• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    基于雙線性對的代理重加密方案

    2012-01-17 11:52:26王會(huì)歌
    關(guān)鍵詞:鳳陽理學(xué)院公鑰

    王會(huì)歌,曹 浩,劉 斌,沈 峰

    (安徽科技學(xué)院理學(xué)院,安徽 鳳陽233100)

    基于雙線性對的代理重加密方案

    王會(huì)歌,曹 浩,劉 斌,沈 峰

    (安徽科技學(xué)院理學(xué)院,安徽 鳳陽233100)

    代理重加密的概念是由Mambo和Okamoto提出來的,其功能是將用一個(gè)用戶公鑰加密的密文轉(zhuǎn)換成用另一個(gè)用戶的公鑰加密的密文,且加密是針對同一個(gè)明文而言的。但是這類方案都是基于傳統(tǒng)的PKI公鑰密碼體制和身份密碼體制的。本研究提出了一個(gè)新的無證書代理重加密方案,新方案優(yōu)于先前的方案且能實(shí)現(xiàn)多次代理重加密性質(zhì),其算法比其它方案更簡單,并且給出了詳細(xì)的CCA安全性證明。

    無證書;代理加密;重加密;代理重加密

    1 Introduction

    A proxy re-encryption scheme was first introduced by Mambo and Okamoto in 1997[1].In this scheme,aproxy is allowed to transform ciphertexts computed under Alice’s public key into different ciphertexts that can be decrypted by using Bob’s secret key.But both the proxy and Bob cannot obtain the underlying plaintext without the proxy’s cooperating.Alice or a trusted third party generates the proxy re-encryption key which re-encrypts the previous level ciphertexts into others.Proxy re-encryption key consists of the delegator’s (or Alice’s)private key and the other values.Proxy re-encryption system have many attractive applications such as secure e-mail forwarding system,attribute-based delegations,travel key and access control in networked file storage.It was these applications which would encourage many cryptographers to research a variety of schemes[2-7].But most of these schemes are based on traditional PKC or ID-based public key cryptosystem.However,there is few such proxy re-encryption based on certificateless public cryptosystem.

    In literature[8],Toshihiko Matsuo presented a scheme for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by a secret key for Identity-based encryption and the other one for the transformation from ciphertexts encrypted in identity-based encryption (IBE)manner into the different ciphertexts that can be decrypted by the other secret key for IBE.

    In this paper we present a scheme for the transformation from ciphertexts encrypted by a certificateless public key cryptosystem into the ciphertexts that can be decrypted by another certificateless public key cryptosystem.And the algorithm of our scheme is simpler than that of other proxy re-encryption schemes.

    2 Properties of Our Scheme

    Our scheme achieves all the advantages in literature[8],such as follows:

    a)optimal secret key size.

    b)optimal ciphertext size.

    c)not need an additional algorithm or process for decrypting re-encrypted ciphertexts while it is required in literature[7].

    d)Our scheme is semantic secure in the random oracle model.

    e)Our scheme meets multi-use property.

    f)And it is easy to see that our algorithm is simpler than that of other schemes.

    3 Backgrounds

    In the following,we briefly describe the groups,the basic structure of Certificateless Public Key Encryption (CLE)that will be used in our construction.Pairings

    We briefly review some facts about bilinear pairings and groups used in the scheme in this paper.

    Definition 1Let G and G1be two multiplicative cyclic group of prime order p,and g be a generator of G.We say that G has an admissible bilinear map e:G×G→G1if the following conditions hold.

    1.Bilinearity:e(ga,gb)=e(g,g)ab,for all a,b∈Z*p.

    2.The map e is non-degenerate:e(g,g)≠1G1.

    3.There is an efficient algorithm to compute e(ga,gb)for all a,b and g.

    The Weil and modified Tate pairings on elliptic curves can be used to build such bilinear maps[9].

    Assumption Bilinear Diffie-Hellman Assumption(BDH)[10]Let g be a parameter generator which with system parameter k as input generates two cyclic groups G and G1of prime order p,agenerator g∈Gand a bilinear map e,We define the advantage of an algorithm A in solving the problem(given<g,ga,gb,gc>,to compute e(g,g)abc)

    by:

    For any randomized polynomial time algorithm A (in k),the advantage AdνG,A(k)is negligible.

    4 Construction of The scheme

    We propose the construction of a proxy re-encryption scheme that is based on the certificateless public key cryptosystem.The scheme provides CCA security.It is very efficient in both computation and ciphertexts length and realizes multi-use.

    We first assume that the proxy re-encrypts ciphertexts once.

    SetUp (k):Taking security parameter k as input and returns the system parameter parms,H is hash function as:H:{0,1}*→and the master key is s and Ppub.

    SecretValueG:Given the public parameters parms,user chooses a random value xIDi∈and sets xIDias secret value.

    PublicKeyG:User runs the public key generation algorithm to generate the public key XIDi=gxIDi,

    PartialPrivateKeyG:KGC first picks a random r,computes R =grand computes QIDi= H(IDi,PKIDi).Then takes as inputs parms,master key and a user’s identity ID as inputs.It returns a partial private key dID=RsQID,and sends it to user IDithrough the security channel.

    PrivateKeyG:Upon receiving the partial private key,user computes the private key skIDi= (dIDi)xIDi

    Encryption:User first checks the efficiency of the public key through the equation e(XIDi,ppub)=e(YIDi,g).To encrypt a message m∈{0,1}*under the identity IDi∈{0,1}*,picks a randomu∈Z*p,lets QIDi= H(IDi,PKIDi)and computes

    Decryption:Given the ciphertexts Ci= (C1,C2)and the secret key skIDiwith parms,then computes

    Re-encryptionKeyG:Here we define user IDias the delegator and IDjas the delegatee.User IDjfirst runs above algorithm to generate his public key,partial private key,secret key and private key and send xIDito IDi.After that user IDicomputes the re-encryptionhen sends it to the proxy.

    ReEnc:The proxy is given a ciphertexts CIDi= (C1,C2),the re-encryption key RKIDi-IDjand IDi,IDjwith parms,the proxy re-encrypts the ciphertexts CIDiinto CIDjas follows.

    Dec:Given the re-encryption ciphertexts CIDj,computes plaintext as the description in the above decryption algorithm:

    Multi-use:The proxy only needs to encrypt again the second part of the former ciphertexts by using the same re-encryption technique to realize the property of multi-use.Moreover,the length of the ciphertexts does not change.This is just the advantage that other schemes have not.So our new scheme can realize the multi-use and the length of the re-encryption ciphertext does not change compared to that of the former level ciphertexts and is shorter than that of other schemes.

    5 Security Analysis

    We prove that our proxy re-encryption scheme is IND-CCA secure against the following defined two types of adversaries.Assume the BDH problem is difficult.From the scheme we can see that as long as the cerficateless scheme is security,the certificateless proxy re-encrytption is security.

    TheoremLet the hash function H is random oracle,if the BDH problem is difficult,our scheme is IND-CCA secure.Suppose A (A1,A2:A1is the type 1adversary and A2is the type 2adversary respectively)is a polynomially-bounded adversary against a ciphertext with advantageε,makes at most qHque-ries to the hash functions H,and makes qDqueries to the decryption oracles respectively.Then we show how to construct two types adversary A1and A2.We can assume that challengers C1and C2for both types of games are available to algorithm B who can break the scheme.Then there exists a polynomiallybounded algorithm C that solves the BDH problem with advantage at least

    Proof:Suppose that the algorithm C (the challenger)is given for a random instance of BDH problem as(g,ga,gb,gc).The algorithm C’s task is to output e(g,g)abcfor some a,b,c∈Z*pafter interacting with B as follows:

    B begins by choosing some random bits c and I,J uniformly at random with 1≤I,J≤qH.If c=0,then B chooses to play against C1and aborts C2.When c=1,B chooses to play against C2and aborts C1.In either case,C= (C1,C2)will denote the challenger against B which plays for the remainder of this proof.

    Here,we let R denote the event IDIand IDJas the challenge identities IDchand IDch'.We denote the event that A extracts the partial private key for entity IDI,IDJas F0and denote the event that A replaces the public key of identity IDIand IDJas F1at some points in its attack.If c=0and the event F0occurs,B will have to abort and will be unsuccessful.If F0does not occur and if the event R occur,then B will be successful with some probability related to that of A1.Besides,if c=1and the event F1occurs,B will again abort and will be unsuccessful.If F1does not occur,but R occurs,the probability of B’s success will again be related to that of A1.

    If c=0,then C is equivalent to Type 1challenger and supplies B with public parameters Parms= <G,G1,e,H,g,p,>.If c=1,C is a type 2challenger and supplies B with public parameters parms with the master secret key s and ppub=gs.

    B has controlled over the hash function H.To respond to the hash queries,C maintains a hash list LHthat stores information on H-queries.This list is initially empty.

    Assume the H-queries are distinct and that any query involving an IDiis preceded by the H-query for IDi.

    Phase 1:B responds to A’s queries as follows:

    Setup:C runs algorithm Setup,outputs the system parameters<G,G1,p,e,g,ppub,H >.

    Public Key Extract query:Upon receiving apublic key query for any identity ID,C computes the corresponding public key PKIDand sends it to A and then adds it to the list LPK.

    H-queries:When A asks a polynomial bounded number of H-queries on identities of his choice.B responds as follows.

    (1)If IDior IDjalready appears on the LHlist such as the form <IDi,PKi,Qi,bi,xi,Xi,Yi>,<IDj,pkj,Qj,bj,xj,Xj,Yj>.B returns H(IDi,pki)=Qior H(IDj,pkj)=Qjto A.

    (2)IFIDior IDjdoes not already appear on the list LHand is the I-th or J-th distinct H query made by A,then B chooses bI,bJat random from,outputs H(IDi,PKi)=bIQ,H(IDj,PKj)=bJQand adds the entry<IDI,PKI,bIQ,bI,⊥,X,Y >,<IDJ,PKJ,bJQ,bJ,⊥,X,Y >into the list LH.

    (3)If IDior IDjis the i-th or j-th distinct H-query where i≠I,j≠Jand IDi,IDjdoes not appear on the list LH,B chooses random values bi,bj,xi,xj∈,outputs H(IDi,PKi)bi,H(IDj,PKj)=bjand adds<IDi,PKi,bi,bi,xi,gxi,(ppub)xi>,<IDj,

    From above we can see that the partial private key for IDi(i≠I)or IDj(j≠J)is equal to(ppub)bior(ppub)bjrespectively,the public key isand the private key isWhen c=0,these can be computed by B.When c=1,B can compute the partial private key gsbIQfor the identity IDIand compute the partial private key gsbJQfor the identity IDJ.

    Notice that we assume that A always makes the appropriate H query on the identity IDi,IDj,before making one of these requests.B replies to these requests as follows.

    Partial Private Key Extract:When A requests for the identity IDior IDj,there are several cases:

    1.If i=Iand c=0or j=Jand c=0,then B aborts.

    2.If i=Iand c=1or j=Jand c=1,then B returns with gsbIQor gsbJQ.

    3.If i≠Ior j≠Jthen B replies with

    Private Key Extraction:When A requests for the identity IDior IDj,and we assume that the public key for IDi,IDj,has not been replaced.Then we have:

    1.If i=Ior j=J,then B aborts.

    Replace Public Key:When the request is to replace the public key for IDior IDjwith value<X′i,Y′i>

    1.If i=Iand c=1or j=Jand c=1,then B aborts.

    2.If i=Iand j=Jand c=0,then B aborts.

    3.Otherwise,B replaces the current entries Xi,Yiin the LHlist with new entriesor replaces the current entries Xj,Yjin the LHlist with new entries

    Re-Encryption Key Extraction:When A queries C about re-encryption key RKIDi-IDj,andi=Iandj=J,C rejects.Otherwise,C first generates a CLE public key PKIDi,and then checks the list LH,if the checked identity IDiand IDjare in the list,then C returns the secret values xi,xjto B respectively.Then B computes the re-encryption key as the above scheme.If the checked identity is not in the list LH,C runs the H random oracle to generate the corresponding secret value and returns them to B and adds them into the list LH.

    Re-Encryption Queries:Suppose that A queries C about(IDi-IDj,CIDi)for encryption,if IDi(i≠I)and IDj(j≠J)have never been requested for the private key extract query rejects the query.Otherwise,C runs private key extraction to generate skIDi,skIDj,and then C computes the re-encryption key RKIDi-IDjas above algorithm.When c=0,if both of the two identities IDiand IDjmake queries for the public key replace at the same time,then C rejects.Finally C re-encrypts CIDiinto CIDjby running re-encryption algorithm and C returns CIDjto B.

    Decryption Queries:When adversary A requests for decryption for the ciphertext<U,V>for IDi(Notice that i is an arbitrary value between 1and qH)and the private key is just the one corresponding to the current value of the public key for IDi.But wheni=Ior i=J,B cannot make use of C to reply the request,otherwise,C decrypts the ciphertexts and returns the plaintext to B.

    Challenge Phase:In this phase,A chooses the challenge identity IDch,IDch'and two plaintexts m0,m1on which it wishes to be challenged.Assume that the challengers’identities have already been requested of random oracle H but that A1has not extracted the partial private key and replaced the public key for the identities IDchand IDch'.Then we have:If IDch≠IDIor IDch'≠IDJthen B aborts.Otherwise,if IDch=IDIand IDch'=IDJ,then B gives C m0,m1that will be re-encrypted.C chooses b∈ {0,1},encrypts mb,then responds with the challenge ciphertextand re-encrypts ciphertext CIDI* =<UI*,by making use of the re-encryption key RKIDI-IDJ,finally sends it to B.

    Phase 2:B continues to response to A’s requests in the same way as it did in Phase 1.The restriction on A’s behavior is reflected in this phase.

    Guess:Eventually,A outputs its guess b′.If b′=b,a wins,otherwise,A loses.

    Analysis:If B does not abort during the simulation,then the probabilityeasy to see that B’s responses to hash function H is uniformly and independently distributive.Provided B does not abort then all responses to A’s requests are valid.Moreover,the challenge ciphertexts CI*Dll∈{I,J}is a valid encryption of mbunder the current public key for identity IDIor IDJ.Therefore,we have that

    Now we examine the probability that B does not abort during the simulation.It is easy to see that B can abort for one of several reasons:

    (i)When c=0and the event F0occurred during the simulation.

    (ii)When c=1and the event F1occurred during the simulation.

    (iii)When A made a private key extraction on IDior IDJat some point.

    (iv)When A chooses IDch≠IDIor IDch'≠IDJin challenge phase.

    (v)When A made the decryption query on the challenge ciphertext CIDI* =

    (vi)Both of the two challenge identity IDIand IDJcan be made queries for the public key replace at the same time.

    Now we analyze the probability.As the description in literature[2],here we name the event(c=i)∧Fias Rifor i=0,1.We name the third,the fourth,the fifth and the sixth event as F2,F(xiàn)3,F(xiàn)4,F(xiàn)5.It is easy to see that the event F3is just the event?Reassume A makes q1queries of H and chooses the identity IDch,IDch'from the responses IDi,IDj.Because B’s choice of the identity is random uniformly from the set of q1indices i,j.So the probability of IDch=IDI,IDch'=IDJis equal tBecause the event?F3implies the event?F2,namely,the event R happen must lead to the event?F2 happen.Moreover,the event R0and R1are mutually exclusive.And the probability of the event F5happen is.In a similar way,we have:Pr[B does not abort]

    Because Fiand c=i are mutually independent,so we have:

    Because again R0and R1are mutually independent,moreover if the event R happens,it must lead to the event F4not happen,and if the event R happens,it must lead to the event F5not happen,so we have:

    Because R and Ri(i∈ {0,1})are mutually independent=i and R are mutually Independent,F(xiàn)i|Ris independent of the event c=i.So:

    So we have:

    Pr [B does not abort]

    Finally,because Pr[F0∧F1|R]=0,from the following derivation

    we can see that:Pr[F0|R]+Pr[F1|R]≤1.So we have that:

    Similarly,it is easy to see that B’s advantage is at leastThis completes the proof of the theorem.

    [1] Mambo K.Poxy cryptosystems:delegation of the power to decrypt ciphertexts[J].EICE Trans Fund Electr Comm Comp Sci E80-A,1997 (01):54-63.

    [2] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography [A].Nyberg K.EUROCRYPT1998 [C].Heidelberg:Springer,1998:127-144.

    [3] Jakobsson M.On quorum controlled asymmetric proxy re-encryption [A].Imai H,Zheng Y.PKC1999 [C].Heidelberg:Springer,1999:112-121.

    [4] Dodis Y,Ivan A.Proxy cryptography revisited [A].Proceedings of the 10thAnnual Network and Distributed System Security Symposium-NDSS’03[C].San Diego:IEEE Conference Publications,2003:80-89.

    [5] Zhou L,Marsh MA,Schneider FB,et al.Distributed blinding for ElGamal re-encryption Technical Report 2004-1924[Z].Cornell University,NY USA,2004.

    [6] Ateniese G,F(xiàn)u K,Green M,et al.Improved proxy re-encryption schemes with application to secure distributed storage [A].Proceedings of the 12thAnnual Network and Distributed System Security Symposium-NDSS’05[C].San Diego:IEEE Conference Publications,2005:83-107.

    [7] Green M,Ateniese G.Identity-based proxy re-encryption [DB/OL].Http://eprint.iacr.Org/2006/473.

    [8] Matsuo T.Proxy re-encryption systems for identity-based encryption [A].Takagi T.et al.Pairing 2007,LNCS[C].Heidelberg:Springer,2007:247-267.

    [9] Verheul E.Evidence that XTR is more secure than supersingular elliptic curve cryptosystems[A].Advances in Cryptology-Eurocrypt 2001,LNCS [C].Berlin:Springer-Verlag,2001:195-210.

    [10] Boneh D,F(xiàn)ranklin M.Identity-based encryption from the Weil Pairing.Extended abstract[DB/OL].http://crypto.stanford.edu/~dabo/abstracts/bfibe.html.

    Certificateless Proxy Re-encryption Scheme from Pairings

    WANG Hui-ge,CAO Hao,LIU Bin,SHEN Feng
    (School of Science,Anhui Science and Technology University,F(xiàn)engyang 233100,Anhui,China)

    The concept of proxy re-encryption was introduced by Mambo and Okamoto.Its function takes a ciphertext for a message encrypted under an identity’s public key and transforms it into a ciphertext for the same message under another identity’s public key.But these schemes were generally based on PKC or ID-based cryptosystem.We present a new proxy reencryption scheme based on certificateless public key cryptosystem.Our scheme has advantages over prior schemes.It can realize multi-use property.The algorithm of our scheme is simpler than that of other schemes and a CCA proof to this scheme is given.

    certificateless;proxy encryption;re-encryption;proxy re-encryption

    TP 039

    A

    10.3969/j.issn.1673-1492.2012.04.010

    來稿日期:2011-01-10

    Higher School of Provincial and Outstanding Youth Talent Fund Project[2012SQR141];Natural Science Foundation of Anhui Educational Committee,No.KJ2010B059

    王會(huì)歌(1981-),女,河南許昌人,安徽科技學(xué)院理學(xué)院教師,碩士。

    劉守義 英文編輯:劉彥哲]

    猜你喜歡
    鳳陽理學(xué)院公鑰
    昆明理工大學(xué)理學(xué)院學(xué)科簡介
    昆明理工大學(xué)理學(xué)院簡介
    一種基于混沌的公鑰加密方案
    西安航空學(xué)院專業(yè)介紹
    ———理學(xué)院
    舊鳳陽花鼓
    論《鳳陽歌》的流變在中國傳統(tǒng)戲曲發(fā)展中的藝術(shù)價(jià)值
    HES:一種更小公鑰的同態(tài)加密算法
    SM2橢圓曲線公鑰密碼算法綜述
    鳳陽喬澗子明代琉璃官窯遺址
    大眾考古(2014年4期)2014-06-26 07:05:58
    基于格的公鑰加密與證書基加密
    成年女人在线观看亚洲视频| av又黄又爽大尺度在线免费看| 免费高清在线观看日韩| 亚洲精品美女久久久久99蜜臀 | 久久久久久久久久久免费av| 精品国产一区二区三区久久久樱花| 精品熟女少妇av免费看| 波多野结衣一区麻豆| 桃花免费在线播放| 综合色丁香网| 久久久久精品性色| 日本91视频免费播放| 人妻 亚洲 视频| 在线精品无人区一区二区三| 免费观看av网站的网址| 人成视频在线观看免费观看| 人人妻人人澡人人看| 久久久国产一区二区| 狂野欧美激情性xxxx在线观看| 亚洲欧美日韩卡通动漫| 黄色视频在线播放观看不卡| 三上悠亚av全集在线观看| 国产精品麻豆人妻色哟哟久久| 国产av一区二区精品久久| 久久久久国产网址| 亚洲精品视频女| 久久精品久久久久久噜噜老黄| 中国三级夫妇交换| 免费观看无遮挡的男女| www日本在线高清视频| 侵犯人妻中文字幕一二三四区| 在线免费观看不下载黄p国产| 蜜桃国产av成人99| 亚洲精华国产精华液的使用体验| 黄色一级大片看看| 69精品国产乱码久久久| 亚洲精品国产色婷婷电影| 美国免费a级毛片| 欧美亚洲日本最大视频资源| 久久国产精品男人的天堂亚洲 | 黄色毛片三级朝国网站| videossex国产| 人妻少妇偷人精品九色| 国产一区二区三区av在线| 成人国产麻豆网| 校园人妻丝袜中文字幕| 最近的中文字幕免费完整| 亚洲精品国产av蜜桃| av线在线观看网站| 亚洲国产日韩一区二区| 两性夫妻黄色片 | 精品一区二区三区视频在线| 亚洲美女搞黄在线观看| 在线观看免费视频网站a站| 不卡视频在线观看欧美| 交换朋友夫妻互换小说| 香蕉丝袜av| 婷婷色综合大香蕉| 色哟哟·www| 亚洲婷婷狠狠爱综合网| 亚洲五月色婷婷综合| 久久久久久久大尺度免费视频| 国产亚洲av片在线观看秒播厂| 男女无遮挡免费网站观看| 热99久久久久精品小说推荐| 成年美女黄网站色视频大全免费| 日韩不卡一区二区三区视频在线| 久久久久久伊人网av| 男女边吃奶边做爰视频| av国产久精品久网站免费入址| 欧美国产精品va在线观看不卡| 国产精品久久久久久精品电影小说| 妹子高潮喷水视频| 日韩在线高清观看一区二区三区| 永久网站在线| 国产一区二区在线观看日韩| 欧美国产精品一级二级三级| 我要看黄色一级片免费的| 一级黄片播放器| 免费少妇av软件| 在线精品无人区一区二区三| 视频在线观看一区二区三区| 国产成人91sexporn| 多毛熟女@视频| 欧美人与性动交α欧美软件 | 18在线观看网站| 免费不卡的大黄色大毛片视频在线观看| 国国产精品蜜臀av免费| 一边亲一边摸免费视频| 五月玫瑰六月丁香| 亚洲精品日韩在线中文字幕| 亚洲成色77777| 成人亚洲精品一区在线观看| 夫妻性生交免费视频一级片| 另类亚洲欧美激情| 久久这里有精品视频免费| 国产成人精品一,二区| 97在线人人人人妻| 99久久人妻综合| 国产精品一二三区在线看| 欧美3d第一页| av线在线观看网站| 男人舔女人的私密视频| videos熟女内射| 精品一区二区三卡| 亚洲人成网站在线观看播放| 免费高清在线观看日韩| 亚洲熟女精品中文字幕| 爱豆传媒免费全集在线观看| 免费观看性生交大片5| 欧美人与性动交α欧美软件 | 国产精品秋霞免费鲁丝片| 国产片内射在线| 欧美 亚洲 国产 日韩一| 日韩 亚洲 欧美在线| 精品人妻一区二区三区麻豆| 久久精品国产亚洲av涩爱| 久久99一区二区三区| 精品久久久久久电影网| 久久久久人妻精品一区果冻| 国产黄色视频一区二区在线观看| 免费黄频网站在线观看国产| 国产男女超爽视频在线观看| 人成视频在线观看免费观看| 九色成人免费人妻av| 人人澡人人妻人| 国产精品嫩草影院av在线观看| 黄网站色视频无遮挡免费观看| 日韩电影二区| 中文字幕人妻丝袜制服| 日本vs欧美在线观看视频| 精品第一国产精品| 亚洲国产成人一精品久久久| 十八禁网站网址无遮挡| 黄片无遮挡物在线观看| 国产视频首页在线观看| 大香蕉97超碰在线| 欧美成人精品欧美一级黄| 久久久欧美国产精品| 人成视频在线观看免费观看| 国产一区亚洲一区在线观看| 2021少妇久久久久久久久久久| 晚上一个人看的免费电影| 午夜免费观看性视频| 国产精品.久久久| 亚洲精品日韩在线中文字幕| 久久免费观看电影| 成人亚洲精品一区在线观看| 精品人妻熟女毛片av久久网站| 国产午夜精品一二区理论片| 午夜视频国产福利| 成人免费观看视频高清| 插逼视频在线观看| 亚洲天堂av无毛| 91aial.com中文字幕在线观看| 日韩免费高清中文字幕av| 欧美日韩国产mv在线观看视频| 91精品国产国语对白视频| 国产精品女同一区二区软件| av国产精品久久久久影院| 黑人欧美特级aaaaaa片| 黄色毛片三级朝国网站| 婷婷色综合www| 一本久久精品| 在线免费观看不下载黄p国产| 国产亚洲一区二区精品| 性色avwww在线观看| 久久国内精品自在自线图片| 春色校园在线视频观看| 国产精品99久久99久久久不卡 | 久久国内精品自在自线图片| 日日摸夜夜添夜夜爱| 我要看黄色一级片免费的| 97人妻天天添夜夜摸| 99久久精品国产国产毛片| 欧美精品亚洲一区二区| 亚洲四区av| 久久久久久人人人人人| 十八禁高潮呻吟视频| 午夜免费观看性视频| 不卡视频在线观看欧美| 最新的欧美精品一区二区| 国国产精品蜜臀av免费| 中文乱码字字幕精品一区二区三区| av在线app专区| 免费高清在线观看日韩| 国产一区二区在线观看av| 亚洲情色 制服丝袜| 免费观看性生交大片5| 午夜91福利影院| 三上悠亚av全集在线观看| 亚洲精品自拍成人| 亚洲国产精品一区三区| 侵犯人妻中文字幕一二三四区| 午夜福利乱码中文字幕| 国产免费一级a男人的天堂| 成人国产麻豆网| 丰满少妇做爰视频| 老熟女久久久| 精品国产一区二区三区久久久樱花| 亚洲美女黄色视频免费看| 黑人欧美特级aaaaaa片| 成人二区视频| 免费女性裸体啪啪无遮挡网站| 午夜福利在线观看免费完整高清在| 亚洲美女视频黄频| 精品卡一卡二卡四卡免费| 国产深夜福利视频在线观看| 人人妻人人爽人人添夜夜欢视频| 亚洲美女黄色视频免费看| 久久久久人妻精品一区果冻| 欧美3d第一页| 中国美白少妇内射xxxbb| 久久久久久久久久久久大奶| 一本—道久久a久久精品蜜桃钙片| 久久精品久久精品一区二区三区| a级毛色黄片| 久久久久精品人妻al黑| 国产成人91sexporn| 一二三四中文在线观看免费高清| 亚洲欧美日韩另类电影网站| 国产av一区二区精品久久| 亚洲第一区二区三区不卡| 精品久久久久久电影网| 久久午夜福利片| tube8黄色片| 国产av精品麻豆| 国产欧美另类精品又又久久亚洲欧美| 亚洲四区av| 日韩一区二区视频免费看| av有码第一页| 亚洲av国产av综合av卡| 国产 一区精品| 我的女老师完整版在线观看| 精品久久国产蜜桃| 丰满少妇做爰视频| 一边摸一边做爽爽视频免费| 极品少妇高潮喷水抽搐| 精品一品国产午夜福利视频| videosex国产| 亚洲一区二区三区欧美精品| 99热国产这里只有精品6| 国产精品国产三级专区第一集| 男的添女的下面高潮视频| 男女啪啪激烈高潮av片| 两性夫妻黄色片 | 90打野战视频偷拍视频| 日本-黄色视频高清免费观看| 国产黄频视频在线观看| 免费播放大片免费观看视频在线观看| 大片电影免费在线观看免费| 黄片播放在线免费| 下体分泌物呈黄色| 狠狠精品人妻久久久久久综合| 久久精品熟女亚洲av麻豆精品| 不卡视频在线观看欧美| 亚洲精品aⅴ在线观看| 99香蕉大伊视频| 欧美日韩视频高清一区二区三区二| 亚洲欧美清纯卡通| 少妇的逼水好多| 国产 一区精品| 一区二区三区乱码不卡18| 乱码一卡2卡4卡精品| 肉色欧美久久久久久久蜜桃| 亚洲精品视频女| 日本色播在线视频| av女优亚洲男人天堂| 人人妻人人爽人人添夜夜欢视频| 精品一区二区免费观看| 久久久久国产精品人妻一区二区| 久久久久精品人妻al黑| 亚洲色图 男人天堂 中文字幕 | 女人精品久久久久毛片| 色婷婷久久久亚洲欧美| 国产欧美亚洲国产| 亚洲av男天堂| 久久午夜福利片| 日本91视频免费播放| 一级毛片黄色毛片免费观看视频| 大码成人一级视频| 亚洲精品成人av观看孕妇| 国产又爽黄色视频| 中文字幕另类日韩欧美亚洲嫩草| 亚洲婷婷狠狠爱综合网| 日日爽夜夜爽网站| 18禁在线无遮挡免费观看视频| 久久午夜综合久久蜜桃| 国产成人a∨麻豆精品| 2021少妇久久久久久久久久久| 国产日韩欧美亚洲二区| 国产av精品麻豆| 久久久精品94久久精品| 丰满饥渴人妻一区二区三| 精品人妻熟女毛片av久久网站| 久久99精品国语久久久| 人人澡人人妻人| 乱人伦中国视频| 成人毛片a级毛片在线播放| 欧美精品av麻豆av| 狠狠精品人妻久久久久久综合| 免费大片黄手机在线观看| 亚洲精品日韩在线中文字幕| 观看美女的网站| 丝袜喷水一区| 亚洲熟女精品中文字幕| 观看美女的网站| 在线观看人妻少妇| 男的添女的下面高潮视频| 中文字幕最新亚洲高清| 亚洲精品456在线播放app| 国产欧美亚洲国产| 亚洲精品色激情综合| 欧美成人午夜精品| 制服丝袜香蕉在线| 亚洲精品国产色婷婷电影| 成人二区视频| 欧美xxⅹ黑人| 天堂8中文在线网| tube8黄色片| 全区人妻精品视频| 国产极品粉嫩免费观看在线| 丰满乱子伦码专区| 精品卡一卡二卡四卡免费| 建设人人有责人人尽责人人享有的| 欧美精品高潮呻吟av久久| 欧美日本中文国产一区发布| 交换朋友夫妻互换小说| 日韩伦理黄色片| 精品少妇内射三级| 在线观看一区二区三区激情| av网站免费在线观看视频| 多毛熟女@视频| 亚洲图色成人| 国产黄频视频在线观看| 国产精品久久久久久av不卡| 久久久久精品性色| a级毛色黄片| 美国免费a级毛片| 免费看av在线观看网站| 久久久久久久大尺度免费视频| 十八禁高潮呻吟视频| 考比视频在线观看| 亚洲激情五月婷婷啪啪| 成人国产av品久久久| 一本久久精品| 午夜免费观看性视频| 亚洲精品aⅴ在线观看| 亚洲美女视频黄频| 嫩草影院入口| 亚洲精品一区蜜桃| 免费大片黄手机在线观看| 这个男人来自地球电影免费观看 | www日本在线高清视频| 三级国产精品片| 熟女av电影| 国产免费福利视频在线观看| 久久久久久久久久人人人人人人| 亚洲天堂av无毛| 久久久久人妻精品一区果冻| 亚洲精品日本国产第一区| 激情视频va一区二区三区| 青春草视频在线免费观看| 国产男女超爽视频在线观看| 亚洲精品久久久久久婷婷小说| 日韩大片免费观看网站| av卡一久久| 丝瓜视频免费看黄片| 午夜福利,免费看| 久久精品国产自在天天线| 一二三四中文在线观看免费高清| 麻豆精品久久久久久蜜桃| 国产精品国产av在线观看| 国产免费福利视频在线观看| 精品久久久久久电影网| 一二三四中文在线观看免费高清| 妹子高潮喷水视频| 黄色配什么色好看| 亚洲伊人久久精品综合| 午夜久久久在线观看| 黑人欧美特级aaaaaa片| 三级国产精品片| 两个人免费观看高清视频| 久久这里只有精品19| 欧美xxxx性猛交bbbb| 精品酒店卫生间| 97在线视频观看| 99久久人妻综合| 在线免费观看不下载黄p国产| 国产乱人偷精品视频| 国产伦理片在线播放av一区| 欧美激情极品国产一区二区三区 | 久久人人爽av亚洲精品天堂| 一级黄片播放器| 精品少妇黑人巨大在线播放| 久久99蜜桃精品久久| 18禁裸乳无遮挡动漫免费视频| 一本大道久久a久久精品| 精品99又大又爽又粗少妇毛片| videosex国产| 日韩av免费高清视频| 亚洲国产色片| 日韩在线高清观看一区二区三区| 免费高清在线观看视频在线观看| 亚洲色图综合在线观看| 日本91视频免费播放| 两性夫妻黄色片 | 亚洲精品久久成人aⅴ小说| 少妇被粗大猛烈的视频| 亚洲精品成人av观看孕妇| 全区人妻精品视频| 99久久综合免费| 亚洲中文av在线| 国产av国产精品国产| 久热这里只有精品99| 久久精品久久久久久噜噜老黄| 国产精品一区www在线观看| 高清视频免费观看一区二区| 免费播放大片免费观看视频在线观看| 国产乱来视频区| 午夜福利网站1000一区二区三区| 久久99热这里只频精品6学生| 国产日韩欧美在线精品| 波多野结衣一区麻豆| 最近2019中文字幕mv第一页| av.在线天堂| 咕卡用的链子| 国产精品一区二区在线观看99| 亚洲国产欧美在线一区| 久久精品国产亚洲av天美| 国产成人精品福利久久| 亚洲av中文av极速乱| 久久久久久久久久久免费av| 男女边摸边吃奶| 人人澡人人妻人| 国产无遮挡羞羞视频在线观看| 在线天堂中文资源库| 精品午夜福利在线看| 麻豆乱淫一区二区| 日本-黄色视频高清免费观看| 国产爽快片一区二区三区| 成人亚洲欧美一区二区av| 制服人妻中文乱码| 午夜福利视频在线观看免费| 欧美人与性动交α欧美精品济南到 | 一级毛片我不卡| 中国美白少妇内射xxxbb| 日本vs欧美在线观看视频| 国产精品久久久久久精品古装| 亚洲一码二码三码区别大吗| 免费观看性生交大片5| 国产成人精品一,二区| 最黄视频免费看| 男人爽女人下面视频在线观看| 成年人免费黄色播放视频| 国产精品免费大片| 久久久国产欧美日韩av| 香蕉国产在线看| 人妻系列 视频| 欧美精品一区二区大全| 成人无遮挡网站| videosex国产| 毛片一级片免费看久久久久| 尾随美女入室| 黑人欧美特级aaaaaa片| 国产又色又爽无遮挡免| 亚洲国产精品专区欧美| 亚洲精品中文字幕在线视频| av网站免费在线观看视频| 欧美日韩视频高清一区二区三区二| 日日啪夜夜爽| 久久99蜜桃精品久久| 欧美日韩国产mv在线观看视频| 亚洲欧美成人精品一区二区| 成人国语在线视频| 精品亚洲乱码少妇综合久久| 国产黄频视频在线观看| 亚洲精品国产av成人精品| 国产午夜精品一二区理论片| 亚洲精品乱久久久久久| 999精品在线视频| 欧美日韩视频精品一区| 在现免费观看毛片| 美女脱内裤让男人舔精品视频| 亚洲欧洲精品一区二区精品久久久 | 欧美精品亚洲一区二区| 日本黄大片高清| videossex国产| 国产av精品麻豆| 18禁在线无遮挡免费观看视频| 美女中出高潮动态图| 国产成人免费观看mmmm| 亚洲精品国产av蜜桃| 青春草国产在线视频| 亚洲成av片中文字幕在线观看 | 国产永久视频网站| 老司机亚洲免费影院| videosex国产| 久久精品国产综合久久久 | 久久综合国产亚洲精品| 80岁老熟妇乱子伦牲交| 草草在线视频免费看| 欧美3d第一页| 大香蕉久久成人网| av女优亚洲男人天堂| 国产又色又爽无遮挡免| 观看av在线不卡| 久久久精品区二区三区| 日韩av在线免费看完整版不卡| 天美传媒精品一区二区| 久久狼人影院| 2018国产大陆天天弄谢| 亚洲精品一区蜜桃| 日韩中字成人| 亚洲国产成人一精品久久久| 日韩av在线免费看完整版不卡| 亚洲国产最新在线播放| 亚洲丝袜综合中文字幕| 99久久中文字幕三级久久日本| 欧美 日韩 精品 国产| 超色免费av| 黄网站色视频无遮挡免费观看| 日韩av不卡免费在线播放| 午夜福利影视在线免费观看| 不卡视频在线观看欧美| 成人18禁高潮啪啪吃奶动态图| 一区二区日韩欧美中文字幕 | 制服人妻中文乱码| 亚洲欧美成人精品一区二区| 一级a做视频免费观看| 极品少妇高潮喷水抽搐| 哪个播放器可以免费观看大片| 狂野欧美激情性bbbbbb| 狠狠婷婷综合久久久久久88av| 咕卡用的链子| 国产成人精品久久久久久| 一级毛片我不卡| 在线天堂最新版资源| 99久久综合免费| 人体艺术视频欧美日本| 亚洲精品av麻豆狂野| 不卡视频在线观看欧美| 国产综合精华液| 亚洲国产精品999| 91久久精品国产一区二区三区| 人妻 亚洲 视频| 国产精品免费大片| 热99久久久久精品小说推荐| 免费av中文字幕在线| 久久久精品免费免费高清| 精品午夜福利在线看| 少妇的逼水好多| av卡一久久| 这个男人来自地球电影免费观看 | 青春草国产在线视频| 看非洲黑人一级黄片| 在线观看一区二区三区激情| 国产精品欧美亚洲77777| 日本黄色日本黄色录像| 精品久久久精品久久久| 国产精品 国内视频| 欧美日韩亚洲高清精品| 日韩大片免费观看网站| 欧美变态另类bdsm刘玥| 最近中文字幕高清免费大全6| 肉色欧美久久久久久久蜜桃| 亚洲欧美日韩另类电影网站| 精品国产一区二区久久| 午夜免费观看性视频| 午夜免费鲁丝| 国产免费福利视频在线观看| 国产乱来视频区| av片东京热男人的天堂| 国产不卡av网站在线观看| 精品卡一卡二卡四卡免费| 日韩一本色道免费dvd| 午夜精品国产一区二区电影| 2018国产大陆天天弄谢| 欧美激情国产日韩精品一区| 国产精品久久久久成人av| 18在线观看网站| 日本91视频免费播放| 9色porny在线观看| 国产成人精品无人区| 在线免费观看不下载黄p国产| 日本wwww免费看| 18+在线观看网站| 亚洲欧美清纯卡通| 一区在线观看完整版| 国产成人精品一,二区| 成人漫画全彩无遮挡| 国产有黄有色有爽视频| 免费黄色在线免费观看| 又大又黄又爽视频免费| 巨乳人妻的诱惑在线观看| 日本爱情动作片www.在线观看| 国产高清不卡午夜福利| 人妻系列 视频| 日韩大片免费观看网站| kizo精华| 精品国产国语对白av| 亚洲精品久久久久久婷婷小说| 欧美成人午夜免费资源| 亚洲欧洲日产国产| 夫妻性生交免费视频一级片| 水蜜桃什么品种好| 草草在线视频免费看| 国产精品麻豆人妻色哟哟久久| 国产精品国产三级国产av玫瑰| 天天影视国产精品| 色网站视频免费| 欧美人与性动交α欧美精品济南到 | 国产一区二区激情短视频 | 有码 亚洲区| 精品酒店卫生间|