• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Server-aided access control for cloud computing

    2016-11-15 09:38:08WENGJianWENGJiasiLIUJiananHOULin

    WENG Jian, WENG Jia-si, LIU Jia-nan, HOU Lin

    (College of Information Science and Technology, Jinan University, Guangzhou 510632, China)

    stores

    5)

    Server-aided access control for cloud computing

    WENG Jian, WENG Jia-si, LIU Jia-nan, HOU Lin

    (College of Information Science and Technology, Jinan University, Guangzhou 510632, China)

    With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control (SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption (CPRE) named threshold conditional proxy re-encryption (TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts (satisfying some specified conditions) for the delegator (while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.

    threshold conditional proxy re-encryption, server-aided access control, cloud computing, chosen-ciphertext attack

    1 Introduction

    Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet while hiding platform and implementation details. Nowadays,many users transparently rely on outsourced storage solutions based on the cloud model, e.g., by using Dropbox and Google Docs. Unfortunately, in order to effectively protect the secrecy of their data, such users can only encrypt them locally and then upload the ciphertext to the cloud storage repository. However, if they use traditional public key encryption schemes, some shortcomings may heavily condition the sharing of such data with other authorized users. For example, suppose Alice wants to share her private data with Bob, then she has to first download the ciphertexts from the cloud, decrypt them locally with her own secret key, encrypt again the data by using Bob's public key, and finally upload the new ciphertext to the cloud. Then Bob can access the data with his secret key. However, such a solution is highly unsatisfactory, since it introduces heavy computational cost and communication overhead and does not scale well when data must be shared with a significant number of other users.

    Fortunately, the cryptographic primitive of proxy re-encryption (PRE)[1], which enables a proxy to transform a ciphertext under a delegator's public key into anothr ciphertext under the delegatee's public key, without learning anything about the content of the encrypted message, can be used to efficiently address this problem. Specifically, in the above storage outsourcing scenario, Alice uses a PRE scheme to encrypt her data and then upload the ciphertext to the cloud. When she wants to share the data with Bob, she can simply give a re-encryption key to a proxy in the cloud, and then the latter canefficiently transform these ciphertexts into the ciphertexts intended for Bob, who can then decrypt the ciphertext to obtain the plaintext data with his own secret key.

    Nevertheless, there still exist some problems which are hard to be tackled with a traditional PRE scheme. Let us take the above cloud-based storage application as an example again. Suppose some of Alice's data are highly sensitive, and she wants to decrypt these ciphertexts only by herself. Unfortunately, in the above scenario, with the re-encryption key, the proxy can transform all of Alice's ciphertexts, including the highly sensitive ones, and thus also Bob can decrypt them by autonomously obtaining these particular contents. To address this problem, conditional proxy re-encryption (CPRE)was introduced in Refs.[2,3]. In a CPRE scheme,generated ciphertexts associated with a certain condition, and the proxy can translate only those ciphertexts satisfying the specified condition. In the above cloud- based scenario, by relying on CPRE,Alice becomes able to control the proxy to transform only non-highly-sensitive ciphertexts.

    Although CPRE enables the delegator to implement fine-grained delegation of decryption rights for securing information sharing, it suffers from two limitations. The first is that CPRE cannot guarantee the correctness of the transformation done by the proxy. This is indeed a challenge for the applicability of the proxy re-encryption technology in cloud storage services. For example, in the typical pay-per-use model characterizing cloud computing services, the proxy charges the customer (e.g., Alice)for the transformation efforts. Thus, for saving time and reducing the computational cost, the proxy might simply return ciphertexts which are not really generated by using the re-encryption algorithm. Unfortunately, existing CPRE solutions do not allow the users to check for such a malicious behavior of the proxy. The second is that common CPRE architectures only involve a single proxy. This inevitably faces with the single point of failure problem: if the proxy is out of service, the delegatees lose their ability to access the data. Thus, new solutions are needed to deal with these CPRE problems.

    To address the above limitations, we propose a server-aided access control system, namely the SAAC system. The SAAC system is built upon a variant of CPRE primitive, named threshold conditional proxy re-encryption (TCPRE) primitive. The ciphertext in TCPRE is associated with a specified condition, and the proxies can only successfully transform those ciphertexts satisfying the specified condition. But unlike CPRE, TCPRE involves a number n of proxies and t out of n proxies can successfully transform ciphertexts, while up to t-1 proxies cannot. In addition, the correctness of the transformation done by each proxy can be publicly verified.

    We formalize the TCPRE primitive and define the chosen-ciphertext security of TCPRE with respect to two types of ciphertexts (i.e., original ciphertexts and transformed ciphertexts). We present three constructions of TCPRE in a ''gradual'' way. The first one is a CPRE scheme, that allows the owner of some data stored in a specific file, to share it through (conditionally) delegating decryption capability. The second construction, based on the first one, adds the support of threshold-based proxy re-encryption to address the single-point-of-failure limitation. The third construction (that is the final one) additionally embeds the capability of verifying the correctness of the re-encryption done by the access control servers, and achieves CCA security. We only provide security and performance analysis of the final construction, that is the most complete one.

    2 Preliminaries

    We briefly review some preliminaries by first summarizing the notations used in this work, andthen introducing the bilinear map technique, which serves as the foundation of the proposed approach.

    2.1 Notations

    We denotepZ as the set{0,1,2,, 1}p-… and Zas Zp{0}. For a finite setS,x ∈ S (or x ∈RS) means choosing an element x from S (with a uniform distribution). We define the Lagrange coefficientΔi,Sfor i∈ Zpand a set S of elements in Zp:. For a stringm,denotes its bit-length. For all stringsxand y, let ||x y denotes the concatenation ofxand y. A( x1, x2,…) denotes that A is an algorithm with the input( x1, x2,…) , an y= A (x1, x2,…) denotes the running of A (x1, x2,…)with the output y. For AO1(·),O2(·),…(x, x,…) , it 12 means that A is an algorithm with the input(x1, x2,…) and can access to the oracles O (·),O (·),…. By y= AO1(·),O2(·),…(x, x,…), we 1212 denote the running of AO1(·),O2(·),…(x, x,…)with the 12 output y.

    Besides, we briefly summarize the notations in Table 1 that will be used in the following.

    Table 1 Notations used in proposed system

    2.2 Bilinear Maps

    A Bilinear Map is a common tool used for designing cryptographic primitives. In this subsection,we give the definition of the bilinear map, which will be used in this paper.

    Definition 1 Bilinear Map

    DenoteG,TGas cyclic groups of prime order p, writing the group action multiplicatively. g is a generator of G. Let e: G × G → GTbe a map with the following properties.

    2) Non-degeneracy: There exists12,g g G∈ such thate ( g1, g2)≠ 1, in other words, the map does not send all pairs in G G× to the identity inTG.

    3) Efficiency: There exists an efficient polynomial time algorithm to compute the bilinear map

    3 System model

    3.1 The architecture

    As shown in Figure 1, we consider three types of entities in our access control system.

    Figure 1 Access control system architecture

    1) The Cloud, that is the entity providing outsourced storage facilities. It is in charge of controlling the accesses from outside users to the data,stored by using specific servers that provide the corresponding content delivery services. In this paper, we assume that the cloud storage service provider (S-CSP) is always online and has unlimited storage capacity.

    2) The users of the storage services, whose data are structured into files. For each file, we consider two types of users. The former is the owner, who decided to outsource his data into the cloud servers for storing and making them accessible in a controlled way. The latter one is the generic file user that, according to the permissions granted by theowner, want to access some of the outsourced data files by relying on specific access control servers.

    3) Multiple access control servers working as proxies and providing security services. More specifically, they transform the ''raw'' ciphertexts into ''selectively decryptable'' ones, so that only authorized users can decrypt them and then gain access to private contents.

    It is worthwhile noting that, this type of architecture has several advantages. ① it does not involve any computational process, being deployed according to a thin cloud paradigm, just providing the LIST, PUT and GET interfaces[4]. It also brings the benefits of portability and easy provider switching. ② Compared with the previous work[5], we introduce multiple access control servers, not only balancing the computational burden, but also removing the presence of single points of failure.

    3.2 System overview

    Next, we give an overview of the proposed access control system. There are three phases involving its activity.

    1) System setup. In this phase, the system parameters are initialized. Users are assigned their secret keys, and the access control servers are given the global private parameters.

    2) File outsourcing. When a file owner wants to outsource a file for storage, he/she encrypts and uploads the file to cloud.

    3) File access. When a file user wants to access an outsourced file, he/she firstly downloads the cipher text, requests access permission from file owner, and decrypts the cipher text with the help of access control servers.

    3.3 Threat model and security goal

    Based on the architecture proposed above, we have three threat assumptions. 1) The channels(connecting users to cloud and access control servers) can be public, and the data transferred by using these channels might be eavesdropped by outside attackers. 2) The cloud and access control servers are ''honest-but-curious''. They follow the proposed protocol, but try to extract as much secret information as possible. 3) Some users might be compromised. We note that, this threat model is stronger than the one already proposed in[5,6], which also considers the access control problem in cloud. More specifically, a fully trusted authority is assumed to exist in Refs.[6], becoming a single-point-of-failure if it is compromised, while we do not need to ''put all the eggs in a single basket''. In addition, the private key channel is assumed to be private in Refs.[6], but we do not need this assumption.

    The security goal considered in this paper is providing semantic security under chosen ciphertext attacks (SS-CCA). In other words, it requires that any useful information about the private data stored into files, cannot be extracted by attackers, even if they have chances to access one or more known ciphertexts/plaintexts into the system and obtain the resulting plaintexts. Thus, it differentiates from the previous works[5,6]which only achieve the same security goal for the (weaker) chosen plaintext attacks.

    4 System framework

    In order to realize the SAAC system, we introduce a new primitive, named threshold conditional proxy re-encryption (TCPRE). In what follows, we will present the formal definition of TCPRE and show how it is used to construct the SAAC system in section 3.

    4.1 Threshold conditional proxy re-encryption

    Before formalizing the definition for TCPRE,we first give a brief overview for TCPRE in the literature of proxy re-encryption. As with conditional proxy re-encryption, a TCPRE-based system runs the global setup algorithm Setup to generate the global parameters param, and each user runs the key generation algorithm KeyGen to generate his/her public/secret key pair. The ciphertext is also generated with respect to a specified condition by using the encryption algorithm Encrypt. Unlike CPRE, the user in TCPRE can designate a numbernof proxies.The user can generate n re-encryption key shares and verification key shares with the ReKeyGen algorithm. Each re-encryption key share is kept secret by a proxy, and all the verification key shares are made public. By running the ReEncShare algorithm,the proxy can generate a re-encryption share, whose validity can be publicly verified by the ShareVerify algorithm. With the ShareCombine algorithm, at least t valid re-encryption shares can be used to generate a valid transformed ciphertext, which can then be decrypted by the delegatee.

    Formally, a TCPRE scheme consists of the following algorithms.

    1) Setup(k): The global setup algorithm taking as input a security parameterk, and generating the global parameters param.

    2) KeyGen(param): The key generation algorithm taking as input the global parameters param,and generating user's public and secret key pair(pki, ski).

    3) ReKeyGen(ski, pkj,w, t, n): The re-encryption key generation algorithm taking as input the delegator's secret keyisk, a delegatee's public keyjpk, a conditionw, a threshold t and a numbernof proxies. It generates nshares of the re-encryption keysand verification keys

    4) Encrypt(pki, m, w): The encryption algorithm taking as input user's public keyipk, a messagemand a conditionw. It returns an original ciphertextict.

    Suppose a TCPRE scheme has been initialized asandThe correctness of TCPRE requires that, for any messagemand conditionw, the following equations hold

    We explain these equations below. Equation (1)defines the consistency of the original ciphertext. It requires that the ciphertext encrypted with the i-th user's public key must be decrypted by using his/her secret key. Equation (2) defines the verifiability on encryption share: the correctness of each re-encryption share computed from a ciphertext can be verified only by using its corresponding verification key share. Equation (3) defines the consistency of transformed ciphertext: the ciphertext transformed from original ciphertext can be decrypted by using the delegatee's secret key.

    4.2 Generic construction

    Based on the definition of TCPRE, we give a generic construction of our SAAC system. Note that in the generic construction, all the algorithms involved in TCPRE are used as black boxes, the realization of which will be explained later.

    1) System setup. In order to initialize the system, a security parameterkand the numbernof proxies are chosen. The global setup algorithmSetup( k) of TCPRE is run to produce the parameters param. For each user in the system, the key generation algorithm KeyGen( pa ram) of TCPRE is used to assign him/her a pair of public and private key(pki, ski). The secret key skimust be kept secret and the public keyipkcan be published.

    2) File outsourcing. Suppose that a file f is to be uploaded by the i-th user. This user randomly pick a symmetric keykto encrypt f. Then he/she runs the encryption algorithm Encrypt( pki, k, w)to compute the TCPRE ciphertextictofkin respect towwhich describes the condition with respect to f. Finally, the file ciphertext, key ciphertext, file identifier and the user identity are sent to cloud for storage.

    3) File access. Any user can use the LIST operation to list the names of files in the cloud. For each needed file owned by user i, the generic userjdownloads the key ciphertextictand file ciphertext. The user takes the identifier of this file to request access permission from the owner. The file owner (the i-th user) runs the re-encryption key generation algorithm ReKeyGen( ski, pkj,w, t, n )of TCPRE and responds with the set of re-encryption key sharesand verification key shares. Notice that the thresholdtshould be chosen flexibly by the file owner for reliability consideration.

    5 TCPRE constructions

    From Section 4, we have learn how to leverage TCPRE (as a black box) to build the SAAC system. In this section, we will get into the black box of TCPRE and present several constructions. For better understanding, we use an incremental approach by providing our constructions in a ''gradual'' way. Our first construction is just a Conditional Proxy Re-Encryption (CPRE) scheme. Our second construction, based on the first one, adds the support of threshold-based proxy re-encryption. Our third construction (the final, and more complete one) additionally embeds verifiability on the re-encryption shares, and achieves CCA security.

    5.1 First construction

    The first construction, related to CPRE facilities, is a special case of the more general definition of TCPRE presented in section 4.1. Specifically,here we fix the number of access control servers 1n= and the threshold value 1t= . Also, since we neither study verifiability nor allow multiple shares, the algorithms ShareVerify(·)and ShareCombine(·) are not considered.

    We give our first construction as follows.

    1) Setup( k ):Given a security parameterk, choose bilinear map groups(G, GT)of prime order 2kp> , and pick the generatorRg G∈ . In addition, define the hash functions. The global parameters are set to

    2) KeyGen( pa ram) :To generate a public and secret key pair for useri, the key generation algorithm picks, and setsand

    3) ReKeyGen( ski, pkj,w) :Starting from the delegator's secret keyisk, the delegatee's publickeyjpk and a conditionw, the re-encryption key generation algorithm randomly picksRZ α ∈and returns the re-encryption key

    ① If the input is an original ciphertext

    ② If the input is a transformed ciphertext, compute

    The correctness of this construction can be verified by computing.

    5.2 Second construction

    The second construction is based on the first one, but involves multiple access control servers for supporting threshold-based proxy re-encryption. The basic idea is to use Shamir's secret sharing[7]on the re-encryption key rkijto generate n re-encryption key shares. Each re-encryption key share is used by an access control server for proxy reencryption. At least t re-encryption shares are then collected and used for re-constructing the transformed ciphertext. We present the re-written ReKeyGen(·), ReEncShare(·) and the newly introduced ShareCombine(·) algorithms as follows.

    1) Re KeyGen( ski, pkj,w, t, n) :Such algorithm takes the following steps.

    ①For each index v ∈ S'where S'= {1,2,…,t- 1}, pick αv,βv∈RZand set the v-th re- encryption key share to be. This implicitly defines a polynomial

    ②For each remaining index {, 1,v t t∈ + t + 2,… ,n}, pick a random variable βv∈RZand set the v-th re-encryption key share to be

    ③Finally return the set of re-encryption key shares

    It finally returns the transformed ciphertext

    The correctness of this construction could be easily verified through equation (4) and equation (5). Thus it is omitted here.

    5.3 Final construction

    To achieve the goal of SS-CCA, we need to further embed the ''authentication code'' in ciphertext. This is because most (or maybe all) CCA attacks rely on the attackers' modifying the challenge ciphertext and then feeding it to the decryption oracle. The answer of the decryption oracle will enable the attacker to tell which message is encrypted. If an authentication code is put on top of the encryption,disallowing the attacker to fiddle with the ciphertext,then it essentially renders the decryption oracle useless. Following this intuition, we present the final construction for achieving CCA security (the KeyGen(·) is the same as in previous constructions, so it is omitted here).

    1) Setup( k ):The setup algorithm is identical to the same one presented in the first construction(see section 5.1) except that the hash functions in the global parameters param are initialized as:

    2) ReKeyGen( ski, pkj,w, t, n ):Unlike the algorithm with the same name, presented in the first two constructions, the re-encryption key generation algorithm returns a set of re-encryption key sharesand verification key shares. In detail, it performs the following steps.

    ①For each index v ∈ S'where S'= {1,2,…,t- 1}, pickαv,βv∈RZand set thev-th re-encryption key share to be. As in the previous construction, this way implicitly defines the polynomialMoreover, compute the verification key share

    ③ Finally output the set of re-encryption key sharesand verification key shares. Note that the validity of each re- encryption key sharecould be checked by verifying the equation

    3) Encrypt( pki, m, w) :The encryption algorithm takes input a plaintext, a public keyand a conditionw. It picksand computes. Finally returns, where

    ①Check the validity of the original ciphertextictby verifying the equations:. We note that ifictis a valid original ciphertext, the two equations above hold, since

    ③Finally output the v -th re-encryption share

    ①I(mǎi)f the input is an original ciphertext: check whether the equationsand hold (as in the validity checking in ReEncShare(·)algorithm). If both the conditions are positively verified computefollowing the same strategy of Decrypt(·), in the second construction. Further, check whetherholds. Finally returnm.

    ②If the input is a transformed ciphertext: computein the same way of Decrypt(·) in the second construction. Then check whetherholds. Finally return m.

    The consistency of original and transformed ciphertext could be easily checked in a similar way by using equation (4) and equation (5).

    6 Security analysis

    In this section we analyze the security of the SAAC solution proposed in section 4.2. In what follows, we at first model the capabilities of attackers against the SAAC system. Then, we formalize two security definitions, original ciphertext security (IND-oCCA) and transformed ciphertext security (IND-tCCA), associated to TCPRE. Finally we prove that the final TCPRE scheme presented in section 5.3 achieves both the security definitions.

    6.1 Threat capabilities

    We simplify the data flow of the proposed SAAC system as sketched in Figure 2. Notice that we omit the encrypted file content because it is protected by symmetric-key encryption, which is as-sumed to be secure if the symmetric encryption key is not leaked.

    Figure 2 Data flow in server-aided access control system

    Initially, the i -th user uploads the ciphertextictto cloud. Later, the j-th user downloads the ciphertextictand sends an access request to the owner (i.e., the i -th user). The file owner responds with a set of re-encryption keysthat would be forwarded along with the ciphertextictto the access control servers for re-encryption. After re-encryption by each access control server, the re-encryption shares are sent back to the j-th user for combination and decryption.

    We point out that these data including the original ciphertextict, the re-encryption key shareand the re-encryption share, are transferred by using public channels and hence can be eavesdropped by attackers. For analyzing semantic security, we model these leakages (as threat capabilities against our system) in the following oracles. Notice that since the original ciphertextictcan be easily computed by using the user's public key, we omit modeling it as an oracle.

    1) Re-encryption key share oracle. This oracle models the attackers' capabilities of eavesdropping the key shares on the channels from users to access control servers. Starting from the in-with 1 t n≤ ≤ and U?{1,2,,}n… this oracle runsand returnsand. Notice that the set Uhere models the set of channels from users to the access control servers eavesdropped by attackers.

    2) Re-encryption share oracle. This oracle models the attackers' capabilities of eavesdropping the shares on the channels from access control servers to the users. Starting from the inputswith t n≤ and V?{1,2,,}n… , this oracle runs. Also in this case, the set Vmodels the set of channels from access control servers to users eavesdropped by attackers.

    We further strengthen threat capabilities by considering corrupted users and CCA model and defune three oracles below.

    1) Uncorrupted key generation oracleThis oracle models the common users which can publish their public keys. With each useri, this oracle runs thealgorithm and obtains a public and secret key pair. Finally it returns the public keyipk.

    2) Corrupted key generation oracle. This oracle models the corrupted users which have been intruded by attackers. For each useri, this oracle runs thealgorithm and obtains a public and secret key pair. Finally return the

    6.2 Security definitions of TCPRE

    Based on the threat capabilities formalized in the previous subsection, we define the semantic security of TCPRE, which captures the spirit of indistinguishability of both original and transformed ciphertext. Formally, we respectively formalize the security notions asIND-oCCA (for the security of original ciphertext) and IND-tCCA(for the security of transformed ciphertext).

    The above security definitions are verified by using specific experiments involving an adversary A. The adversary runs infindandguessstages. We give the experimentfor IND-oCCA as follows.

    In theIND-oCCAexperiment, the ()Setup· algorithm is initially executed to generate the global parameters param. Next, A executes thefindstage. Specifically, it takes as its input the parameters param, accesses several oracles and returns the challenge messages01,m mas well asipkand*w. For these oracles, we have two requirements.

    1) For a public keyjpk generated fromuO, one of them would be selected asfor generating output. Further, if A has issued the queriesand*,,w twith, then A cannot issue the querysuch that, where n is the number of proxies and t is the threshold.

    2) For a public keyjpk generated fromcO, A cannot issue these queries, or,*,,w twith

    We define A's advantage in theIND oCCA-experimentas

    and formalize the IND oCCA- security as follows.

    Definition 2 IND oCCA- Security

    Similarly, we give the experimentfor IND tCCA- as follows.

    We define A's advantage in the IND tCCA-experiment

    and formalize the IND tCCA- security as follows.

    Definition 3 IND tCCA- Security

    A TCPRE scheme is said to be- secure, if for any t-time adversary A who asks at mostandqueries to oraclesandrespectively, we have

    6.3 Security proof of TCPRE

    We now turn to analyze the security of the final scheme presented in section 5.3 against Definition 2 and Definition 3. We firstly introduce a newcomputational problem, and show that it is equivalent to the weak Decisional Bilinear Diffie-Hellman Inversion (wDBDHI) problem investigated in[8]. Then, we prove that the final scheme is secure under the assumption that the newly introduced problem is intractable.

    We describe both assumptions as follows.

    Definition 4 q-wDBDHI Problem

    Definition 5 New Problem

    We present the following theorem to demonstrate the equivalence of the problem defined in Definition 5 and the q-wDBDHI problem.

    Theorem 1 The problem defined in Definition 5 is equivalent to the wDBDHI problem.

    Proof: Suppose there exists a q-wDBDHI problem solver S which can solve the q-wDBDHI problem in polynomial time. We then describe how to construct an algorithm leveraging S to solve the new problem introduced in Definition 5.

    For the inverse implication, we suppose the existence of a solver S for the problem formalized in Definition 5. We then describe how to use S to solve the q-wDBDHI problem.

    From Theorem 1, we can see that the introduced new problem is equivalent to the wDBDHI problem, for which the best known algorithm is to solve the standard Discrete Logarithm Problem(DLP)[9]. Thus we can present the following theorems (based on the intractability of the introduced problem) to demonstrate the IND-oCCA security of the final scheme in section 4.3.

    Theorem 2 The proposed final scheme in section 5.3 is IND-oCCAsecure in the random oracle model, assuming our introduced problem is intractable in groups

    Proof: Suppose that the algorithm B receives as input a challenge tuplewith unknownB's goal is to decide whether. For this purpose, algorithm B sets the parameters and plays the IND-oCCAexperiment with adversary A in the following way.

    In the IND-oCCAexperiment, B gives the global parameterstoA. Hereare the random oracles controlled by B and can be adaptively asked by A at any time. B maintains 4 hash listsiL for, which are initially empty. B respondsto the random oracle queries from A as follows.

    When operating in its find stage, A issues a series of queries as in the IND-oCCA experiment. B maintains listsand, which are initially empty.B answers these queries issued by A as follows.

    Case

    ReKeyGen(·). Then it stores the tupleinandin. Finally it returnsandto A.

    stores

    ① If there does not exist the tupleinorin, algorithm B first generates these re-encryption key shares and verification key shares.

    ② Search whether there exists a tuplesuch thatIf it does not, B generates a random bitand aborts.

    5)

    ① ctiis an original ciphertextsearch the list3L to see whether there exists a tuple (,')m r such thatandIf yes, return mtoA; otherwise B returns⊥.

    ②ictis a transformed ciphertext searchto see whether there exists a tuplein3L such that. If yes return mto A; otherwise return⊥.

    When A decides that the initial stage is over,it emits a target public keyand two equal-length messages. AlgorithmB responds as follows. ① Recover tuplefrom theskL and tuplefrom1L, where*i corresponds to the index i of. If, generate a random bitand abort. Otherwise, it meansthat. ② Flip a random coinand pick. Define. ③ Issue a query ofto oracleto obtain the tuple. Defineand finally giveto A. Note that in the above construction, ifis indeed a valid ciphertext forunderandOn the other hand, if Z is uniform and independent inTG , the challenge ciphertextis independent of δ in the adversary's view.

    A continues to issue the rest of queries, with the restrictions described in theIND-oCCA experiment. Algorithm B responds to these queries as in the initial stage. Eventually, adversary A returns a guesstoB. If, B outputs 1b= to guess; otherwise, B outputs 0b= to guess that Z is a random element in groups

    Theorem 3 The final scheme presented in Section 5.3 is IND-tCCA secure in the random oracle model, assuming the 1-wDBDHI problem is intractable in groups

    Proof: Suppose B is given as input a 1 -wDBDHI challenge tuplewith unknown. Algorithm B's goal is to decide whether. Algorithm B acts as challenger and plays the IND-tCCA game with adversaryA in the following way.

    In A's find stage, A issues a series of queries as in the IND-oCCA experiment. B maintains listsand, which are initially empty, and answer these queries for A as follows.

    When A decides that the initial stage is over, it outputs two public keys pkiand pk, a condition w*and two equal-length messagesAlgorithm B responds as follows. ① Recover tuplefrom Lsk. ② Flip a random coinand pick. ③ Define. ④ Finally, giveto A.

    Note that by the above construction, if,*ct is indeed a valid transformed ciphertext for mδunder pk. On the other hand, when Z is uniform and independent inTG , the challenge ciphertext*ct is independent of δ in the adversary's view.

    A continues to issue the rest of queries as in initial and find Stage, with the restrictions described in experimentIND tCCA- . Algorithm B responds to these queries as described above. Eventually, adversary A returns a guess δ'∈ {0,1} to B. If δ' = δ, B outputs 1 to guess; otherwise, B outputs 0 to guess that Z is a random element in groupTG.

    7 Performance analysis

    In this section, we at first analyze the computational complexity of the core scheme in SAAC, and then present an experimental simulation assesing its performance.

    During the system setup phase, the basic operating parameters are initialized. The main computation overhead for Initialization is introduced by the s modular exponentiations in G, needed for generating each user's public key, where s is the number of users in the system.

    The main computation overhead characterizing the filestorage operations, outsourced on the cloud,is the encryption of the file performed by using the symmetric-key encryption as well as the encryption of the symmetric encryption key involving TCPRE. The complexity of the former one depends on the size of the underlying file. The overhead for the latter consists of four modular exponentiations (in particular, three of them are in G while one is in GT).

    Regarding file access, most of the operations are carried out by the file owner, as well as by the requesting user and the involved access control servers. In particular, the file owner executes the ReKeyGen(·)algorithm to generate the re-encryption key share for each access control server, which represents 5n modular exponentiations inG ,where n is the number of access control servers involved; each access control server executes the ReEncrypt(·) algorithm to produce a re-encryption share, which costs 3 exponentiations inG, the requesting user combines at least t shares together to get the re-encrypted ciphertext for the involved file, and finally decrypts this ciphertext. The accessing user's computation overhead includes 2t bilinear pairings and t modular exponentiations in GTfor ShareCombine(·), and one modular exponentiation in GTfor Decrypt(·).

    We summarize the main computational overhead of our proposed SAAC in Table 2, whereGE andTGE respectively denote the modular exponentiation in G andTG , P denotes the bilinear pairing operation,1ξand2ξ respectively denote the computational complexity for encrypting and decrypting the file f, both of which depend on its size. Notice that in this analysis, we omit the additional computation needed for verifying the correctness of the original data stored in the file since it does not concern our specific access control framework.

    Table 2 Computational overhead in SAAC

    To be more clear on the overall efficiency of the proposed framework, we simulated its core scheme (in particular, the TCPRE scheme) according to the considerations reported in Table 2 The simulation, run on a Mac OS X laptop equipped with an 1.7 GHz Intel Core i7 processor and 8 GB 1 600 MHz DDR3 memory, uses the Pairing-Based Cryptography library[11]to implement both the users and access control servers activities. We did not consider time measurements for file encryption and decryption operations, since encrypting and decrypting files with symmetric-key encryption in anIND-CPA secure way was a well studied problem for which plenty of performance data was available. Furthermore, some clients may be equipped with highly specialized hardware for accelerating symmetric-key encryption operations.

    Figure 3(a) shows the simulated efficiency in terms of system setup in the cases of 10,30,50,70,90 and 100 users in system. We can observe that the elapsed time is limited by 250 ms even for the maximum number (i.e., 100in this case) of users. Regarding the outsourced file storage operations,we simulated the average cloud access time as 8.202 ms. Figure 3(b) describes the simulated efficiency for file access by varying the number n of access control servers and the threshold valuet. The total elapsed time is limited by 100 ms.

    8 Related work

    In 1997, Mambo and Okamoto[12]initially introduced the concept of delegation of decryption rights, as a better-performance alternative to the trivial approach of decrypting-then-encrypting of ciphertexts. In Eurocrypt'98, Blaze et al.[1]introduced the concept of proxy re-encryption, and presented the first bidirectional PRE scheme. Ateniese et al.[5]presented unidirectional PRE schemes that are secure against chosen-plaintext attacks (CPA).

    Figure 3 Time cost in simulation

    The first chosen-ciphertext secure bidirectional PRE schemes and unidirectional PRE scheme were proposed by Canetti et al.[14]and Libert et al.[14,15]respectively, and both schemes rely on the bilinear pairings. Deng et al.[16,17]proposed a CCA-secure bidirectional PRE scheme without pairings. Shao et al.[18]tried to propose a unidirectional PRE scheme without pairings that was improved later by Chow et al.[19]Subsequently, several bidirectional and unidirectional PRE schemes have been proposed in Refs.[20~23]. Proxy re-encryption has also been studied in identity-based scenarios, such as the Refs.[24~26].

    Several variants of PRE have also been proposed in the past few years. Libert et al.[27]introduced the notion of traceable proxy re-encryption,in which a proxy who leaks its re-encryption key can be identified by the delegator. Ateniese et al.[28]also introduced the concept of key-private proxyre-encryption, in which the anonymity of the sender and receiver's identities can be protected. In TCC'12,Chandran et al.[29]introduced the notion of functional re-encryption, which can transform an encryption of a message m under an ''input public key'' pk into an encryption of the same message m under one of the n ''output public keys'',namely the public key index by function ()F m. Conditional proxy re-encryption (CPRE) was introduced in Ref.[2,3]. In a CPRE scheme, ciphertexts are generated associated with a certain condition,and the proxy can translate those ciphertexts satisfying the specified condition.

    In this work, the core of the proposed SAAC system is the TCPRE scheme, which significantly improves the existing works[2,3]by quipping the capabilities of guaranteeing the correctness of transformations done by proxies.

    9 Conclusion

    Aiming at addressing the security and privacy issues in file outsourcing, we propose a server-aided access control system, namely SAAC. It is based on a new proxy re-encryption primitive, namely TCPRE. Compared with traditional CPRE, TCPRE enjoys two features: 1) TCPRE involves a number nof proxies where t out of n proxies can successfully re-encrypt ciphertexts, while up to t-1 proxies cannot; 2) The correctness of re-encryption done by each proxy can be publicly verified. We ''gradually'' provide three TCPRE constructions, and prove that the security of our final construction could be reduced to a new problem which is at least as strong as the wDBDHI problem. The performance of TCPRE construction has been analyzed as well, through simulation, by resulting in a limited overhead also in presence of a large number of users for each single outsourced file.

    References:

    [1] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]//The International Conference on the Theory and Applications of Cryptographic Techniques. Berlin Heidelberg,1998:127-144.

    [2] WENG J, DENG R H, DING X, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack[C]//The 4th International Symposium on Information, Computer, and Communications Security, ACM. 2009: 322-332.

    [3] TANG Q. Type-based proxy re-encryption and its construction[C]//The International Conference on Cryptology in India. 2008:130-144.

    [4] VRABLE M, SAVAGE S, VOELKER G M. Cumulus: filesystem backup to the cloud[J]. ACM Transactions on Storage (TOS), 2009,5(4): 14.

    [5] ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security(TISSEC), 2006, 9(1): 1-30.

    [6] LI J, CHEN X, LI J, et al. Fine-grained access control system based on outsourced attribute-based encryption[C]//European Symposium on Research in Computer Security. 2013: 592-609.

    [7] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.

    [8] BONEH D, BOYEN X, GOH E J. Hierarchical identity based encryption with constant size ciphertext[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005: 440-456.

    [9] Final report on main computational assumptions in cryptography[EB/OL]. http://www.ecrypt.eu.org/documents/D.MAYA.6.pdf,2013.

    [10] CORON J S. On the exact security of full domain hash[C]//Annual International Cryptology Conference. 2000: 229-235.

    [11] Pairing-based cryptography library[EB/OL]. http://crypto. stanford. edu/pbc/.

    [12] MAMBO M, OKAMOTO E. Proxy cryptosystems: delegation of the power to decrypt ciphertexts[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,1997, 80(1): 54-63.

    [13] CANETTI R, HOHENBERGER S. Chosen-ciphertext secure proxy re-encryption[C]//The 14th ACM conference on Computer and Communications Security. 2007: 185-194.

    [14] LIBERT B, VERGNAUD D. Unidirectional chosen-ciphertext secure proxy re-encryption[J]. IEEE Transactions on Information Theory, 2011, 57(3): 1786-1802.

    [15] LIBERT B, VERGNAUD D. Unidirectional chosen-ciphertext secure proxy re-encryption[C]//International Workshop on Public Key Cryptography. 2008: 360-379.

    [16] WENG J, DENG R H, LIU S, et al. Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings[J]. Information Sciences, 2010, 180(24): 5077-5089.

    [17] DENG R H, WENG J, LIU S, et al. Chosen-ciphertext secure proxy re-encryption without pairings[C]//International Conference on Cryptology and Network Security. 2008: 1-17.

    [18] SHAO J, CAO Z. CCA-secure proxy re-encryption without pairings[C]//International Workshop on Public Key Cryptography. 2009:357-376.

    [19] CHOW S S M, WENG J, YANG Y, et al. Efficient unidirectional proxy re-encryption[C]//International Conference on Cryptology in Africa. 2010: 316-332.

    [20] WENG J, ZHAO Y, HANAOKA G. On the security of a bidirectional proxy re-encryption scheme from PKC 2010[C]// International Workshop on Public Key Cryptography. 2011: 284-295.

    [21] HANAOKA G, KAWAI Y, KUNIHIRO N, et al. Generic construction of chosen ciphertext secure proxy re-encryption[C]// Cryptographers' Track at the RSA Conference. 2012: 349-364.

    [22] WENG J, CHEN M, YANG Y, et al. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. Science China Information Sciences, 2010, 53(3): 593-606.

    [23] MATSUDA T, NISHIMAKI R, TANAKA K. CCA proxy re-encryption without bilinear maps in the standard model[C]// International Workshop on Public Key Cryptography. 2010: 261-278.[24] GREEN M, ATENIESE G. Identity-based proxy re-encryption[C]// Applied Cryptography and Network Security. 2007: 288-306.

    [25] MATSUO T. Proxy re-encryption systems for identity-based encryption[C]//International Conference on Pairing-Based Cryptography. 2007: 247-267.

    [26] CHU C K, TZENG W G. Identity-based proxy re-encryption without random oracles[C]//International Conference on Information Security. 2007: 189-202.

    [27] LIBERT B, VERGNAUD D. Tracing malicious proxies in proxy re-encryption[C]//The International Conference on Pairing-Based Cryptography. 2008: 332-353.

    [28] ATENIESE G, BENSON K, HOHENBERGER S. Key-private proxy re-encryption[C]//Cryptographers' Track at the RSA Conference. 2009: 279-294.

    [29] CHANDRAN N, CHASE M, VAIKUNTANATHAN V. Functional re-encryption and collusion-resistant obfuscation[C]//Theory of Cryptography Conference. 2012: 404-421

    About the authors:

    WENG Jian(1976-), born in Guangdong. In 2008, he received his Ph.D. degree in Computer Science and Engineering from Shanghai Jiaotong University. Currently, he is a professor and vice dean with the School of Information Technology, Jinan University. His research interests include cryptography and information security.

    WENG Jiasi(1994-), born in Guangdong. She is a master in Jinan University. Her research interests include cryptography and information security.

    LIU Jianan(1992-), born in Henan. He is a Ph.D student in Jinan University. His research interests include cryptography and information security.

    HOU Lin (1991-), born in Hubei. She is a Ph.D student in Jinnan University. Her research interests include cryptography and information security.

    10.11959/j.issn.2096-109x.2016.00104

    date: 2016-07-12, Revised date: 2016-08-23.

    WENG Jian, cryptjweng@gmail.com

    The National Natural Science Foundation of China (No.61272413, No.61472165)

    欧美黑人精品巨大| 日韩中文字幕视频在线看片| 国产1区2区3区精品| 97人妻天天添夜夜摸| 国产精品影院久久| 90打野战视频偷拍视频| 国产成人av教育| 精品少妇久久久久久888优播| 水蜜桃什么品种好| 国产淫语在线视频| 色精品久久人妻99蜜桃| 欧美成人免费av一区二区三区 | 人妻久久中文字幕网| 精品国内亚洲2022精品成人 | 好男人电影高清在线观看| 天堂动漫精品| 亚洲色图 男人天堂 中文字幕| 亚洲综合色网址| 女人爽到高潮嗷嗷叫在线视频| 老熟妇仑乱视频hdxx| 另类亚洲欧美激情| 91国产中文字幕| 黄色丝袜av网址大全| 欧美激情久久久久久爽电影 | 久久精品国产99精品国产亚洲性色 | 欧美变态另类bdsm刘玥| 中亚洲国语对白在线视频| 久久午夜亚洲精品久久| 丁香六月欧美| 美女福利国产在线| 丝瓜视频免费看黄片| 另类亚洲欧美激情| 亚洲精华国产精华精| 婷婷丁香在线五月| 欧美精品啪啪一区二区三区| 日韩成人在线观看一区二区三区| 香蕉丝袜av| 精品久久久久久电影网| 9191精品国产免费久久| 国产深夜福利视频在线观看| 久久久国产精品麻豆| 久9热在线精品视频| 高清av免费在线| 精品久久久精品久久久| 无遮挡黄片免费观看| 成人亚洲精品一区在线观看| 三级毛片av免费| 亚洲中文日韩欧美视频| 欧美av亚洲av综合av国产av| 天天操日日干夜夜撸| 精品欧美一区二区三区在线| 97人妻天天添夜夜摸| 两个人免费观看高清视频| 久久99一区二区三区| 亚洲第一欧美日韩一区二区三区 | 欧美日本中文国产一区发布| 极品人妻少妇av视频| 午夜日韩欧美国产| 日本五十路高清| 国产一区二区三区在线臀色熟女 | 后天国语完整版免费观看| 久久人人爽av亚洲精品天堂| 日韩免费av在线播放| 亚洲av日韩精品久久久久久密| 欧美日韩视频精品一区| 99精品在免费线老司机午夜| 国产男靠女视频免费网站| 成在线人永久免费视频| 精品久久蜜臀av无| 亚洲五月色婷婷综合| 人妻 亚洲 视频| 久久精品成人免费网站| 天堂8中文在线网| 久久久精品区二区三区| 日本精品一区二区三区蜜桃| 亚洲国产av新网站| 亚洲一区中文字幕在线| 国产伦理片在线播放av一区| 精品国产乱码久久久久久小说| 国产av国产精品国产| 三上悠亚av全集在线观看| 国产欧美亚洲国产| 99久久精品国产亚洲精品| 99久久99久久久精品蜜桃| 国产男靠女视频免费网站| 91av网站免费观看| 伦理电影免费视频| 三上悠亚av全集在线观看| 午夜福利免费观看在线| 日韩中文字幕视频在线看片| 麻豆乱淫一区二区| 女人久久www免费人成看片| 午夜老司机福利片| 免费日韩欧美在线观看| 亚洲精品久久成人aⅴ小说| av超薄肉色丝袜交足视频| 欧美国产精品一级二级三级| av网站在线播放免费| 亚洲av成人一区二区三| 99re在线观看精品视频| 两性夫妻黄色片| 色视频在线一区二区三区| 亚洲国产欧美日韩在线播放| 午夜视频精品福利| 老司机影院毛片| 99久久精品国产亚洲精品| 久久久精品94久久精品| 国产精品亚洲一级av第二区| 80岁老熟妇乱子伦牲交| 天天操日日干夜夜撸| 国产人伦9x9x在线观看| 男人舔女人的私密视频| 日韩视频一区二区在线观看| 国产成人啪精品午夜网站| 女同久久另类99精品国产91| 深夜精品福利| 色婷婷av一区二区三区视频| 777久久人妻少妇嫩草av网站| 久久久精品免费免费高清| 久久天躁狠狠躁夜夜2o2o| 欧美精品av麻豆av| 狠狠精品人妻久久久久久综合| 国产成人精品在线电影| 黑人猛操日本美女一级片| 亚洲中文字幕日韩| 国产欧美日韩精品亚洲av| 无人区码免费观看不卡 | 1024视频免费在线观看| 久久国产亚洲av麻豆专区| 精品亚洲成国产av| 免费看十八禁软件| 天天躁日日躁夜夜躁夜夜| 在线观看一区二区三区激情| 国产色视频综合| 啦啦啦在线免费观看视频4| 亚洲精品在线观看二区| 亚洲精华国产精华精| 色视频在线一区二区三区| av线在线观看网站| 午夜福利在线观看吧| 淫妇啪啪啪对白视频| 嫩草影视91久久| 在线看a的网站| 亚洲欧洲精品一区二区精品久久久| 国产无遮挡羞羞视频在线观看| 日本黄色日本黄色录像| 精品久久蜜臀av无| 欧美 日韩 精品 国产| 老司机影院毛片| 亚洲精品国产一区二区精华液| 在线观看免费视频日本深夜| 日韩视频一区二区在线观看| 最近最新中文字幕大全电影3 | 久久国产精品男人的天堂亚洲| 久久久久久久久久久久大奶| 99国产精品99久久久久| 国产高清激情床上av| 自拍欧美九色日韩亚洲蝌蚪91| 欧美精品啪啪一区二区三区| 五月开心婷婷网| 一本色道久久久久久精品综合| 两性午夜刺激爽爽歪歪视频在线观看 | 高清av免费在线| 黑人巨大精品欧美一区二区mp4| 一区福利在线观看| 在线观看免费午夜福利视频| 亚洲色图av天堂| av视频免费观看在线观看| 国产亚洲精品久久久久5区| 99精品久久久久人妻精品| 脱女人内裤的视频| 天天影视国产精品| 中文字幕人妻熟女乱码| 99国产精品一区二区三区| a级片在线免费高清观看视频| 免费在线观看黄色视频的| 亚洲va日本ⅴa欧美va伊人久久| 久久久欧美国产精品| 日本一区二区免费在线视频| 变态另类成人亚洲欧美熟女 | 色老头精品视频在线观看| 日本精品一区二区三区蜜桃| 2018国产大陆天天弄谢| 老司机靠b影院| 中文字幕另类日韩欧美亚洲嫩草| 50天的宝宝边吃奶边哭怎么回事| 精品一区二区三卡| 国产精品成人在线| 久久精品国产综合久久久| 一区福利在线观看| 国产成人一区二区三区免费视频网站| 久久久久网色| 国产成人精品在线电影| 国产成人av激情在线播放| 亚洲少妇的诱惑av| 后天国语完整版免费观看| 中文字幕精品免费在线观看视频| 99在线人妻在线中文字幕 | 在线 av 中文字幕| av有码第一页| 国产人伦9x9x在线观看| 日韩视频在线欧美| 亚洲伊人久久精品综合| 国产无遮挡羞羞视频在线观看| 国内毛片毛片毛片毛片毛片| 久久青草综合色| 国产一区有黄有色的免费视频| 两性夫妻黄色片| 免费在线观看视频国产中文字幕亚洲| 欧美日本中文国产一区发布| 亚洲精品国产色婷婷电影| 成人国产一区最新在线观看| a在线观看视频网站| 王馨瑶露胸无遮挡在线观看| 国产精品二区激情视频| 免费久久久久久久精品成人欧美视频| 久久久久久人人人人人| 亚洲一码二码三码区别大吗| 黑人操中国人逼视频| 日韩欧美一区二区三区在线观看 | www.精华液| 18禁观看日本| a在线观看视频网站| 美国免费a级毛片| 国产伦理片在线播放av一区| 少妇的丰满在线观看| 久久久久久免费高清国产稀缺| 欧美激情高清一区二区三区| 国产精品电影一区二区三区 | 亚洲国产欧美一区二区综合| 香蕉久久夜色| 国产精品九九99| 国产亚洲午夜精品一区二区久久| 国产野战对白在线观看| 欧美日韩一级在线毛片| 一级黄色大片毛片| 亚洲七黄色美女视频| 窝窝影院91人妻| h视频一区二区三区| 日韩有码中文字幕| 天堂俺去俺来也www色官网| 少妇裸体淫交视频免费看高清 | 在线观看免费午夜福利视频| 在线观看www视频免费| 狠狠婷婷综合久久久久久88av| 久久人人爽av亚洲精品天堂| 考比视频在线观看| 精品欧美一区二区三区在线| 亚洲精品在线观看二区| 香蕉国产在线看| 欧美激情久久久久久爽电影 | 午夜激情av网站| 国产精品自产拍在线观看55亚洲 | 精品国产超薄肉色丝袜足j| 中文字幕人妻丝袜制服| 色综合婷婷激情| 18禁国产床啪视频网站| 2018国产大陆天天弄谢| 搡老岳熟女国产| 日本一区二区免费在线视频| 国产成人欧美| 大香蕉久久成人网| 亚洲精品一卡2卡三卡4卡5卡| 国产男女超爽视频在线观看| 日日夜夜操网爽| 久久久精品免费免费高清| 女人精品久久久久毛片| 日韩欧美国产一区二区入口| 国产极品粉嫩免费观看在线| 老汉色∧v一级毛片| 欧美在线一区亚洲| 亚洲va日本ⅴa欧美va伊人久久| 国产亚洲欧美在线一区二区| 50天的宝宝边吃奶边哭怎么回事| 欧美激情 高清一区二区三区| av又黄又爽大尺度在线免费看| www.自偷自拍.com| 一进一出抽搐动态| 每晚都被弄得嗷嗷叫到高潮| 亚洲一区二区三区欧美精品| 激情在线观看视频在线高清 | 一本—道久久a久久精品蜜桃钙片| 每晚都被弄得嗷嗷叫到高潮| 香蕉国产在线看| 久热爱精品视频在线9| 国产亚洲精品久久久久5区| 91精品国产国语对白视频| 久久av网站| 人妻久久中文字幕网| 精品人妻1区二区| 后天国语完整版免费观看| 少妇 在线观看| 亚洲av第一区精品v没综合| 久久国产亚洲av麻豆专区| 欧美黄色片欧美黄色片| 国产高清videossex| 亚洲成人免费av在线播放| 麻豆国产av国片精品| 国产视频一区二区在线看| 亚洲七黄色美女视频| 黑人操中国人逼视频| 国产欧美亚洲国产| 国精品久久久久久国模美| 久久精品aⅴ一区二区三区四区| 菩萨蛮人人尽说江南好唐韦庄| 国产成人欧美| 国产熟女午夜一区二区三区| 悠悠久久av| 桃红色精品国产亚洲av| 热99国产精品久久久久久7| 成人亚洲精品一区在线观看| 亚洲中文日韩欧美视频| 人人妻人人澡人人爽人人夜夜| 午夜免费鲁丝| 欧美黑人欧美精品刺激| 色视频在线一区二区三区| 热99久久久久精品小说推荐| 国产精品欧美亚洲77777| 精品国产一区二区三区四区第35| 国产区一区二久久| 丝袜喷水一区| e午夜精品久久久久久久| 成人国产一区最新在线观看| 国产精品美女特级片免费视频播放器 | 国产xxxxx性猛交| 99久久国产精品久久久| 老熟妇仑乱视频hdxx| 欧美日韩视频精品一区| 999精品在线视频| 久久精品成人免费网站| 精品福利观看| 国产成人精品久久二区二区91| 亚洲午夜理论影院| videosex国产| 久久99热这里只频精品6学生| 1024香蕉在线观看| 国产在线精品亚洲第一网站| 91精品三级在线观看| 成人影院久久| 亚洲精品一二三| 亚洲精品国产色婷婷电影| 午夜福利一区二区在线看| 2018国产大陆天天弄谢| 国产av一区二区精品久久| 人妻久久中文字幕网| 久久国产精品男人的天堂亚洲| 一本—道久久a久久精品蜜桃钙片| 新久久久久国产一级毛片| 最黄视频免费看| 久久婷婷成人综合色麻豆| 日本av免费视频播放| 久久久久久免费高清国产稀缺| 超色免费av| 亚洲五月色婷婷综合| 最近最新免费中文字幕在线| 亚洲精品一卡2卡三卡4卡5卡| 电影成人av| 黄色视频在线播放观看不卡| 免费看十八禁软件| 精品国产超薄肉色丝袜足j| 在线观看免费日韩欧美大片| 黄网站色视频无遮挡免费观看| 十八禁人妻一区二区| 777久久人妻少妇嫩草av网站| 欧美在线一区亚洲| 亚洲五月色婷婷综合| 又大又爽又粗| 久久久精品区二区三区| 午夜精品久久久久久毛片777| 美女视频免费永久观看网站| 日本一区二区免费在线视频| 97在线人人人人妻| 亚洲国产欧美在线一区| 人妻 亚洲 视频| 欧美国产精品一级二级三级| 国产精品免费一区二区三区在线 | 国产成人免费无遮挡视频| 久久久水蜜桃国产精品网| 免费在线观看日本一区| 亚洲精品美女久久久久99蜜臀| 9色porny在线观看| 91精品三级在线观看| 久久99热这里只频精品6学生| 日本黄色日本黄色录像| 精品少妇内射三级| 国产有黄有色有爽视频| 欧美国产精品va在线观看不卡| 亚洲av第一区精品v没综合| 五月天丁香电影| 狠狠狠狠99中文字幕| 日韩免费高清中文字幕av| 中文字幕另类日韩欧美亚洲嫩草| 色老头精品视频在线观看| 亚洲av欧美aⅴ国产| 欧美日韩av久久| 男女边摸边吃奶| 在线观看66精品国产| 国产黄色免费在线视频| 国产无遮挡羞羞视频在线观看| 波多野结衣一区麻豆| 三上悠亚av全集在线观看| 国产成人一区二区三区免费视频网站| 免费黄频网站在线观看国产| 国产单亲对白刺激| 久久亚洲精品不卡| 黑人猛操日本美女一级片| 他把我摸到了高潮在线观看 | 欧美午夜高清在线| 最新美女视频免费是黄的| 免费在线观看完整版高清| 久久99热这里只频精品6学生| 美女高潮到喷水免费观看| 成人精品一区二区免费| 男女之事视频高清在线观看| 欧美精品亚洲一区二区| 99riav亚洲国产免费| 侵犯人妻中文字幕一二三四区| 日韩人妻精品一区2区三区| 老司机深夜福利视频在线观看| 久久久国产精品麻豆| 国产1区2区3区精品| 大陆偷拍与自拍| 精品国产国语对白av| 男女之事视频高清在线观看| 少妇 在线观看| 成年人黄色毛片网站| 午夜精品国产一区二区电影| 女人精品久久久久毛片| 久久精品aⅴ一区二区三区四区| 久久久国产一区二区| 两个人免费观看高清视频| 这个男人来自地球电影免费观看| 日本av手机在线免费观看| 欧美日韩中文字幕国产精品一区二区三区 | 久久久久视频综合| 人妻 亚洲 视频| 欧美久久黑人一区二区| 女人久久www免费人成看片| 少妇猛男粗大的猛烈进出视频| 久久中文字幕人妻熟女| 777久久人妻少妇嫩草av网站| 亚洲五月婷婷丁香| 天天躁夜夜躁狠狠躁躁| 成年女人毛片免费观看观看9 | 深夜精品福利| 黄色a级毛片大全视频| 日本精品一区二区三区蜜桃| netflix在线观看网站| 狠狠婷婷综合久久久久久88av| 亚洲一区中文字幕在线| 成人手机av| 国产高清视频在线播放一区| 一区二区av电影网| 国产又色又爽无遮挡免费看| 久久人人爽av亚洲精品天堂| 精品人妻熟女毛片av久久网站| 在线观看免费高清a一片| 欧美激情高清一区二区三区| 欧美日韩av久久| 欧美亚洲 丝袜 人妻 在线| 悠悠久久av| 两人在一起打扑克的视频| 在线观看一区二区三区激情| 成人18禁高潮啪啪吃奶动态图| 国产一区二区三区综合在线观看| 亚洲欧美一区二区三区久久| 老鸭窝网址在线观看| 午夜两性在线视频| 亚洲国产av影院在线观看| 99re在线观看精品视频| 成人影院久久| 90打野战视频偷拍视频| 色婷婷久久久亚洲欧美| 久久性视频一级片| 新久久久久国产一级毛片| 久久久国产一区二区| 亚洲男人天堂网一区| 在线观看免费高清a一片| 狠狠狠狠99中文字幕| 亚洲五月色婷婷综合| 99热国产这里只有精品6| 精品亚洲成a人片在线观看| 美女扒开内裤让男人捅视频| 精品人妻在线不人妻| 亚洲精品国产一区二区精华液| 欧美老熟妇乱子伦牲交| 啦啦啦在线免费观看视频4| 免费观看av网站的网址| 757午夜福利合集在线观看| 18在线观看网站| 国产成人欧美| 久久久久国产一级毛片高清牌| 国产av一区二区精品久久| av不卡在线播放| 桃红色精品国产亚洲av| 十八禁高潮呻吟视频| √禁漫天堂资源中文www| 亚洲成av片中文字幕在线观看| 9191精品国产免费久久| 欧美精品人与动牲交sv欧美| 中文字幕制服av| 亚洲精品乱久久久久久| 美女高潮喷水抽搐中文字幕| 色播在线永久视频| 夜夜爽天天搞| 久久久久久久国产电影| 午夜激情久久久久久久| 亚洲熟妇熟女久久| av电影中文网址| 18在线观看网站| 男人舔女人的私密视频| 99久久国产精品久久久| 日韩精品免费视频一区二区三区| 日日夜夜操网爽| 18禁美女被吸乳视频| 亚洲专区国产一区二区| 成人黄色视频免费在线看| 丝瓜视频免费看黄片| 欧美另类亚洲清纯唯美| 天堂动漫精品| 欧美精品啪啪一区二区三区| 久久九九热精品免费| 丝袜喷水一区| 久久影院123| videosex国产| 97人妻天天添夜夜摸| 日本一区二区免费在线视频| 成年动漫av网址| svipshipincom国产片| 久久久久精品人妻al黑| 成年人午夜在线观看视频| 麻豆国产av国片精品| 国产一区有黄有色的免费视频| 青青草视频在线视频观看| 国产精品自产拍在线观看55亚洲 | 日韩 欧美 亚洲 中文字幕| 中文字幕最新亚洲高清| 大陆偷拍与自拍| 九色亚洲精品在线播放| 亚洲人成伊人成综合网2020| 亚洲精品一二三| 精品国产国语对白av| 国产成人影院久久av| 99国产极品粉嫩在线观看| 欧美中文综合在线视频| 女人久久www免费人成看片| 成年版毛片免费区| 99香蕉大伊视频| 日韩 欧美 亚洲 中文字幕| 精品国产乱子伦一区二区三区| 亚洲av电影在线进入| 一级a爱视频在线免费观看| 最黄视频免费看| 日韩欧美一区视频在线观看| 国产成人av激情在线播放| 亚洲第一青青草原| 国产一区二区 视频在线| 日韩熟女老妇一区二区性免费视频| netflix在线观看网站| 91av网站免费观看| 曰老女人黄片| 亚洲一卡2卡3卡4卡5卡精品中文| 精品一区二区三卡| 91精品国产国语对白视频| 久久久久久久久久久久大奶| 亚洲伊人色综图| 国产精品欧美亚洲77777| 精品久久久久久久毛片微露脸| 又紧又爽又黄一区二区| 首页视频小说图片口味搜索| 亚洲,欧美精品.| 亚洲专区字幕在线| 青草久久国产| 国产又色又爽无遮挡免费看| 免费一级毛片在线播放高清视频 | 伊人久久大香线蕉亚洲五| √禁漫天堂资源中文www| 天天添夜夜摸| 亚洲精品成人av观看孕妇| 国产97色在线日韩免费| 99精品欧美一区二区三区四区| 欧美性长视频在线观看| 亚洲天堂av无毛| 久久狼人影院| 男男h啪啪无遮挡| 18在线观看网站| www.自偷自拍.com| 欧美久久黑人一区二区| 亚洲av第一区精品v没综合| 亚洲专区中文字幕在线| 黄色丝袜av网址大全| 中文字幕人妻丝袜制服| 久久久久久久国产电影| 久久久精品94久久精品| 肉色欧美久久久久久久蜜桃| 麻豆成人av在线观看| 中文字幕色久视频| 久久中文看片网| 老司机亚洲免费影院| 久久久国产成人免费| av欧美777| 人人澡人人妻人| 高清黄色对白视频在线免费看| 999久久久精品免费观看国产| www.精华液| 久久精品人人爽人人爽视色| 精品国产亚洲在线| 老司机午夜福利在线观看视频 | 久久国产精品人妻蜜桃| 俄罗斯特黄特色一大片| 12—13女人毛片做爰片一| 国产精品免费大片| 久久国产精品大桥未久av| 亚洲中文字幕日韩| 美女扒开内裤让男人捅视频|