• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Confidential Non-Interactive Origin-Guarantee Message Transfer Scheme with Uniqueness

    2013-02-19 23:19:10YaFenChangandShunMengPan

    Ya-Fen Chang and Shun-Meng Pan

    1. Introduction

    Nowadays, many users communicate with others via the Internet for convenience. Many network technologies have been proposed to realize ubiquitous communication.However, the Internet is a public but insecure channel, and how to ensure integrity and confidentiality of communication data becomes an urgent issue.Cryptographic technologies play an important role to achieve this goal, and a cryptosystem is regarded as a basic infrastructure. Cryptosystems are divided into two categories, symmetric and asymmetric. In a symmetric cryptosystem, two communication parties need to share one session key to encrypt/decrypt communication information.If there exist n users and any two of them want to communicate with each other secretly, n×(n-1)/2 session keys need to be generated. In an asymmetric cryptosystem,each user possesses a public key and a private key. When a user wants to send a message to another user secretly, the sender uses the receiver’s public key to encrypt the message to get the corresponding ciphertext. After getting the ciphertext, the receiver uses his private key to decrypt the ciphertext to retrieve the message. Thus, asymmetric cryptosystems provide not only encryption but also authentication. Moreover, users may generate signatures in asymmetric cryptosystems. It seems that asymmetric cryptosystems are superior to symmetric ones. Actually, a public key is regarded valid to be used only when it is verified successfully. This approach is cumbersome, and a certificate is needed.

    In 1984, Shamir proposed an identity-based (ID-based)cryptosystem[1], where a user’s public information, such as name, e-mail address and so on, is used to be the public key.Via this approach, no certificate is needed to verify a public key. Instead, a private key generator (PKG), needs to issue a private key to the user when he joins the system, and PKG must be a trustworthy third party. An ID-based cryptosystem lets users exchange information securely with no third party’s online service and without verifying the public key. In 2004, Bellare et al. proved that Shamir’s scheme is secure against forgeability[2]. From then on,many ID-based schemes are proposed[3],[4]. As mentioned above, asymmetric cryptosystems enable encryption and digital signature generation. Signature possesses integrity,authentication, non-repudiation such that a signer cannot repudiate the generation of the digital signature and a verifier can ensure the originality of the digital signature.But, how only a specific verifier can retrieve the message and verify the signature to ensure confidentiality becomes another research issue. The simplest way is encrypting the message with the receiver/verifier’s public key and signing the message with the sender/signer’s private key. In 1997,Zheng introduced a novel concept, signcryption, such that encryption and signature generation could be performed at the same time with lower computational costs and communication overheads[5]. Malone-Lee proposed the first identity-based signcryption scheme[6]in 2002. Then many identity-based signcryption schemes have been proposed[7]–[9].

    On the other hand, how to ensure uniqueness is a critical requirement. Biometrics, such as fingerprint, palm prints, tongue shape recognition, face recognition, hand geometry, and iris recognition, provides an opportunity to ensure uniqueness because biometric features are unique and cannot be duplicated. Transforming extracted biometric features of the same user may obtain different values because of its nature. Thus, a fuzzy extractor can be adopted to have biometric features of one user transformed into the same value[10],[11].

    In 2012, Li and Khan proposed a biometric identity-based signcryption (BIO-IBSC) scheme[12]. In their signcryption scheme, biometric information is used to construct the public key. That is, a sender/signer needs to obtain the receiver/verifier’s biometric feature to signcrypt the message, and the receiver/verifier needs to obtain the sender/signer’s biometric feature to unsigncrypt the ciphertext and signature. It denotes that these two parties need to perform signcryption and unsigncryption cooperatively. This approach is cumbersome and may be against the law on personal data protection.

    To overcome the observed drawbacks and to preserve the advantages, we propose an identity-based biometric signcryption (IBBSC) scheme. In our scheme, biometrics is used to protect a user’s private key, and a user’s identity is the corresponding public key. When a signer/sender wants to signcrypt a message, only his biometric feature is needed.And, when a verifier/receiver wants to unsigncrypt he ciphertext and signature, only verifier/receiver’s biometric feature is needed. Thus, signcryption and unsigncryption can be performed by one user independently.

    The rest of this paper is organized as follows.Preliminaries are given in Section 2. The formal model of identity-based biometric signcryption is shown in Section 3.Our scheme is presented in Section 4. In Section 5, security analysis of the proposed scheme is made. Finally, some conclusions are drawn in Section 6.

    2. Preliminaries

    We introduce bilinear pairings and the hard problems which our scheme’s security is based on in Section 2.1.How to generate the key value from biometrics is given in Section 2.2.

    2.1 Bilinear Pairings and the Related Hard Problems

    Let P be a generator of a cyclic additive group G1and G2be a cyclic multiplicative group with a prime order q. A bilinear pairing map e: G1×G1→G2possesses the following properties.

    Alternation: e(P1, P2) = e(P2, P1) for P1, P2∈ G1.

    Non-degeneracy: e(P1, P2) ≠ 1 for P1, P2∈ G1.

    Bilinearity: e(aP1, bP2) = e(P1, P2)aband e(P1+P3, P2)=e(P1, P2) e(P3, P2) for P1, P2, P3∈ G1and a, b ∈*pZ .

    Computability: There exists an efficient algorithm to compute e(P1, P2) for P1, P2∈ G1.

    Our scheme’s security is based on the difficulties of solving the q-bilinear Diffie-Hellman Inversion problem and q-strong Diffie-Hellman problem. The definitions are as follows:

    Definition 1. q-bilinear Diffie-Hellman inversion problem (q-BDHIP): There are groups G1and G2with a prime order p, a bilinear map e: G1× G1→ G2, and a generator P ∈ G1. It is hard to compute e(P, P)1/αwith given (P, αP, α2P, …, αqP).

    Definition 2. q-strong Diffie-Hellman problem(q-SDHP): There are groups G1and G2with a prime order p, a bilinear map e: G1× G1→ G2, and a generator P ∈ G1.It is hard to find a pair (x , P (α +x)) for x ∈Z*pand P(α +x)∈G1with (P, αP, α2P, …, αqP).

    2.2 Generating the Key Value from Biometrics

    Generating the key value from biometrics is important to make our scheme achieve the goal. Dodis et al. used a fuzzy extractor[10]to obtain a unique identity from an inputted biometric feature b with an allowed error tolerance t. It denotes that the same identity can be retrieved if the distance between the measured biometric feature and the sampled one is within t. Burnett et al. proposed a concrete fuzzy extractor[13]by using an [n, k, 2t+1]Bose-Chaudhuri-Hocquenghem error correction code,Hamming distance metric, and a one-way hash function H:{0, 1}n→ {0, 1}l. Because our scheme is based on Burnett et al.’s concrete fuzzy extractor, the concrete fuzzy extractor is introduced by the following two functions Ebi and Dbi.

    · Ebi: After a biometric feature b is inputted, this function computes and returns λ=H(b) and the system parameter PAR = b ⊕ Ce(λ), where Ceis a one-to-one encoding function.

    · Dbi: After a biometric feature b′ is inputted and the system parameter PAR is obtained, this function computes and returns λ′= Cd(b′⊕ PAR), where Cdis the decoding function which can correct the errors within a range t. If dis(b, b′) is within the error tolerance t, λ′=λ, where dis(?, ?)is a function to measure the distance between two inputted data items.

    3. Formal Model of Identity-Based Biometric Signcryption

    To formalize identity-based biometric signcryption(IBBSC) schemes, a generic structure and security notations of IBBSC are given in this section.

    3.1 Generic IBBSC Scheme

    A generic IBBSC scheme is composed of the following four algorithms, Setup, Extract, Signcrypt, and Unsigncrypt.

    · Setup: The PKG (private key generator) executes this algorithm, a probabilistic polynomial-time algorithm, with a security parameter k. This algorithm outputs a master secret key msk and public parameters params.

    · Extract: The PKG executes this algorithm, a key generation algorithm, with inputs msk, a user’s identity ID and the user’s biometric feature b. This algorithm outputs the corresponding private keys SID1and SID2.

    · Signcrypt: The sender executes this algorithm, a probabilistic polynomial-time algorithm, with the message m, the sender’s private keys Ss1, and Ss2, the sender’s biometric feature bs, and the receiver’s identity IDr. If dis(bs,bs′) ≤ t, this algorithm outputs a ciphertext σ = Signcrypt(m,Ss1, Ss2, bs, IDr).

    3.2 Security Notions

    An IBBSC scheme should satisfy confidentiality and unforgeability. Confidentiality means indistinguishability adaptive chosen ciphertext attack (IND-CCA2) to make an adversary be unable to distinguish pairs of ciphertexts with the messages he encrypts. Unforgeability denotes existential unforgeability against adaptive chosen messages attacks (EUF-CMA) such that it is computationally infeasible for an adaptive attacker to impersonate an honest sender/signer to forge a valid signature verified by unsigncrypt successfully.

    For confidentiality, we take the following game played between a challenger C and an adversary A into consideration.

    · Setup: The challenger C runs Setup(k) to get msk and params and runs A with input k and msk.

    · Phase 1: The adversary A performs a polynomial bounded number of queries such that each query depends on the responses to the previous ones, where queries consist of extraction, signcryption, and unsigncryption.

    1) Extraction queries: A makes an extraction query to C after producing the biometric feature b and ID. C computes Extract(b, ID, msk) to get private keys S1and S2and sends them to A.

    2) Signcryption queries: A produces a plaintext m, a sender’s biometric feature bs, a sender’s identity IDs, and a receiver’s identity IDr. C computes the sender’s private keys Ss1and Ss2by Extract(bs, IDs, msk), computes σ by Signcrypt(m, Ss1, Ss2, bs, IDr), and sends σ to A.

    3) Unsigncryption queries: A produces a ciphertext σ, a sender’s identity IDs, a receiver’s biometric feature br, and the receiver’s identity IDr. C computes the receiver’s private keys Sr1and Sr2by Extract(br, IDr, msk), computes Unsigncrypt(σ, Sr1, Sr2, br, IDs), and sends the result to A.

    · Challenge: A decides when to terminate Phase 1 and generates two messages m0and m1of the same size. A chooses the sender’s biometric feature bs*and makes an extraction query for the sender’s private keys such that (Ss1*,Ss2*) ← Extract(bs*, IDs, msk). C chooses a bit μ randomly,computes σ*= Signcrypt(mμ, Ss1*, Ss2*, bs*, IDr) and returns σ*to A as the challenge.

    · Phase 2: A can make a polynomial bounded number of queries as in Phase 1 except that A can make neither an extraction query for the receiver’s private keys nor an unsigncryption query on σ*to get the plaintext.

    · Guess: A outputs a bit μ′ and wins the game if μ′ =μ.

    The advantage of A is defined as follows:

    Definition 3. An IBBSC scheme is said to be IND-CCA2 secure if the advantage for a probabilistic polynomial-time adversary A in the IND-CCA2 game of the security parameter k is negligible.

    For unforgeability, we take the following game played between a challenger C and an adversary A into consideration.

    · Setup: The challenger C runs Setup(k) to get msk and params and runs A with input k and msk.

    · Attack: The adversary A makes a polynomial bounded number of queries as in the previous game.

    · Forgery: A produces a new quadruple (σ*, br*, IDr*,IDs*), and A can neither make a signcryption query nor make an extraction query for the sender’s private keys. A wins this game if Unsigncrypt(σ*, Sr1*, Sr2*, br*, IDs*) is not⊥.

    Definition 4. An IBBSC scheme is said to be EUF-CMA secure if the advantage for a probabilistic polynomial-time adversary A in the EUF-CMA game of the security parameter k is negligible.

    4. Proposed Scheme

    In this section, our IBBSC scheme is shown. In our scheme, there exists one PKG. To illustrate how it works,two users UAand UBare involved, where UAis the sender/signer and UBis receiver/verifier.

    · Setup: Given a security parameter k, the PKG chooses an additive group G1and a multiplicative group G2with a prime order q, a generator P of G1, a bilinear pairing map e:G1× G1→ G2, three hash functions H1, H2, and H3, an encoding function Ce, a decoding function Cd, and a function H4, where H1: {0, 1}*→, H2: {0, 1}*× G2→, H3: G2→{0, 1}n, H4: b → {0, 1}*and n is the number of the bits of a message to be signcrypted. The PKG randomly chooses a master secret s∈and computes g =e(P, P) and Ppub= sP. The PKG keeps the master secret s secretly and publishes system parameters {G1, G2, e, P, Ppub,g, H1, H2, H3, H4, n, Ce, Cd}.

    · Extract: For UA, the PKG computes λA=H4( bA),SA1= bA⊕ Ce( λA), and SA2=P [λA(H1( IDA)+ s )], where IDAis UA’s identity, bAis UA’s inputted biometric pattern and SA1and SA2are UA’s private keys. For UB, the PKG computes λB= H4(bB), SB1= bB⊕ Ce( λB), and, where IDBis UB’s identity, bBis UB’s inputted biometric pattern and SB1and SB2are UB’s private keys.

    · Signcrypt: When UAwants to send a message m to UB,UAneeds to perform the following steps:

    Step 1: Input bA′.

    Step 2: Compute λA′= Cd(bA′⊕ SA1) and SA= λA′SA2. If dis(bA, bA′) ≤ t, λA= λA′, and SA= λA′SA2=

    Step 3: Randomly choose x from*pZ.

    Step 4: Compute r = gxand c = m ⊕ H3(r).

    Step 5: Compute h = H2(m, r).

    Step 6: Compute S = (x + h)SA.

    Step 7: Compute T = x(H1(IDB)+ Ppub).

    Step 8: Output the ciphertext σ = (c, S, T).

    · Unsigncrypt: After getting σ from UA, UBunsigncrypts σ by performing the following steps.

    Step 1: Input bB′.

    Step 2: Compute λB′= Cd(bB′⊕ SB1) and SB= λB′SB2. If dis(bB, bB′) ≤ t, λB= λB′, and SB= λB′SB2=

    Step 3: Compute r = e(T, SB).

    Step 4: Compute m′ = c⊕ H3(r).

    Step 5: Compute h = H2(m′, r).

    Step 6: Accept m′ if r = e(S, H1(IDA)P+Ppub)g-h;otherwise, return ⊥.

    5. Security Analysis

    In this section, we prove that our IBBSC scheme is IND-CCA2 secure and EUF-CMA secure in the random oracle model by giving the following theorems.

    Theorem 1. The proposed IBBSC scheme is IND-CCA2 secure in the random oracle model to provide confidentiality.

    Proof. If an adversary A breaks IND-CCA2 in the proposed IBBSC scheme, an adversary A′ can be constructed to break IND-CCA2 in Barreto et al.’s IBSC scheme[9].

    · Setup: Given k and params, the challenger A′ picks H4, Ceand Cd. A′ sends k, params, H4, Ceand Cdto A.

    · Phase 1: The involved queries are constructed as follows.

    Extraction queries: A makes an extraction query on the biometric feature b′. A′ computes λ = H4(b′), makes an extraction query on private keys to its own extraction oracle,and forwards the answer to A.

    Signcryption queries: A makes a signcryption query with a plaintext m, a sender’s biometric feature bs, a sender’s identity IDs, and a receiver’s identity IDr. After A′gets bs, IDs, IDr, and m from A, A′ computes Ss1and Ss2in its own extraction oracle, computes σ = (c, S, T) with a signcryption query in its own signcryption oracle, and forwards σ to A.

    Unsigncryption queries: A makes an unsigncryption query with a ciphertext σ = (c, S, T), the sender’s identity IDs, the receiver’s biometric feature br, and the receiver’s identity IDr. A′ computes the receiver’s private keys Sr1and Sr2and makes an unsigncryption query on σ with Sr1, Sr2, br,and IDsin its own unsigncryption oracle. Then A′ forwards the result to A.

    · Challenge: A chooses two plaintexts m0and m1of the same size and the sender’s biometric feature bs*. A′ lets two plaintexts and bs*be its own challenge and gets σ*= (c*, S*,T*). Then A′ forwards σ*to A.

    · Phase 2: A can make a polynomial bounded number of queries as in Phase 1 except that A can make neither an extraction query for the receiver’s private keys nor an unsigncryption query on σ*to get the plaintext.

    · Guess: Both of A and A′ produces a bit μ′simultaneously.

    By the above simulation, if A can correctly guess the signcrypted message, A′ can do it as well. The proposed IBBSC scheme is as IND-CCA2 secure as Barreto et al.’s IBSC scheme in the random oracle model.

    Theorem 2. The proposed IBBSC scheme is EUF-CMA secure in the random oracle model to provide unforgeability.

    Proof. If an adversary A breaks EUF-CMA in the proposed IBBSC scheme, an adversary A′ can be constructed to break EUF-CMA in Barreto et al.’s IBSC scheme.

    · Setup: Given k and params, the challenger A′ picks H4, Ce, and Cd. A′ sends k, params, H4, Ceand Cdto A.

    · Attack: The involved queries are constructed as follows.

    Extraction queries: A makes an extraction query on the biometric feature b′. A′ computes λ = H4(b′), makes an extraction query on private keys to its own extraction oracle,and forwards the answer to A.

    Signcryption queries: A makes a signcryption query with a plaintext m, a sender’s biometric feature bs, a sender’s identity IDs, and a receiver’s identity IDr. After A′gets bs, IDs, IDr, and m from A, A′ computes Ss1and Ss2in its own extraction oracle, computes σ = (c, S, T) by making a signcryption query in its own signcryption oracle, and forwards σ to A.

    Unsigncryption queries: A makes an unsigncryption query with a ciphertext σ = (c, S, T), the sender’s identity IDs, the receiver’s biometric feature br, and the receiver’s identity IDr. A′ computes the receiver’s private keys Sr1and Sr2and makes an unsigncryption query on σ with Sr1, Sr2, br,and IDsin its own unsigncryption oracle. If σ is a valid signature, the message m is forwarded to A; otherwise, ⊥ is forwarded to A.

    · Forgery: A produces a new quadruple (σ*, br*, IDr*,IDs*) while A can neither make a signcryption query nor make an extraction query for the sender’s private keys. A′computes Sr1*and Sr2*in its own extraction oracle and forwards them to A. A makes an unsigncryption query. If Unsigncrypt(σ*, Sr1*, Sr2*, br*, IDs*) is ⊥, A fails to forge a valid signature.

    By the above simulation, if A can forge a valid signature, A′ can do it as well. The proposed IBBSC scheme is as EUF-CMA secure as Barreto et al.’s scheme in the random oracle model.

    6. Conclusions

    In this paper, we propose an IBBSC scheme. In the proposed scheme, biometric features do not need to be transmitted to other participants such that user personal information can be protected from being misused.Moreover, adopting biometrics makes the proposed scheme preserve uniqueness because users need to input personal biometric features to generate valid signatures or verify received signatures. We also prove that our proposed scheme provides confidentiality and unforgeability in the random oracle such that it is IND-CCA2 and EUF-CMA secure. Because of the mentioned properties, it is believed that the proposed scheme can provide secure message transfer for users who are concerned about security and personal privacy.

    [1] A. Shamir, “Identity-based cryptosystem and signature scheme,” in Advances in Cryptology-CRYPTO’84, LNCS, G.R. Blakley and D. Chaum, Ed. Berlin: Springer-Verlag, 1985,pp. 47-53.

    [2] M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” in Advances in Cryptology-EUROCRYPT’04, LNCS, C.Cachin and J. L. Camenisch, Ed. Berlin: Springer-Verlag,2004, pp. 268-286.

    [3] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairings,” in Advances in Cryptology-CRYPTO 2001, LNCS, J. Kilian, Ed. Berlin: Springer-Verlag, 2001,pp. 213-229.

    [4] K. G. Paterson, “ID-based signatures from pairings on elliptic curves,” Electronics Letters, vol. 38, no. 18, pp.1025-1026, 2002.

    [5] Y. Zheng, “Digital signcryption or how to achieve cost(signature & encryption) << cost (signature) + cost(encryption),” in Advances in Cryptology-CRYPTO’97,LNCS, B. S. Kaliski Jr. Ed. Berlin: Springer-Verlag, 1997,pp. 165-179.

    [6] J. Malone-Lee. Identity based signcryption. [Online].Available: http://www.signcryption.org/publications/pdffiles/MaloneLee-eprint2002-098.pdf

    [7] B. Libert and J. J. Quisquator, “A new identity based signcryption scheme from pairings,” in Proc. of 2003 IEEE Information Theory Workshop Conf., Paris, 2003, pp.155-158.

    [8] L. Chen and J. Malone-Lee, “Improve identity-based signcryption,” in Public Key Cryptography-PKC 2005,LNCS, S. Vaudenay, Ed. Berlin: Springer-Verlag, 2005, pp.362-379.

    [9] P. S. L. M. Barreto, B. Libert, N. McCullagh, and J. J.Quisquater, “Efficient and provably-secure identity based signatures and signcryption from bilinear maps,” in Advances in Cryptology-ASIACRYPT 2005, LNCS, B. Roy,Ed. Berlin: Springer-Verlag, 2005, pp. 515-532.

    [10] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Advances in Cryptology-EUROCRYPT 2004,LNCS, C. Cachin and J. L. Camenisch, Ed. Berlin:Springer-Verlag, 2004, pp. 523-540.

    [11] R. Alvarez Marino, F. Hernandez Alvarez, and L. Hernandez Encinas, “A crypto-biometric scheme based on iris-templates with fuzzy extractors,” Information Sciences,vol. 195, pp. 91-102, Jul. 2012.

    [12] F. Li and M. K. Khan, “A biometric identity-based signcryption scheme,” Future Generation Computer Systems,vol. 28, no. 1, pp. 306-310, Jan. 2012.

    [13] A. Burnett, F. Byrne, T. Dowling, and A. Duffy, “A biometric identity based signature scheme,” Int. Journal of Network Security, vol. 5, no. 3, pp. 317-326, 2007.

    久久久久久久大尺度免费视频| 久久久久精品人妻al黑| 99国产精品一区二区蜜桃av | 宅男免费午夜| 1024视频免费在线观看| av天堂久久9| 曰老女人黄片| 欧美97在线视频| 亚洲av日韩精品久久久久久密| 欧美亚洲 丝袜 人妻 在线| 国产成人欧美在线观看 | 看免费av毛片| 国产欧美日韩一区二区三区在线| 久久久国产精品麻豆| 后天国语完整版免费观看| 免费久久久久久久精品成人欧美视频| 欧美精品啪啪一区二区三区 | 别揉我奶头~嗯~啊~动态视频 | 女性生殖器流出的白浆| 亚洲伊人久久精品综合| 国产99久久九九免费精品| 动漫黄色视频在线观看| 国产伦理片在线播放av一区| 亚洲熟女精品中文字幕| 热re99久久国产66热| 在线亚洲精品国产二区图片欧美| 午夜福利免费观看在线| 99久久国产精品久久久| 精品高清国产在线一区| 新久久久久国产一级毛片| 女人久久www免费人成看片| 久久香蕉激情| 亚洲av成人一区二区三| 在线亚洲精品国产二区图片欧美| 一个人免费在线观看的高清视频 | 性色av一级| 1024香蕉在线观看| 国产av又大| 中国国产av一级| 亚洲专区国产一区二区| 两个人免费观看高清视频| 国产成人精品久久二区二区91| 日韩大片免费观看网站| 国产精品久久久久久精品电影小说| 久久国产精品男人的天堂亚洲| 肉色欧美久久久久久久蜜桃| 各种免费的搞黄视频| 一本久久精品| 久久精品熟女亚洲av麻豆精品| 性色av乱码一区二区三区2| 在线av久久热| 欧美性长视频在线观看| 日韩 欧美 亚洲 中文字幕| 亚洲七黄色美女视频| 一本色道久久久久久精品综合| 一本久久精品| 男人添女人高潮全过程视频| 18在线观看网站| 欧美精品av麻豆av| 蜜桃国产av成人99| 午夜福利在线免费观看网站| 操出白浆在线播放| 久久国产亚洲av麻豆专区| 纯流量卡能插随身wifi吗| www.av在线官网国产| 午夜精品久久久久久毛片777| 精品国内亚洲2022精品成人 | 久久精品国产综合久久久| 日韩欧美国产一区二区入口| 亚洲欧美一区二区三区黑人| 正在播放国产对白刺激| 少妇粗大呻吟视频| 大陆偷拍与自拍| av片东京热男人的天堂| 老司机在亚洲福利影院| 99re6热这里在线精品视频| 18禁黄网站禁片午夜丰满| av在线播放精品| 999久久久国产精品视频| 五月开心婷婷网| 国产麻豆69| netflix在线观看网站| 亚洲少妇的诱惑av| 男女之事视频高清在线观看| 国产男人的电影天堂91| 水蜜桃什么品种好| www.999成人在线观看| 亚洲天堂av无毛| 亚洲色图综合在线观看| 日韩制服丝袜自拍偷拍| 人成视频在线观看免费观看| 黑人欧美特级aaaaaa片| 黑人巨大精品欧美一区二区蜜桃| 99国产精品一区二区蜜桃av | 中文精品一卡2卡3卡4更新| 老司机影院成人| av欧美777| 这个男人来自地球电影免费观看| 久久99热这里只频精品6学生| 久久久久久人人人人人| 91成年电影在线观看| 老司机午夜十八禁免费视频| 真人做人爱边吃奶动态| 韩国高清视频一区二区三区| 另类亚洲欧美激情| 亚洲国产精品一区二区三区在线| 日本一区二区免费在线视频| 午夜成年电影在线免费观看| 美国免费a级毛片| 欧美日韩亚洲高清精品| 日韩欧美一区视频在线观看| 国产成人系列免费观看| 欧美中文综合在线视频| 午夜久久久在线观看| 老司机午夜福利在线观看视频 | 一级片免费观看大全| 亚洲 国产 在线| 精品人妻一区二区三区麻豆| 中文字幕人妻丝袜一区二区| cao死你这个sao货| 99久久精品国产亚洲精品| 亚洲精品久久午夜乱码| 狂野欧美激情性bbbbbb| 精品亚洲成a人片在线观看| 一二三四社区在线视频社区8| 一区在线观看完整版| 精品高清国产在线一区| 80岁老熟妇乱子伦牲交| 99久久国产精品久久久| 亚洲精品一卡2卡三卡4卡5卡 | 2018国产大陆天天弄谢| 免费在线观看影片大全网站| 51午夜福利影视在线观看| 夫妻午夜视频| 国产高清视频在线播放一区 | 国产精品1区2区在线观看. | 丝袜喷水一区| 欧美精品一区二区免费开放| 欧美 亚洲 国产 日韩一| 久热这里只有精品99| 国产黄频视频在线观看| 99国产精品99久久久久| 人妻 亚洲 视频| 国产精品偷伦视频观看了| 国精品久久久久久国模美| 女人高潮潮喷娇喘18禁视频| 亚洲激情五月婷婷啪啪| 亚洲精品av麻豆狂野| 午夜福利视频在线观看免费| 亚洲av欧美aⅴ国产| 久久综合国产亚洲精品| 日韩制服丝袜自拍偷拍| 这个男人来自地球电影免费观看| 中文字幕av电影在线播放| 亚洲国产毛片av蜜桃av| 国产黄色免费在线视频| 在线观看舔阴道视频| 日韩精品免费视频一区二区三区| 成年人黄色毛片网站| 日日夜夜操网爽| 妹子高潮喷水视频| 午夜福利,免费看| 满18在线观看网站| 他把我摸到了高潮在线观看 | 午夜福利在线免费观看网站| 中文字幕人妻熟女乱码| 男男h啪啪无遮挡| 国产亚洲精品第一综合不卡| 国产精品自产拍在线观看55亚洲 | 18禁国产床啪视频网站| 一级片免费观看大全| av网站在线播放免费| 下体分泌物呈黄色| 在线观看免费视频网站a站| 精品免费久久久久久久清纯 | 女性生殖器流出的白浆| 国产精品秋霞免费鲁丝片| 9191精品国产免费久久| 亚洲av成人不卡在线观看播放网 | 王馨瑶露胸无遮挡在线观看| 97在线人人人人妻| 国产av精品麻豆| 久久久久视频综合| 9热在线视频观看99| 欧美午夜高清在线| 大香蕉久久成人网| 天堂8中文在线网| 一区二区三区激情视频| 亚洲,欧美精品.| 免费人妻精品一区二区三区视频| 亚洲av电影在线观看一区二区三区| 国产精品国产三级国产专区5o| 久久中文看片网| 亚洲一区二区三区欧美精品| 国产亚洲午夜精品一区二区久久| h视频一区二区三区| 桃红色精品国产亚洲av| 免费在线观看视频国产中文字幕亚洲 | 中国美女看黄片| 国产成人免费无遮挡视频| 免费少妇av软件| 欧美成狂野欧美在线观看| 一本大道久久a久久精品| 亚洲视频免费观看视频| 亚洲国产av新网站| 久久久久久免费高清国产稀缺| 俄罗斯特黄特色一大片| 黄色怎么调成土黄色| 国产精品麻豆人妻色哟哟久久| 汤姆久久久久久久影院中文字幕| 在线十欧美十亚洲十日本专区| 99精品欧美一区二区三区四区| 国产精品亚洲av一区麻豆| 久久久精品区二区三区| 欧美精品一区二区大全| 99九九在线精品视频| 亚洲成人国产一区在线观看| 亚洲avbb在线观看| 亚洲av成人不卡在线观看播放网 | 在线亚洲精品国产二区图片欧美| 亚洲精品久久久久久婷婷小说| 久久精品国产综合久久久| 国产一卡二卡三卡精品| 久久久国产一区二区| 久久久久久久大尺度免费视频| 人成视频在线观看免费观看| 国产成+人综合+亚洲专区| a级片在线免费高清观看视频| av片东京热男人的天堂| 欧美 日韩 精品 国产| 纵有疾风起免费观看全集完整版| netflix在线观看网站| 久久中文看片网| 日韩中文字幕视频在线看片| 亚洲精品国产区一区二| 18在线观看网站| 高清欧美精品videossex| 美女高潮喷水抽搐中文字幕| √禁漫天堂资源中文www| av线在线观看网站| 久9热在线精品视频| 曰老女人黄片| 天堂中文最新版在线下载| 久久99热这里只频精品6学生| 国产精品香港三级国产av潘金莲| 成人国语在线视频| 黑人巨大精品欧美一区二区蜜桃| 麻豆国产av国片精品| 欧美日韩av久久| 亚洲人成77777在线视频| 精品第一国产精品| 精品人妻在线不人妻| 操美女的视频在线观看| 好男人电影高清在线观看| 麻豆av在线久日| av电影中文网址| 亚洲国产日韩一区二区| 青春草亚洲视频在线观看| 波多野结衣av一区二区av| 波多野结衣一区麻豆| 欧美日韩精品网址| 国产成人精品久久二区二区91| 男男h啪啪无遮挡| 黄片小视频在线播放| 久久久久视频综合| 日本五十路高清| 男人操女人黄网站| 亚洲欧美精品综合一区二区三区| 亚洲欧美精品自产自拍| 夜夜骑夜夜射夜夜干| 精品人妻熟女毛片av久久网站| 国产亚洲欧美精品永久| tube8黄色片| 欧美成狂野欧美在线观看| 国产1区2区3区精品| 精品亚洲成a人片在线观看| 日韩欧美免费精品| 99久久99久久久精品蜜桃| 日本精品一区二区三区蜜桃| 亚洲精品国产色婷婷电影| 在线观看一区二区三区激情| 日本wwww免费看| 动漫黄色视频在线观看| 亚洲人成电影观看| 99热全是精品| 18在线观看网站| 色老头精品视频在线观看| 亚洲性夜色夜夜综合| 国产99久久九九免费精品| 国产又色又爽无遮挡免| svipshipincom国产片| 日本91视频免费播放| 最黄视频免费看| 国产精品国产三级国产专区5o| 69av精品久久久久久 | 精品人妻1区二区| 久久久国产成人免费| 国产精品国产三级国产专区5o| cao死你这个sao货| 美女国产高潮福利片在线看| 大型av网站在线播放| 99九九在线精品视频| 国产精品九九99| 久久热在线av| 国产精品国产av在线观看| 狂野欧美激情性xxxx| 丝瓜视频免费看黄片| 麻豆国产av国片精品| 黄网站色视频无遮挡免费观看| 亚洲国产欧美一区二区综合| 亚洲午夜精品一区,二区,三区| 丝袜美腿诱惑在线| 亚洲精品国产av成人精品| 国产精品九九99| 人人妻人人添人人爽欧美一区卜| 人妻一区二区av| 精品一区在线观看国产| 欧美午夜高清在线| 亚洲欧洲日产国产| 久久精品aⅴ一区二区三区四区| 十分钟在线观看高清视频www| 91字幕亚洲| 黄片大片在线免费观看| 性色av一级| 欧美亚洲 丝袜 人妻 在线| 狂野欧美激情性bbbbbb| 久久精品成人免费网站| 一边摸一边做爽爽视频免费| 久久久久国内视频| 国产精品一区二区精品视频观看| 亚洲黑人精品在线| 一二三四在线观看免费中文在| 日本a在线网址| 一区二区三区乱码不卡18| 视频区欧美日本亚洲| 日日夜夜操网爽| 99re6热这里在线精品视频| 亚洲av电影在线观看一区二区三区| 久热这里只有精品99| 欧美日韩亚洲国产一区二区在线观看 | 久久久国产一区二区| 国产成人系列免费观看| 午夜激情久久久久久久| 一区福利在线观看| √禁漫天堂资源中文www| 在线观看免费视频网站a站| 老司机福利观看| 免费黄频网站在线观看国产| 操美女的视频在线观看| tube8黄色片| 亚洲成国产人片在线观看| 亚洲少妇的诱惑av| 少妇的丰满在线观看| 一个人免费看片子| 成人国语在线视频| 精品国产一区二区三区四区第35| 亚洲精品国产一区二区精华液| 国产日韩欧美在线精品| 大片电影免费在线观看免费| 久久精品国产亚洲av香蕉五月 | 各种免费的搞黄视频| 免费黄频网站在线观看国产| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲第一av免费看| 美女扒开内裤让男人捅视频| 大码成人一级视频| 日韩视频在线欧美| av网站在线播放免费| 精品国产一区二区三区四区第35| 亚洲欧洲日产国产| 欧美老熟妇乱子伦牲交| 国产一区二区 视频在线| 黄片小视频在线播放| 丰满迷人的少妇在线观看| 免费在线观看完整版高清| 国产精品一区二区免费欧美 | 日韩免费高清中文字幕av| 大陆偷拍与自拍| 天天躁日日躁夜夜躁夜夜| 亚洲性夜色夜夜综合| 搡老熟女国产l中国老女人| 国产精品av久久久久免费| 99九九在线精品视频| 美女脱内裤让男人舔精品视频| 国产亚洲精品一区二区www | 人人妻人人澡人人爽人人夜夜| 大片免费播放器 马上看| 国产一区二区三区在线臀色熟女 | 日韩大码丰满熟妇| 热re99久久精品国产66热6| 亚洲色图 男人天堂 中文字幕| 丝袜在线中文字幕| 国产精品秋霞免费鲁丝片| 精品亚洲乱码少妇综合久久| 精品久久蜜臀av无| 考比视频在线观看| 久久人人爽av亚洲精品天堂| 亚洲精品粉嫩美女一区| 天天躁日日躁夜夜躁夜夜| 免费女性裸体啪啪无遮挡网站| 国产精品熟女久久久久浪| 99国产精品一区二区蜜桃av | 99国产精品一区二区三区| 男女免费视频国产| 下体分泌物呈黄色| 在线观看免费日韩欧美大片| 久久久久久久国产电影| 性少妇av在线| 午夜影院在线不卡| av一本久久久久| 亚洲精品一二三| 91老司机精品| 午夜福利免费观看在线| av不卡在线播放| 大型av网站在线播放| 狂野欧美激情性bbbbbb| 制服诱惑二区| 韩国精品一区二区三区| 爱豆传媒免费全集在线观看| 日韩精品免费视频一区二区三区| 精品一区在线观看国产| 午夜福利乱码中文字幕| 在线av久久热| 国产精品99久久99久久久不卡| 国产精品一二三区在线看| 国产成人精品在线电影| 国产精品一区二区免费欧美 | 午夜精品久久久久久毛片777| 黄色视频在线播放观看不卡| 国内毛片毛片毛片毛片毛片| 久久 成人 亚洲| 国产一卡二卡三卡精品| 免费久久久久久久精品成人欧美视频| 女人高潮潮喷娇喘18禁视频| 99香蕉大伊视频| 精品国产超薄肉色丝袜足j| 亚洲av国产av综合av卡| 老熟妇乱子伦视频在线观看 | 欧美一级毛片孕妇| 亚洲熟女毛片儿| 精品亚洲成a人片在线观看| 欧美日韩福利视频一区二区| 91老司机精品| 亚洲精品一卡2卡三卡4卡5卡 | 老司机午夜十八禁免费视频| 天天躁夜夜躁狠狠躁躁| 99香蕉大伊视频| 久久久久久久大尺度免费视频| 最黄视频免费看| 国产成人欧美| 亚洲五月婷婷丁香| av免费在线观看网站| 亚洲成人免费av在线播放| 国产av精品麻豆| 黄色毛片三级朝国网站| av有码第一页| 久久 成人 亚洲| 宅男免费午夜| 男女高潮啪啪啪动态图| 久久精品熟女亚洲av麻豆精品| 女人精品久久久久毛片| 老熟女久久久| 一进一出抽搐动态| 狠狠精品人妻久久久久久综合| 制服诱惑二区| 啦啦啦啦在线视频资源| 男女边摸边吃奶| 亚洲欧美精品综合一区二区三区| 天天操日日干夜夜撸| 国产成+人综合+亚洲专区| 大香蕉久久网| 黄色a级毛片大全视频| 午夜福利一区二区在线看| 亚洲第一欧美日韩一区二区三区 | 黄色毛片三级朝国网站| 久久av网站| 欧美国产精品一级二级三级| 久久精品熟女亚洲av麻豆精品| 老司机午夜十八禁免费视频| 韩国高清视频一区二区三区| 交换朋友夫妻互换小说| 在线 av 中文字幕| 叶爱在线成人免费视频播放| 午夜福利视频精品| 精品人妻熟女毛片av久久网站| 黄色a级毛片大全视频| 日韩欧美一区视频在线观看| 18禁裸乳无遮挡动漫免费视频| 乱人伦中国视频| av福利片在线| 亚洲精品国产区一区二| 精品国产乱码久久久久久小说| 天天躁狠狠躁夜夜躁狠狠躁| 国产人伦9x9x在线观看| 性高湖久久久久久久久免费观看| 五月天丁香电影| 国产色视频综合| 新久久久久国产一级毛片| 丰满人妻熟妇乱又伦精品不卡| 19禁男女啪啪无遮挡网站| 免费在线观看视频国产中文字幕亚洲 | 国产99久久九九免费精品| 香蕉丝袜av| 亚洲欧美日韩另类电影网站| 日韩制服骚丝袜av| 久久毛片免费看一区二区三区| 91精品国产国语对白视频| 国产成人精品久久二区二区91| 999久久久精品免费观看国产| av片东京热男人的天堂| 1024香蕉在线观看| 午夜91福利影院| 亚洲精华国产精华精| 久久久久久久大尺度免费视频| 精品欧美一区二区三区在线| 91精品三级在线观看| 欧美人与性动交α欧美软件| 中文欧美无线码| 在线观看人妻少妇| 91大片在线观看| 岛国毛片在线播放| 男人爽女人下面视频在线观看| 麻豆国产av国片精品| 在线观看一区二区三区激情| 精品少妇久久久久久888优播| 狠狠婷婷综合久久久久久88av| 国产精品一二三区在线看| 夜夜夜夜夜久久久久| 国产一卡二卡三卡精品| 精品久久久精品久久久| 最近最新中文字幕大全免费视频| 免费在线观看视频国产中文字幕亚洲 | e午夜精品久久久久久久| 亚洲伊人色综图| 精品一区二区三区四区五区乱码| 黑人巨大精品欧美一区二区蜜桃| 亚洲伊人久久精品综合| 无遮挡黄片免费观看| 91麻豆av在线| 国产主播在线观看一区二区| 一级毛片电影观看| 国产欧美日韩一区二区三 | 777米奇影视久久| 国产精品香港三级国产av潘金莲| 国产精品欧美亚洲77777| 在线永久观看黄色视频| 国产高清videossex| 一本一本久久a久久精品综合妖精| 丰满迷人的少妇在线观看| 精品人妻熟女毛片av久久网站| 日日夜夜操网爽| 国产av精品麻豆| 欧美国产精品va在线观看不卡| 交换朋友夫妻互换小说| 高清欧美精品videossex| 亚洲国产成人一精品久久久| 国产av又大| 嫩草影视91久久| 最新在线观看一区二区三区| 午夜福利视频在线观看免费| 狂野欧美激情性xxxx| 午夜福利乱码中文字幕| 丰满迷人的少妇在线观看| 黄色视频不卡| 9191精品国产免费久久| 亚洲七黄色美女视频| 国产精品一区二区精品视频观看| 国产精品偷伦视频观看了| 12—13女人毛片做爰片一| 亚洲国产av新网站| 亚洲第一av免费看| 亚洲精品国产色婷婷电影| 日本黄色日本黄色录像| 中文字幕高清在线视频| 国内毛片毛片毛片毛片毛片| 欧美日韩精品网址| 国产一区二区三区av在线| 久久人人97超碰香蕉20202| 午夜老司机福利片| 久久国产精品男人的天堂亚洲| 国产片内射在线| 日韩,欧美,国产一区二区三区| 在线观看舔阴道视频| 男女下面插进去视频免费观看| 午夜两性在线视频| 国产欧美日韩综合在线一区二区| 亚洲伊人色综图| 亚洲avbb在线观看| 深夜精品福利| 真人做人爱边吃奶动态| 狠狠婷婷综合久久久久久88av| 少妇 在线观看| 中文字幕人妻熟女乱码| 精品亚洲成国产av| 国产片内射在线| 亚洲精品国产精品久久久不卡| 亚洲va日本ⅴa欧美va伊人久久 | 777米奇影视久久| 宅男免费午夜| 日日爽夜夜爽网站| 性色av乱码一区二区三区2| 97精品久久久久久久久久精品| 香蕉国产在线看| 97在线人人人人妻| 国产亚洲午夜精品一区二区久久| 久久中文看片网| 午夜福利视频精品| 国产福利在线免费观看视频| 一区二区三区激情视频| 三级毛片av免费| 国产精品香港三级国产av潘金莲| 久久人人爽av亚洲精品天堂| 国产成人精品在线电影| 色老头精品视频在线观看| 嫁个100分男人电影在线观看|