• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

    2012-10-08 12:10:38YangJunzuoWangYongjianZhouYuan

    Yang Junzuo,Wang Yongjian,Zhou Yuan

    (National Computer Network Emergency Response Technical Team Coordination Center of China,Beijing,100029,P.R.China)

    INTRODUCTION

    Recently, the remote user authentication scheme using smart card has been deeply studied,and several schemes in this field have been proposed. Many pairing-based authentication schemes have also been designed.For example,Manik,et al proposed a novel remote user authentication scheme using bilinear pairings[1].However,one drawback of the scheme is that the smart card should contain a sensitive data of the card holder, which is generated from the password of the holder.

    Basically,a password-based authentication scheme using smart card is called two-factor authentication.In the two-factor authentication setting,any one can impersonate to sever as authorized user if the smart card is lost and the password is revealed simultaneously. To strengthen the security, some researchers proposed three-factor authentication. For example,Goyal and Chahar proposed a novel password-based remote user authentication scheme using smart card with biometric[2].As three-factor authentication schemes are not convenient to be used in practice(three factors should be involved simultaneously), the password-based authentication using smart card is more common in the real applications.

    In 2000,Hwang and Li proposed a new remote user authentication scheme,in which the remote system only kept a secret key x s for computing the user passwords and did not need to maintain password or verification tables for verifying legal user[3].However,Chan and Cheng pointed out that there was a weakness in the scheme[4].In 2003,to overcome this weakness,Shen, Lin and Hwang proposed a modified version and claimed that it was secure against Chan-Cheng’s attack[5].But Leung,et al showed that the weakness still existed in the Shen-Lin-Hwang’s scheme.And we can also find much recent work on authentication[6-9].

    This paper points out that the homomorphic is the main insecure factor in the Shen-Lin-Hwang’s scheme,and proposes an improved version using one-way hash func tion.

    Furthermore,based on the bilinear pairings,a new secure and efficient scheme is propsed.Both proposed schemes do not require that the smart card contains sensitive information(i.e.,some parameters generated from the password of the card holder).In fact,all the data stored in the card are public parameters.

    1 REVIEW OF SHEN-LIN-HWANG’SSCHEME

    In Ref.[5],Shen,Lin and Hwang used the concept of hiding identity and proposed an enhanced scheme to prevent from forgery attack[4]. The scheme involves the registration phase,the login phase and the authentication phase.In the registration phase,each user sends his identity to the system.After the user identity is affirmed,the system will issue a smart card,a″shadowed″identity and a password to him via a secure channel.When the user wants to access the remote system,he attaches his smart card to an input device,and keys in his ″shadowed″identity and a corresponding password. Then,the remote system will verify it in the authentication phase.

    1.1 Registration phase

    The system first prepares some system parameters as follows:

    (1)p:A large prime number.

    (2)x s:The secret key owned by the system.

    (3)h(?):A public one-way hash function.

    (4)RED(? ):A ″shadowed″identity of the device owned by the system.

    Suppose that a new user Uiwants to register the system,he first submits his identity IDi to the system.After the identity IDi is identified,the system computes the″shadowed″identity SIDiand password PWi for Ui,that is

    Herein,SIDi is the ″shadowed″identity,that is to say,a number as large as p,including the claimed identity IDi,half shorter than p,completed by a redundancy (the shadow)depending on IDi[10].Redundancy rules RED(or how constructing SIDi from IDi) are standardized[11].

    At last,the system issues the smart card,which contains the public parameters(p,h(?))and(SIDi,PWi)to the user Ui through a secure channel.Note that the data stored in the smart card,i.e.,(p,h(?)),is the same for all users.

    1.2 Login phase

    User Ui attaches his smart card to the login device and keys in his SIDi and PWi.Then,the smart card performs as follows:

    (1)Generate a random number r∈Z*p.

    (2)Compute C1=SIDrimod p.

    (3)Pick up the current date and time T of the login device,and compute t=h(T⊕PWi)mod(p-1).

    (4)Compute M=SIDtimod p.

    (5)Compute C2=M(PWi)rmod p.

    (6)Send a message C=(C1,C2,T,SIDi)to the remote system.

    1.3 Authentication phase

    Suppose that the system receives the message C at T′,where T′is the current date and time of the system.

    (1)Check the validity of″shadowed″identity SIDi,if the format is incorrect,the login request is rejected.

    (2)Check the time interval between T and T′,if(T′-T)≥ΔT,where ΔT is the expected legal time interval for transmission delay,the system rejects the login request.

    (3)Check C2(C1x s)-1mod p=(SIDi)h(T⊕PWi).If it does hold,the system accepts the login request.Otherwise,the request is rejected.

    Note that in the third step,the system has the capability of checking the equation as it knows the secret key xs,the data C2,C1,SIDi,and the public hash function h,and can compute the password PWi=SIDixsmod p.

    2 IMPROVED SHEN-LIN-HWANG’SSCHEME

    Although the Shen-Lin-Hwang’s scheme uses the concept of hiding identity,yet it still suffers from the forgery attack.Therefore,this paper improves the Shen-Lin-Hwang’s scheme.

    2.1 Leung’s attack

    In Ref.[6],Leung,et al presented an attack on the Shen-Lin-Hwang’s scheme.The attack is similar to the Chan-Cheng’s attack[4].

    As an enhanced version of the Hwang-Li’s scheme,the Shen-Lin-Hwang’s scheme also does not keep any user or password table in the remote system.Therefore,an evil user can login to the remote system successfully if he gets a valid pair(SID v,PW v).

    In the Leung’s attack,there is a legitimate user Ui,who with a valid pair(SIDi,PWi)can impersonate other legal users by the following tricks

    where r is the random number chosen by the user Ui.Obviously(SID v,PW v)is a valid pair.As a result,the Shen-Lin-Hwang’s scheme can be forged.

    Further studying the Shen-Lin-Hwang’s scheme, this paper finds that there is a homomorphic property in the scheme.Therefore,a slight change is made to improve the scheme.

    2.2 Improved scheme

    The improved scheme is composed of three phases:the registration phase,the login phase and the authentication phase.

    2.2.1 Registration phase

    The system first prepares the following system parameters:p,x s,h(?)are same with those in the Shen-Lin-Hwang’s scheme,and f(?)is a public one-way hash function.

    When a new user Ui submits his identity IDi to the system for registration,the system first checks its validity and then computes the password PWi as

    Then, the system stores the public parameters(p,h(? ),f(? ))to a smart card.

    Finally,the system issues the smart card and PWi to the user Ui through a secure channel.

    2.2.2 Login phase

    User Ui attaches his smart card to the login device and keys in his IDi and PWi.Then,the smart card performs as follows:

    (1)Generate a random number r∈Z*p.

    (2)Compute C1=f(IDi)rmod p.

    (3)Pick up T,and compute t=h(T⊕PWi)mod(p-1).

    (4)Compute M=f(IDi)tmod p.

    (5)Compute C2=M(PWi)rmod p.

    (6)Send a message C=(C1,C2,T,IDi)to the remote system.

    2.2.3 Authentication phase

    Suppose that the remote system receives the message C at T′.

    (1)Check the validity of identity IDi,if the format is incorrect,the login request is rejected.

    (2)Check the time interval between T and T′,if(T′-T)≥ΔT,the system rejects the login request.

    (3)Check C2 (C1x s)-1mod p =(f(IDi))h(T⊕PWi). If it does hold, the system accepts the login request.Otherwise,the request is rejected.

    2.3 Security analysis

    Generally,the adversaries are classified into two types:static and adaptive.An adversary is static if it can just eavesdrop over the channel,and adaptive if it can modify,delete,and insert the messages on the public channel.Hereafter,this paper focus on adaptiv e adversary for security analysis as it is more powerful than static one.It is proved that the improved scheme is secure even if the smart card is lost.Namely,any one who gets the user’s smart card,cannot impersonate the valid user to log into the system.

    Theorem 1 The improved scheme is secure against adaptive adversary under card-compromise attack.

    Proof If the smart card is compromised,the last protection for the user is the password PWi. Without PWi, the adversary cannot generate a valid C2that can pass the verification equation of Step(3)in the authentication phase.Moreover,a used valid C=(C1,C2,T,IDi)generated by the user cannot be used later as a time stamp is used in generating the message C.

    From a valid transcript of the login phase,the adversary cannot mount off-line dictionary attack because he does not know the secret key x s

    of the server and thus cannot check the verification equation.

    Therefore,the login phase does not leak any information for PWi,and the scheme is secure against adaptive adversary under card-compromise attack.

    Theorem 2 The improved scheme is secure against the Chan-Cheng’s attack[4]and the Leung’s attack[6].

    Proof The improved scheme is similar to the Shen-Lin-Hwang’s scheme,and the main difference is f(?).Just as this,it eliminates homomorphic property.Therefore,the improved scheme can withstand the Chan-Cheng’s attack[4]and the Leung’s attack[6].

    Suppose that a legitimate user Ui with a valid pair(IDi,PWi)can use the Chan-Cheng’s attack or the Leung’s attack to impersonate other legal users.For instance,he can obtain another valid pair(IDv,PWv)from the following equation

    But the equation contradicts the fact that f(?)is a public one-way function.Therefore,he can not obtain ID v from f(ID v),thus the improved scheme is a secure one.

    3 NEW SCHEME BASED ON BILINEAR PAIRINGS

    Although the improved scheme can withstand the forgery attack,yet it still requires high computation cost in smart card device.Therefore,based on bilinear pairings,this paper presents a new secure and efficient scheme.

    3.1 Bilinear pairings

    Let G1 be a cyclic additive group and G2 a cyclic multiplicative group of the same prime order q. Assume that the discrete logarithm problems in both G1 and G2 are hard.A bilinear pairing is a map e:G1× G1→ G2,which satisfies the following properties:

    (1)Bilinearity:For any P,Q∈ G1 and a,b∈,we have e(aP,bQ)=e(P,Q)ab.

    (2)Non-degeneration:There exist P∈G1 and Q∈ G1,such that e(P,Q)≠ 1.

    (3)Computability:Given P,Q∈G1,there is an efficient algorithm to compute e(P,Q)∈G2.

    Such a bilinear pairing may be realized using the modified Weil pairing and Tate pairing associated with supersingular elliptic curve.And a more comprehensive description can be seen in Refs.[11-14].

    3.2 New scheme

    The new scheme also involves the registration phase, the login phase and the authentication phase.

    3.2.1 Registration phase

    The system prepares the following system parameters:

    (1)q:A large prime number.

    (2)G1:A cyclic additive group of order q.(3)G2: A cyclic multiplicative group of the same order q.

    (4)P:A specific point in G1.

    (5)e:G1× G1→ G2.

    (6)x s:The secret key owned by the system.

    (7)H:{0,1}*→G1:A secure one-way hash function.

    When a new user Ui submits his identity IDi to the system for registration,the system first checks its validity and then computes the password PWi as follows

    Then, the system stores the public parameters(q,G1,P)to a smart card.

    Finally,the syste miss ues the smart card and PWi to the user Ui through a secure channel.

    3.2.2 Login phase

    User Uiattaches his smart card to the login device and keys in his IDi and PWi.Then,the smart card performs as follows:

    (1)Generate a random number r∈Z*q.

    (2)Compute C1=r?P.

    (3)Pick up T.

    (5)Send a message C=(C1,C2,T,IDi)to the remote system.

    3.2.3 Authentication phase

    Suppose that the remote system receives the message C at T′.

    (1)Check the validity of identity IDi,if the format of IDiis incorrect,the login request is rejected.

    (2)Check the time interval between T and T′,if(T′-T)≥ΔT,the system rejects the login request.

    (3)Check e(T? P+ C1,C2)=e(P,x s?H(IDi)).If it holds,the system accepts the login request.Otherwise,the request is rejected.This is correct since that

    3.3 Security analysis

    Theorem 3 Any attacker cannot reveal the master key x s of the system.

    Proof The security of the scheme is based on the one-way hash function and the hardness of discrete logarithm problem.

    Any legal user Ui cannot derive the system secret x s from his password PWi.If he can,the discrete logarithm problem can be solved.

    Theorem 4 New pairing-based scheme is secure against adaptive adversary under card-compromise attack.

    Proof If the smart card is compromised,the last protection for the user is the password PWi.Without the knowledge of the password PWi=x s? H(IDi), the adversary cannot generate a valid C2that can pass the verification equation e(T? P+C1,C2)=e(P,x s? H(IDi))according to the property of the bilinear pairing.

    Moreover,a used valid C=(C1,C2,T,IDi)generated by the user cannot be used later as a time stamp is used in generating the message C2.

    From a valid transcript of the login phase,where C2 is the only data containing the password information,the adversary cannot mount off-line dictionary attack because he does not know the secret key x s of the server and thus cannot check the verification equation.

    Therefore,the login phase does not leak any information for PWi,and the scheme is secure against adaptive adversary under cardcompromise attack.

    Theorem 5 New pairing-based scheme is secure against the eavesdropper.

    Proof Any attacker cannot forge another valid message C′={C′1,C′2,T′,IDi}from C=(C1,C2,T,IDi),where T′≠ T,C′1=r? P andIf he can,then from the factC2,he must know r,which contradicts the assumption that the discrete logarithm problem is hard.

    Theorem 6 New pairing-based scheme is secure against the Chan-Cheng’s attack[4]and the Leung’s attack[6].

    Proof Since it adopts the one-way hash function H on IDi,it also can withstand the Chan-Cheng’s attack[4]and the Leung’s attack[6].

    3.4 Efficiency analysis

    As the smart card is lower-powered and resource-constrained device,we should keep the computation cost down on user part.

    Fortunately,in the new scheme,the most time-consuming pairing evaluation is not used on the user part,while only one inversion modulo q and two multiplication evaluations in G1 are required.Therefore,the efficiency requirements are satisfied.

    4 CONCLUSION

    This paper first reviews the Shen-Lin-Hwang’s modified remote user authentication scheme,and points out the homomorphic is the main insecure factor. Then,a corresponding improved version is proposed,which eliminates the homomorphic. And,a new secure and efficient scheme based on the bilinear pairings is proposed.Since both schemes use one-way hash function on user identity IDi,they can prevent from the Chan-Cheng’s attack and the Leung’s attack.

    [1] Das M L,Saxena A,Gulati V P,et al.A novel remote user authentication scheme using bilinear pairings[J].Computers and Security,2006,25(3):184-189.

    [2] Goyal K K,Chahar M S.A novel remote user authentication scheme using smart card with biometric based on ECDLP[J].International Journal of Information Technology and Knowledge Management,2011,4(2):649-651.

    [3] Hwang M S,Li L H. A new remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electron,2000,46(1):28-30.

    [4] Chan C K,Cheng L M.Cryptanalysis of a remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electron,2000,46(4):992-993.

    [5] Shen J J,Lin CW,Hwang M S.A modified remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electron,2003,49(2):414-416.

    [6] Leung Kai-Chi,Cheng L M,Fong A S,et al.Cryptanalysis of a modified remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electron,2003,49(4):1243-1245.

    [7] Li C,Lee C.A novel user authentication and privacy preserving scheme with smart cards for wireless communications[J].Mathematical and Computer Modelling,2012,55(1/2):35-44.

    [8] Tsaur W,Li J,Lee W.An efficient and secure multi-server authentication scheme with key agreement[J].Journal of Systems and Software,2012,85(4):876-882.

    [9] Li Xiong,Xiong Yongping,Ma Jian,et al.An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[J].Journal of Network and Computer Applications,2012,35(2):763-769.

    [10]Guillou L,Quisquater J.Efficient digital public-key signatures with shadow [J]. Advanced in Cryptology-Crypto,1987:223.

    [11]Working group on JTC1/SC20/WG2. Digital signature scheme with shadow[S].ISO-DP 9796,1990.

    [12]Boneh D,Franklin M.Identity-based encryption from the Weil pairing[J].Advances in Cryptology-Crypto 2001,Lecture Notes in Computer Science,2001:213-229.

    [13]Camenisch J,Haralam biev K,Kohlw elss M,et al.Structure preserving CCA secure encryption and applications[J].Lecture Notes in Computer Science,2011,7073:89-106.

    [14]Schage S.Tight proofs for signature schemes without random oracles[J].Lecture Notes in Computer Science,2011,6632:189-206.

    色播亚洲综合网| 校园人妻丝袜中文字幕| 97在线视频观看| 一夜夜www| 亚洲人与动物交配视频| 高清在线视频一区二区三区 | 亚洲中文字幕日韩| eeuss影院久久| 国产高清国产精品国产三级 | 中文天堂在线官网| 美女国产视频在线观看| 男女视频在线观看网站免费| 热99re8久久精品国产| 99热这里只有是精品50| 国产av码专区亚洲av| 一个人观看的视频www高清免费观看| 亚洲欧美一区二区三区国产| 国产色婷婷99| 国产av码专区亚洲av| 成人国产麻豆网| 日本爱情动作片www.在线观看| 级片在线观看| 国产精品久久久久久久久免| 国产精品久久视频播放| 国产黄片视频在线免费观看| 亚洲av电影在线观看一区二区三区 | 婷婷色综合大香蕉| 亚洲av.av天堂| 国产黄片视频在线免费观看| 久久草成人影院| 中国美白少妇内射xxxbb| 久久久久久九九精品二区国产| 色吧在线观看| 久久久久九九精品影院| 午夜久久久久精精品| 国产精品一区二区在线观看99 | 亚洲一级一片aⅴ在线观看| 99国产精品一区二区蜜桃av| 女的被弄到高潮叫床怎么办| 国产成人freesex在线| 久久欧美精品欧美久久欧美| 亚洲国产欧美人成| 午夜爱爱视频在线播放| 青春草视频在线免费观看| 插逼视频在线观看| 99热网站在线观看| 性色avwww在线观看| 如何舔出高潮| 在线播放国产精品三级| 久久久久久久久中文| 欧美日韩国产亚洲二区| 熟妇人妻久久中文字幕3abv| 网址你懂的国产日韩在线| 少妇猛男粗大的猛烈进出视频 | 26uuu在线亚洲综合色| 精品午夜福利在线看| 亚洲婷婷狠狠爱综合网| 国产乱来视频区| 国产高清三级在线| 国产午夜精品论理片| 亚洲欧美精品自产自拍| 国产免费福利视频在线观看| 国产极品精品免费视频能看的| 高清午夜精品一区二区三区| 久久久久久九九精品二区国产| 亚洲激情五月婷婷啪啪| 久久精品国产自在天天线| 丰满人妻一区二区三区视频av| 国产精品一及| av在线天堂中文字幕| 毛片女人毛片| 久久久久久久亚洲中文字幕| 身体一侧抽搐| 国产成人福利小说| 51国产日韩欧美| 看片在线看免费视频| 欧美精品一区二区大全| 狂野欧美激情性xxxx在线观看| 最近的中文字幕免费完整| 午夜视频国产福利| 蜜臀久久99精品久久宅男| 亚洲最大成人av| 久久久久性生活片| 国产午夜精品论理片| 黄片无遮挡物在线观看| 精品免费久久久久久久清纯| 午夜精品国产一区二区电影 | 国产v大片淫在线免费观看| 特级一级黄色大片| 最新中文字幕久久久久| 午夜福利在线观看吧| 色尼玛亚洲综合影院| 欧美最新免费一区二区三区| 日韩大片免费观看网站 | 国产毛片a区久久久久| 五月伊人婷婷丁香| 亚洲五月天丁香| 又爽又黄a免费视频| 精品国产一区二区三区久久久樱花 | 午夜亚洲福利在线播放| 中文字幕亚洲精品专区| .国产精品久久| 99久久中文字幕三级久久日本| 男人的好看免费观看在线视频| 亚洲人成网站高清观看| 精品人妻偷拍中文字幕| 欧美一区二区国产精品久久精品| 啦啦啦啦在线视频资源| 黄色一级大片看看| 色吧在线观看| 99在线视频只有这里精品首页| 国产淫语在线视频| 日韩精品青青久久久久久| 舔av片在线| 婷婷色av中文字幕| 女人久久www免费人成看片 | 18+在线观看网站| 人人妻人人澡欧美一区二区| 两个人视频免费观看高清| 中文字幕免费在线视频6| 亚洲av二区三区四区| 七月丁香在线播放| 亚洲国产精品成人久久小说| 国产成人一区二区在线| 久久亚洲精品不卡| 在现免费观看毛片| 精品久久久久久久人妻蜜臀av| 亚洲精品久久久久久婷婷小说 | 国产精品野战在线观看| 国产 一区精品| 淫秽高清视频在线观看| 美女cb高潮喷水在线观看| 免费观看的影片在线观看| 在线免费十八禁| 久久这里只有精品中国| 五月玫瑰六月丁香| 亚洲av一区综合| 禁无遮挡网站| 国产精品蜜桃在线观看| 高清在线视频一区二区三区 | av播播在线观看一区| 七月丁香在线播放| 国产黄色小视频在线观看| 亚洲欧美中文字幕日韩二区| 老女人水多毛片| 久久鲁丝午夜福利片| 两个人的视频大全免费| 国产精品久久久久久精品电影| 日韩成人av中文字幕在线观看| 18禁动态无遮挡网站| 人人妻人人澡人人爽人人夜夜 | 噜噜噜噜噜久久久久久91| 久久久国产成人精品二区| 九草在线视频观看| 国产高清视频在线观看网站| 国产精品一二三区在线看| 两性午夜刺激爽爽歪歪视频在线观看| 精品久久久久久电影网 | 欧美又色又爽又黄视频| 国产免费视频播放在线视频 | 永久网站在线| 嫩草影院精品99| 亚洲国产成人一精品久久久| 国产午夜福利久久久久久| 国产亚洲午夜精品一区二区久久 | 亚洲国产色片| 欧美激情国产日韩精品一区| 日韩大片免费观看网站 | 欧美三级亚洲精品| 最近视频中文字幕2019在线8| 蜜桃亚洲精品一区二区三区| 日本免费在线观看一区| 成年女人永久免费观看视频| 久热久热在线精品观看| 国产极品精品免费视频能看的| 91久久精品国产一区二区三区| 亚洲国产成人一精品久久久| 国产免费一级a男人的天堂| 国产精品精品国产色婷婷| 精品99又大又爽又粗少妇毛片| 三级男女做爰猛烈吃奶摸视频| 国产国拍精品亚洲av在线观看| 建设人人有责人人尽责人人享有的 | 日本与韩国留学比较| 毛片一级片免费看久久久久| 成人一区二区视频在线观看| 五月伊人婷婷丁香| 精品一区二区三区视频在线| 黄色配什么色好看| 久久精品影院6| 国产69精品久久久久777片| 国语自产精品视频在线第100页| 精品午夜福利在线看| 麻豆av噜噜一区二区三区| 老司机影院毛片| 亚洲内射少妇av| 国产一级毛片在线| 在线天堂最新版资源| 91久久精品国产一区二区三区| 国产精品久久电影中文字幕| 永久免费av网站大全| 综合色丁香网| 99热这里只有是精品50| av免费观看日本| 亚洲最大成人手机在线| 在线播放无遮挡| 色综合亚洲欧美另类图片| 成人性生交大片免费视频hd| www.av在线官网国产| 亚洲自偷自拍三级| 久久久国产成人精品二区| 高清午夜精品一区二区三区| 免费观看人在逋| 男女那种视频在线观看| 日韩人妻高清精品专区| 欧美xxxx黑人xx丫x性爽| av专区在线播放| 26uuu在线亚洲综合色| 久久久国产成人免费| 搞女人的毛片| av又黄又爽大尺度在线免费看 | 天天躁夜夜躁狠狠久久av| 日韩av在线大香蕉| 国产精品野战在线观看| 久久精品夜夜夜夜夜久久蜜豆| 精品一区二区三区视频在线| 亚洲经典国产精华液单| 舔av片在线| 国产综合懂色| eeuss影院久久| 简卡轻食公司| 人体艺术视频欧美日本| 青春草亚洲视频在线观看| 久久精品国产鲁丝片午夜精品| 亚洲av中文av极速乱| 精品久久久久久久末码| 久久亚洲国产成人精品v| 99久久中文字幕三级久久日本| 成年免费大片在线观看| 亚洲欧美精品自产自拍| 男女视频在线观看网站免费| 国产午夜精品论理片| 国产欧美另类精品又又久久亚洲欧美| 亚洲av不卡在线观看| 两个人的视频大全免费| 久久午夜福利片| 午夜免费男女啪啪视频观看| 久久久久久久久久黄片| 一卡2卡三卡四卡精品乱码亚洲| 边亲边吃奶的免费视频| 午夜福利在线观看吧| 尾随美女入室| 少妇的逼好多水| 高清毛片免费看| 日产精品乱码卡一卡2卡三| 亚洲欧美清纯卡通| 国产精品一区二区三区四区免费观看| 国产视频首页在线观看| 久久久精品大字幕| 亚洲欧洲国产日韩| 又爽又黄无遮挡网站| 纵有疾风起免费观看全集完整版 | 一本一本综合久久| 老司机影院毛片| 国产精品女同一区二区软件| a级一级毛片免费在线观看| 搡女人真爽免费视频火全软件| 国产精品美女特级片免费视频播放器| 美女脱内裤让男人舔精品视频| 国产精品三级大全| 午夜爱爱视频在线播放| 精品久久久久久久久久久久久| 国产午夜精品论理片| 国产精品福利在线免费观看| 免费一级毛片在线播放高清视频| 国内少妇人妻偷人精品xxx网站| 国产 一区精品| 欧美一区二区亚洲| 国产亚洲一区二区精品| 国产伦精品一区二区三区四那| 国产三级中文精品| 狂野欧美激情性xxxx在线观看| 三级国产精品片| 亚洲在久久综合| 日本五十路高清| 丝袜美腿在线中文| 亚洲在线观看片| 亚洲av成人精品一二三区| 韩国高清视频一区二区三区| 久久精品人妻少妇| 久久久国产成人免费| 最近中文字幕2019免费版| 搡老妇女老女人老熟妇| 免费av观看视频| 国产成人精品婷婷| 亚洲av成人精品一区久久| 久久精品夜夜夜夜夜久久蜜豆| 美女高潮的动态| 日韩人妻高清精品专区| 欧美色视频一区免费| 色网站视频免费| 日韩强制内射视频| 亚洲久久久久久中文字幕| 欧美潮喷喷水| 男插女下体视频免费在线播放| 日本一本二区三区精品| 日本五十路高清| 成人无遮挡网站| 国产伦精品一区二区三区四那| 精华霜和精华液先用哪个| 国产亚洲精品久久久com| 午夜视频国产福利| 欧美精品一区二区大全| 青春草亚洲视频在线观看| 亚洲不卡免费看| av福利片在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久精品久久久久久久性| 亚洲国产精品合色在线| 国产一区亚洲一区在线观看| 最近的中文字幕免费完整| 欧美激情久久久久久爽电影| 99久久精品热视频| 国产精品一区www在线观看| 色5月婷婷丁香| 草草在线视频免费看| 午夜福利在线在线| 国产精品三级大全| 国产精品久久视频播放| 国产精品电影一区二区三区| 你懂的网址亚洲精品在线观看 | 亚洲精品国产av成人精品| 国产探花在线观看一区二区| 成人毛片a级毛片在线播放| 欧美激情在线99| 天堂av国产一区二区熟女人妻| 欧美一区二区精品小视频在线| 日本爱情动作片www.在线观看| 亚洲不卡免费看| 男女啪啪激烈高潮av片| 精品免费久久久久久久清纯| 国产在视频线在精品| 自拍偷自拍亚洲精品老妇| 99国产精品一区二区蜜桃av| 又黄又爽又刺激的免费视频.| 国产乱人视频| 中国国产av一级| 观看免费一级毛片| 看非洲黑人一级黄片| 一边亲一边摸免费视频| 超碰97精品在线观看| 成人高潮视频无遮挡免费网站| 久久精品久久久久久噜噜老黄 | 精品国产露脸久久av麻豆 | 丰满人妻一区二区三区视频av| 99热全是精品| 99久久成人亚洲精品观看| 精华霜和精华液先用哪个| 亚洲最大成人手机在线| 国产精品不卡视频一区二区| 美女国产视频在线观看| 色播亚洲综合网| 日韩国内少妇激情av| 亚洲国产欧美在线一区| 女的被弄到高潮叫床怎么办| av在线蜜桃| 欧美zozozo另类| 天堂影院成人在线观看| 中文欧美无线码| 春色校园在线视频观看| 中文资源天堂在线| 最近最新中文字幕免费大全7| 成人性生交大片免费视频hd| 国产成人精品久久久久久| 亚洲av一区综合| 日本一本二区三区精品| 97人妻精品一区二区三区麻豆| 午夜福利视频1000在线观看| 看免费成人av毛片| 听说在线观看完整版免费高清| 啦啦啦啦在线视频资源| 国产一级毛片七仙女欲春2| 女人十人毛片免费观看3o分钟| 亚洲图色成人| 久久精品久久久久久噜噜老黄 | 亚洲国产高清在线一区二区三| 国产精品女同一区二区软件| 乱码一卡2卡4卡精品| 亚洲国产精品sss在线观看| 三级国产精品片| 三级国产精品欧美在线观看| 丝袜美腿在线中文| 久久这里有精品视频免费| 国内揄拍国产精品人妻在线| 午夜老司机福利剧场| 国产白丝娇喘喷水9色精品| 18禁在线播放成人免费| av黄色大香蕉| 国产 一区精品| 熟女人妻精品中文字幕| 国产精品一区二区三区四区免费观看| 久久久久久大精品| 天堂av国产一区二区熟女人妻| 99久久精品热视频| 建设人人有责人人尽责人人享有的 | 99热这里只有精品一区| 人人妻人人澡欧美一区二区| 日韩高清综合在线| 国产白丝娇喘喷水9色精品| 国产黄片美女视频| 亚洲精品乱久久久久久| 久久人妻av系列| 国产亚洲5aaaaa淫片| 三级毛片av免费| 免费无遮挡裸体视频| 亚洲av电影在线观看一区二区三区 | av.在线天堂| 男女视频在线观看网站免费| 两性午夜刺激爽爽歪歪视频在线观看| 一级毛片电影观看 | 在线天堂最新版资源| 国产高清有码在线观看视频| 人人妻人人看人人澡| 国产欧美另类精品又又久久亚洲欧美| 亚洲图色成人| 国产 一区精品| 麻豆精品久久久久久蜜桃| 精品一区二区三区人妻视频| 69人妻影院| 人妻制服诱惑在线中文字幕| 久久久久久久久久黄片| 国产色爽女视频免费观看| 欧美bdsm另类| 亚洲欧美一区二区三区国产| 高清午夜精品一区二区三区| 亚洲av一区综合| 日韩视频在线欧美| 色吧在线观看| 久久精品国产鲁丝片午夜精品| 哪个播放器可以免费观看大片| a级毛色黄片| 欧美又色又爽又黄视频| 久久精品国产鲁丝片午夜精品| 99视频精品全部免费 在线| 一二三四中文在线观看免费高清| 欧美日韩国产亚洲二区| 精品久久久久久久久av| 99久久成人亚洲精品观看| 97人妻精品一区二区三区麻豆| 在线免费观看不下载黄p国产| 精品久久久久久久久亚洲| 人妻系列 视频| 国产免费一级a男人的天堂| 好男人视频免费观看在线| 久久亚洲国产成人精品v| АⅤ资源中文在线天堂| 欧美3d第一页| 男的添女的下面高潮视频| 一区二区三区免费毛片| 黄色日韩在线| 一个人观看的视频www高清免费观看| 国产成人a区在线观看| 国产伦精品一区二区三区视频9| 国产人妻一区二区三区在| 色网站视频免费| 一夜夜www| 亚洲成av人片在线播放无| 亚洲国产欧美人成| 在线播放国产精品三级| 男女下面进入的视频免费午夜| 免费黄色在线免费观看| 人人妻人人澡人人爽人人夜夜 | 99九九线精品视频在线观看视频| 看片在线看免费视频| 国产黄a三级三级三级人| 成人美女网站在线观看视频| 搡女人真爽免费视频火全软件| 国产精品熟女久久久久浪| 插逼视频在线观看| 欧美激情在线99| 久久久久久久久久成人| 欧美性感艳星| 小蜜桃在线观看免费完整版高清| 九九久久精品国产亚洲av麻豆| 亚洲欧美精品综合久久99| 村上凉子中文字幕在线| 秋霞在线观看毛片| 亚洲欧美精品自产自拍| 久久久久网色| ponron亚洲| 少妇人妻精品综合一区二区| 日韩人妻高清精品专区| 日韩亚洲欧美综合| 边亲边吃奶的免费视频| 男人的好看免费观看在线视频| 少妇高潮的动态图| 18禁在线无遮挡免费观看视频| 搞女人的毛片| 有码 亚洲区| 成人欧美大片| 成年女人永久免费观看视频| 啦啦啦韩国在线观看视频| 99久久中文字幕三级久久日本| 高清在线视频一区二区三区 | av女优亚洲男人天堂| 国内少妇人妻偷人精品xxx网站| 国产亚洲精品久久久com| 成年女人看的毛片在线观看| 日韩av在线大香蕉| 九草在线视频观看| 男女视频在线观看网站免费| 国产精品一区二区在线观看99 | 国产一区二区在线av高清观看| 亚洲精品一区蜜桃| 日本与韩国留学比较| 国产老妇伦熟女老妇高清| 中文天堂在线官网| 最近的中文字幕免费完整| 自拍偷自拍亚洲精品老妇| 日韩一区二区三区影片| 中文天堂在线官网| 国产人妻一区二区三区在| 日韩精品青青久久久久久| 成人性生交大片免费视频hd| 日本黄色视频三级网站网址| 1024手机看黄色片| 亚洲精品aⅴ在线观看| 国产精品一区www在线观看| 成人毛片a级毛片在线播放| 禁无遮挡网站| 中文天堂在线官网| 久久久久性生活片| 日韩欧美精品v在线| 亚洲av不卡在线观看| 成人国产麻豆网| 欧美极品一区二区三区四区| 最新中文字幕久久久久| 日本三级黄在线观看| 久久久成人免费电影| 真实男女啪啪啪动态图| 免费不卡的大黄色大毛片视频在线观看 | 亚洲最大成人手机在线| 国产精品一区二区性色av| 1024手机看黄色片| 成人毛片60女人毛片免费| 最近2019中文字幕mv第一页| 亚洲真实伦在线观看| 欧美xxxx性猛交bbbb| 日本五十路高清| 女人被狂操c到高潮| 亚洲精品aⅴ在线观看| 国产成人aa在线观看| 国产真实伦视频高清在线观看| 蜜桃亚洲精品一区二区三区| 久久久成人免费电影| 国产成人a区在线观看| 国国产精品蜜臀av免费| 国产伦理片在线播放av一区| 午夜亚洲福利在线播放| h日本视频在线播放| 最后的刺客免费高清国语| 国产成人精品久久久久久| 亚洲欧美一区二区三区国产| av播播在线观看一区| 在线播放国产精品三级| 亚洲熟妇中文字幕五十中出| a级一级毛片免费在线观看| 18禁在线播放成人免费| h日本视频在线播放| 毛片女人毛片| 2022亚洲国产成人精品| 国产69精品久久久久777片| 亚洲国产精品sss在线观看| 久久久久久久久久久丰满| 色吧在线观看| 国产伦精品一区二区三区四那| 午夜亚洲福利在线播放| 老司机影院毛片| 亚洲国产精品成人久久小说| 两个人的视频大全免费| 一级黄片播放器| 国产真实伦视频高清在线观看| 国产久久久一区二区三区| 亚洲一级一片aⅴ在线观看| 亚洲人成网站高清观看| 天堂√8在线中文| 赤兔流量卡办理| 一级毛片久久久久久久久女| 天天一区二区日本电影三级| 日韩av在线大香蕉| 中文亚洲av片在线观看爽| 日韩欧美精品免费久久| 午夜福利高清视频| 久久久久久久国产电影| 久久久久久伊人网av| a级一级毛片免费在线观看| 嫩草影院新地址| 黄色日韩在线| 日本欧美国产在线视频| 深夜a级毛片| 尤物成人国产欧美一区二区三区| 中文精品一卡2卡3卡4更新| 天堂av国产一区二区熟女人妻| 中文字幕熟女人妻在线| 亚洲最大成人中文| 色播亚洲综合网| 国产午夜福利久久久久久| 狂野欧美白嫩少妇大欣赏| 亚洲国产精品sss在线观看| 国产乱人偷精品视频| 久久人人爽人人爽人人片va| 91精品一卡2卡3卡4卡| 久久韩国三级中文字幕| 身体一侧抽搐| 久久99热6这里只有精品|