久久久久久久久久免费视频 | 国产熟女xx| 91国产中文字幕| 久久狼人影院| 精品高清国产在线一区| 桃红色精品国产亚洲av| 久久国产精品男人的天堂亚洲| 免费一级毛片在线播放高清视频 | 久久国产精品人妻蜜桃| 久久精品国产亚洲av高清一级| 精品电影一区二区在线| 中文字幕最新亚洲高清| 亚洲av第一区精品v没综合| 18禁观看日本| 欧美大码av| 欧美成人性av电影在线观看| 嫩草影视91久久| 欧美久久黑人一区二区| 69av精品久久久久久| 亚洲精品在线观看二区| 午夜免费鲁丝| 日韩人妻精品一区2区三区| 国产野战对白在线观看| 99精品在免费线老司机午夜| 一边摸一边抽搐一进一小说| 国产三级在线视频| 99精品在免费线老司机午夜| 一边摸一边抽搐一进一小说| 搡老岳熟女国产| 丝袜美足系列| 如日韩欧美国产精品一区二区三区| 男人舔女人下体高潮全视频| 久久精品国产综合久久久| 99在线视频只有这里精品首页| 精品一品国产午夜福利视频| 欧美乱码精品一区二区三区| 久久香蕉激情|