• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A novel offload-server PAKE scheme usingnew theorem of chaotic maps towards multiple server blockchain architecture

    2019-10-22 11:56:54,,
    關(guān)鍵詞:安全性

    , ,

    (Software College, Shenyang Normal University, Shenyang 110034, China)

    Abstract: Nowadays, the distributed password-authenticated key agreement schemes become more and more popular. Compared with the three traditional architectures (client/server, two clients/server and multi-server), the distributed architecture can solve problems of single-point of security, single-point of efficiency and single-point of failure. Moreover, it has the characteristics of scalability, flexibility and fairness. In the paper, we proposed a new Provably Secure and Distributed Privacy-Protection scheme using chaotic maps. The advantage of this scheme is that the linked block-chain can be unloaded from the server after the user registers. It achieves mutual authenticated among three nodes in three rounds with privacy protection firstly, and at the same time, the unregistered server can store a temporary authenticator for a while for improving the efficiency. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. Compared with the related literatures in recent years, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

    Key words: Privacy-protection; key agreement; distributed architecture; chaotic maps

    CLCnumber: TP319Documentcode: A

    doi: 10.3969/ j.issn.1673-5862.2019.04.011

    Receiveddate: 2019-03-06.

    Supported: Project supported by Plan of Natural Science Foundation of Liaoning Province(201602680,20180550536,2019).

    Biography: LIU Tianhua(1966-), male, was born in Shenyang of Liaoning province, professor of Shenyang Normal University, Ph.D.Corresponding author: ZHU Hongfeng(1978-), male, was born in Panjin of Liaoning province, professor of Shenyang Normal University, Ph.D.

    文章編號(hào):1673-5862(2019)04-0345-11

    利用混沌映射的新定理提出了一種面向多服務(wù)器區(qū)塊鏈架構(gòu)的卸載服務(wù)器PAKE方案

    劉天華, 趙婧月, 朱宏峰

    (沈陽(yáng)師范大學(xué) 科信軟件學(xué)院, 沈陽(yáng) 110034)

    摘 要:目前,分布式密碼認(rèn)證密鑰協(xié)議方案越來(lái)越受歡迎。與傳統(tǒng)的3種體系結(jié)構(gòu)(客戶(hù)機(jī)/服務(wù)器、2種客戶(hù)機(jī)/服務(wù)器和多服務(wù)器)相比,分布式體系結(jié)構(gòu)可以解決單點(diǎn)安全、單點(diǎn)效率和單點(diǎn)故障問(wèn)題。此外,它還具有可擴(kuò)展性、靈活性和公平性。提出了一種新的基于混沌映射的分布式安全保護(hù)方案。該方案的優(yōu)點(diǎn)是,在用戶(hù)注冊(cè)之后可以從服務(wù)器卸載鏈接的塊鏈。它首先在3輪中實(shí)現(xiàn)了3個(gè)節(jié)點(diǎn)之間的互認(rèn)證,保護(hù)了隱私,同時(shí)未注冊(cè)的服務(wù)器可以暫時(shí)存儲(chǔ)一個(gè)臨時(shí)認(rèn)證器,以提高效率。該方案的安全性是基于混沌映射的硬問(wèn)題和一個(gè)安全的單向哈希函數(shù)。與相關(guān)文獻(xiàn)相比,提出的方案不僅具有高效、獨(dú)特的功能,而且對(duì)各種攻擊具有魯棒性,實(shí)現(xiàn)了完美的正向保密。最后,給出了該方案的安全性證明和有效性分析。

    關(guān) 鍵 詞:隱私保護(hù); 密鑰協(xié)議; 分布式架構(gòu); 混沌映射

    0 Introduction

    Nowadays, authentication key exchange is one of the most popular technologies, more and more people like surfing the Internet, and these users also care about their privacy. The mutual authentication key protocol (MAKA) is one of the most important encryption components[1-2]that can establish authenticated and secure communication channels. Many literatures adopt multi-server architecture (MSA)[3-4]in order to reduce the number of user registration, while literature can[4]achieve privacy protection without using symmetric cryptography to reduce the amount of calculation. In order to seek a common computing environment, Zhu proposed a AKE[5]protocol in different areas, which enables both parties in the two fields to negotiate session keys in the standard model. Of course, a group key protocol scheme with privacy protection can be proposed in[6]. The multi-server architecture makes the registry the focus of hackers. In addition, single point efficiency and single point failure have been troubling the registry.

    A good architecture can make some hard problems easier. For example, distributed architectures can solve problems with centralized architectures. Zhu[7]first proposed a new distributed architecture, which refers to the multi-server to Server architecture (MSTSA). In the random[7]oracle model, the first verifiable secure and flexible cryptographic authentication key protocol scheme[8-9]based on chaotic mapping is proposed[10]. Then, Zhu and MSTSA[1]proposed another cryptographic key protocol scheme, and verified the security of the scheme in the standard model. But there are two major problems with the two distributed schemes using chaotic maps: there is no privacy protection and there are multiple rounds of communication. Therefore, this paper proposes a new distributed scheme to solve these two main problems. Because chaos mapping has many advantages such as sensitivity to initial parameters, unpredictability and jumping, we use chaotic mapping. At the same time, the chaotic series produced by the chaotic system has the characteristics of non-periodicity and pseudo-randomness.

    The main contributions are as follows: 1) a new cryptographic authentication key exchange scheme is proposed to protect the privacy of multiple server-to-server architectures. 2) the scheme is verified through three rounds and three sets of nodes, and the privacy is protected. 3) this scheme can temporarily store the unregistered server as a temporary authenticator to avoid repeatedly involving the registered server. 4) this scheme is mainly based on chaotic mapping and does not use modular exponential operation and scalar multiplication on elliptic curve.In terms of security, the protocol can resist all common attacks, such as mock attacks, man-in-the-middle attacks, and so on. 5) in terms of functions, the protocol also implements some well-known features, such as perfect forwarding confidentiality and execution efficiency.

    Therefore, this paper proposes that the multi-server authentication framework is mainly composed of three entities: user (Ui), server (Sj) and registry (RC).To benefit from the services provided by the various servers, users first register with theRC. Therefore, theUiandSjcan either directly (that is, use rc-offline authentication/ mrc-off) or indirectly (use rc-online authentication/ mrc-on) for authentication.In addition, in MRCOn mode, the user performs authentication with the server throughRC, but in mrc-off mode, the user and the server can authenticate directly withoutRC. As shown in the Fig.1.

    Fig.1 Registration certification and without the third party

    Remark:

    1) User Registration

    2) Server Registion

    3) Login Request

    4) Authentication Response

    5) Verification Response

    6) Verification Request

    Offload the server of registration centre and negotiate the authentication key directly with another server.

    When the useruses for the first time, they can sign up forS, and after bridging, they can no longer use it, andUcan directly communicate with anotherS′.

    The advantage of this paper is that on the basis of the whole process of privacy protection, the block chain server can be unloaded, and any server can be logged in, finally achieving the effect of multiple servers. To sum up, a two-party key negotiation protocol based on chaotic mapping for authentication between a user and multiple servers.

    The rest of the paper is organized as follows: Some preliminaries are given in Section 1. Next, a distributed privacy-protection scheme is described in Section 2. Then, the security analys is and efficiency analysis are given in Section 3 and Section 4. This paper is finally concluded in Section 5.

    1 Preliminaries

    1.1 Theorems of Chaotic maps problems

    LetPandQbe integers andpbe a prime. The general second-order linear recurrence relation is of the form:

    Ta(x)=P×Ta-1(x)+Q×Ta-2(x)(a≥2)

    WhereTa(x)∈GF(p) for alla.

    The recurrence relation function of chaotic maps is defined with initial conditionsT0(x)=1 andT1(x)=x. It is easy to see that the chaotic maps function is a special type of second-order linear recurrence relation as defined withP=2xandQ=-1.

    Theorem 1.1 Letf(x)=t2-2xt+1 andα,βbe two roots off(x). Ifx=1/2(α+β), then the number of solutions satisfy.

    ProofSinceαandβare the roots of the characteristic polynomialf(x) of the recurrence

    f(x)=t2-2xt+1

    we get two different solutions from

    Assumingc1andc2are two random numbers, we can get the following properties according:

    P(c1αn-1+c2βn-1)-Q(c1αn-2+c2βn-2)=c1αn+c2βn

    From this, whenT0=c1+c2,T1=c1α+c2β, any recurrence relation ofTa(x) that can satisfy is of the formc1αn+c2βn. So the recurrence relation ofTa(x) is defined with the coefficientc1=c2=1/2:

    Therefore,

    Theorem 1.2 Ifaandbare two positive integers anda>b, thenTa+b(x)+Ta-b(x)=2Ta(x)Tb(x).

    ProofWe can prove the theorem 1.2 as follows:

    1.2 Threat Model

    The threat model should be adopted the widelyaccepted security assumptions about password based authentication schemes[10-11].

    1) The useriholds the uniformly distributed low-entropy password from the small dictionary. The server keeps the private key. At the time of registration, the server sends the personalized security parameters to the useriby secure channel and the userishould keep the personalized security parameters safe.

    2) An adversary and a useriinteract by executing oracle queries that enables an adversary to perform various attacks on authentication protocols.

    3) The communication channel is controlled by the adversary who has the capacity to intercept, modify, delete, resend and reroute the eavesdropped messages.

    In the password authenticated protocol ∏, each participant is either a userui∈Uor a trusted serverSinteract number of times. Only polynomial number of queries occurs between adversary and the participant’s interaction. This enables an adversary to simulate a real attack on the authentication protocol. The possible oracle queries are as follows:

    Definition 6. Consider an execution of the authentication protocol ∏ by an adversaryA, in which the latter is given access to the Execute, Send, and Test oracles and asks at most single Test query to a fresh instance of an honest client. Letb′ be his output, ifb′=b, wherebis the hidden bit selected by the Test oracle. LetDbe user’s password dictionary with size |D|. Then, the advantage ofAin violating the semantic security of the protocol ∏ is defined more precisely as follows:

    Adv∏,D(A)=[2Pr[b′=b]-1]

    The password authentication protocol is semantically secure if the advantageAdv∏,D(A) is only negligibly larger thanO(qs)/|D|, whereqsis the number of active sessions.

    1.3 Blockchain

    Academia for there is no unified definition of block chain technology, but it is generally believed that block chain is a kind of according to the time sequence data block combination in the form of the chain to form a specific data structure, and ensure the tamper-resistant in cryptography and unforgeable decentralized, distributed Shared general ledger to trust system from the point of view of the data, chain block is a kind of practical distributed database could not be changed the traditional distributed database only to maintain the data by a central server node, other nodes stored only data backup and block chain “distributed” is not only embodied in distributed data backup storage, also in number According to the records of the distributed, that is, jointly by all the nodes involved in data maintenance. A single node of the data been tampered with or damaged will not affect block the data stored by chain, and to realize the data from the technical point of view, the secure storage of the block is not a single chain of technological innovation,It is a distributed ledger technology realized by the deep integration of P2P network technology, asymmetric encryption technology, consensus mechanism, script and other technologies[12]. chain technology using encryption chain the block structure to validate and store data, using the P2P technology, consensus mechanism to implement distributed nodes Verification, communication and the establishment of trust relationship, the script can be achieved using chain complex business logic function with the data automation of operation, thus forming a new data record, store, and express the basic framework of the method of block chain. The basic framework of blockchain mainly consists of data layer, network layer, consensus layer and application layer.

    Among them, the data layer includes the underlying data block and its chain structure, supported by hash algorithm, time stamp, Merkle tree, asymmetric encryption and other related technologies, so as to protect the integrity and traceability of block data; The network layer includes data transmission mechanism and transaction verification mechanism, which are supported by P2P network technology to complete data transmission and verification between distributed nodes. The consensus layer mainly includes the consensus mechanism, through various consensus algorithms to achieve the consistency and authenticity of data between distributed nodes. Some blockchain systems, such as bitcoin, also include the distribution mechanism and incentive mechanism, integrate economic factors into the blockchain technology, so as to reach a stable consensus among nodes. Application layer can achieve various top block chain application scenarios and the implementation of related system and fall to the ground, through the script block chain support all kinds of chain algorithm and intelligent contracts to support, provides programmable block chain on the basis of the framework, based on the timestamp of the chain block structure, based on P2P network data transmission mechanism, the consensus of the distributed node mechanism and flexible programmable chain script is the most representative block chain technology innovations.

    2 The Proposed Privacy Protection scheme with Multiple servers to server Architecture

    This paper proposes that the multi-server authentication framework is mainly composed of three entities: user (Ui), server (Sj) and registry (RC). To benefit from the services provided by the various servers, users first register with theRC.Therefore, theUiandSjcan either directly (that is, use rc-offline authentication/mrc-off) or indirectly (use rc-online authentication/mrc-on) for authentication. In addition, in MRCOn mode, the user performs authentication with the server throughRC, but in mrc-off mode, the user and the server can authenticate directly withoutRC. Offload the server of registration centre and negotiate the authentication key directly with another server.

    1) Distributed architecture: The trusted server defines system parameters and generates his private/public key-pair. The trusted server then publishes system parameters and keeps the private key secret. Next, each user must register in trusted server before PAKE. Finally, the trusted server cooperates with the registering user to generate the shared password between the registering users.

    Due to space limitations, this section just gives an instance for sharing the password in distributed architecture: a) any user must take his/her identities card as the authenticator and transfer it to the server by a secure channel; b) the server uses his private/public key-pair to sign some messages for authenticating itself; c) after mutual authentication, a user must leave his/her private cell-phone number as a secure receiver for receive any temporary shared password which is sent by the server.

    2) Agreement architecture: In this architecture, there is no the trust third party involved. The two users will exchange the shared password by a secure channel. The main methods are: public-key cryptosystem, phone calls or secure instant messaging software, or exchange password face to face, and so on.

    2.1 User registration phase

    The concrete notations used hereafter are:IDSimeans identity of the ith server;IDAmeans the identity of Alice;a,a1,ra,riare all nonces; (x,Tki(x)), the public key based on Chebyshev chaotic maps of the ith server;ki, the secret key based on Chebyshev chaotic maps of the ith server;H,Asecure one-way hash function.H: {0,1}*→ {0,1}lfor a constantl;‖ means concatenation operation.

    Fig.2 illustrates the user registration phase.

    Fig.2 A premium user registration phase

    Remark:

    Step 1 When a user wants to be a new legal user, she chooses her identityIDA, a random numberra, and computesH(ra‖PW). Then Alice submitsIDA,H(ra‖PW) to theRCvia a secure channel.

    Step 2 Upon receivingIDA,H(ra‖PW) from Alice, theRCcomputesB=H(IDA‖ki)⊕H(ra‖PW), wherekiis the secret key ofSi. Then Alice stores {IDA,ra,B} in a secure way.

    2.2 The user negotiates directly with Sj authentication

    Fig.3 illustrates the process of authenticated key agreement phase.

    Fig.3 The user negotiates directly with Sj authentication

    Step 1 If Alice wishes to consult some personal issues establish withSjin a secure way, she will input password and computeB*=H(ki), and then choose two random integer numbersa2and computeTa(x),CA1=Ta1Tki(x)IDA,CA2=TaTB*(x)IDSj,VA=Ta+H((B*)‖IDA‖IDSj)(x)+Ta-H((B*)‖IDA‖IDSj)(x). After that, Alice sendsm1={Ta1(x),CA1,CA2,VA} toSiwhich she has registered.

    Step 3 After receiving the messagem2={Tr(x),CS1,CS2,VS,VSi} fromSi,SjuseskjandTr(x) to getIDA‖IDSj=CS1/TkjTr(x),Ta(x)=CS2/TkjTr(x), ComputeH(CS1‖CS2)?=VS/TkjTki(x), If yes, that means the verification is successful, to getH(ki)=VSi/TkiTkj(x), Next, putIDSi,IDA,H(ki) in the database, selects randomr1and computesTr1(x),SK=H(Tr1Ta(x)),VSj=H(IDSi‖IDSj‖IDA‖H(ki)). Finally,Sjsendsm3={VSj,Tr1(x)} to Alice.

    Step 4 After receiving the messagem3={VSj,Tr1(x)}, Alice check ifH(IDSi‖IDSj‖IDA‖B*)?=VSj. If holds, that means Alice computes the session keySK=H(TaTr1(x)).

    If any authenticated process does not pass, the protocol will be terminated immediately.

    2.3 Offload the registration server phase

    After the user registers on the registration server, if the user wants to log in another server, the registration server only needs to help build the bridge once, and then the user communicates with the other server without registering the server for further participation (offload the registered server).

    Fig.4 illustrates the password changing phase. The user shall negotiate withSjcertification directly next time.

    Fig.4 Password changing phase

    Step 1 When a user wants to change her password, she chooses a new passwordPW′, Select random numbersa,a>H(B*‖Ta(x)) and computesTa(x), then arrived atCA=TaTki(x)IDA,VA=Ta+H(B*‖Ta(x))(x)+Ta-H(B*‖Ta(x))(x). Then Alice sendsm1={Ta(x),VA,CA} toSj.

    Step 2 Upon receivingm1={Ta(x),VA,CA} from Alice,Sj(IDSi,IDA,H(ki)) RecoverkjandTa(x), then arrived atIDA=CA/TkjTa(x), Find database, getH(ki), Check 2Ta(x)TH(H(ki)‖Ta(x)(x)?=VA, if yes, Select randomr,r>H(H(ki)‖Tr(x)). ComputeTr(x),VSj=A(H(ki)‖Tr(x)‖Ta(x)),SK=H(TrTa(x)). FinallySjsends {Tr(x),VSj} to Alice.

    Step 3 Upon receiving {Tr(x),VSj}, Alice check ifH(B*‖Tr(x)‖Ta(x))?=VSj, If they are equal, thenSK=H(TaTr(x)), and stores in a secure way.

    3 Security Analysis

    Here we assume that the security of the agreement based on the DLP problems, CDH problem, one-way hash function the intractability of the premise, assuming that the opponent is using a polynomial time and running in Dolev-Yao multi-protocol of computer parallel execution environment, is the communication link has complete control ability, cryptography trained Dolev-Yao under the model of the attacker. The following is the specific protocol security analysis:

    3.1 Dictionary attack

    This protocol can resist three common dictionary attacks:

    2) for predictable and unpredictable online dictionary attack, if the opponent guessing passwords fromSto oneself, because theSin the second round will check card users really solid, if validation failure times more than the predetermined threshold value, thenSwill know which user password has been as a target, and to take corresponding measures.

    3.2 Server leakage attack

    Situation one: if the opponent obtainsAverification elementYAX(X=1 or 2) ofA(the initiator of the message), if he/she chargesAto communicate with other users, another verification element withoutAcannot pass the verification of serverSin the second round; If you want to fakeAandScommunicating with another user at the same time, but do not have the user’s verification value, there is no way to pass the user’s verification in the second round; If you want to communicate with userAby impersonating other users and serverSat the same time, the second round will also fail to pass the verification ofAdue to the lack of another verification value ofA, unless both key rivals ofAcan be stolen. Case 2: if the enemy hands need toB(should be) the news rangAverification valueYBX(X=1 or 2), if you want to fake communication withA,BEinterceptedSnews sent toB{VSB1VSB2,ZSB,A}, but because of the intractability of DLP problem to calculate theXBX(X=1 or 2), thus unable to correctly calculate the session key. In the same way, even if the adversary gets a verification value for each message originator and message responder, it cannot communicate with the other party unless it can get two verification values for the same user.

    3.3 Unknown key sharing and insider attack

    3.4 Replay the attack

    Scenario 1 the adversary carries out replay attack on userAand sends the old message{VB1,VB2,ZSA} intercepted bySbefore toA. Since t isArandom number selected again every timeAapplies for the session key, it will fail to pass the verification ofAin the second round. Situation two: the opponent replays the attack on userB. If the opponent wants to change the fresh identifiers sent byAtoSandBbefore launching the attack, it will not pass the verification ofSin the second round. If the opponent resends the previous message {VSB1,VSB2,ZSB,A} toB, the same cannot be verified byBdue to the presence of the new identifierSKSB.

    3.5 Key confidentiality

    Key confidentiality means that the adversary cannot distinguish between a key and a random string with nonnegligible probability. Scenario 1) if the adversary wants to obtain key information fromVA1,VA2,VB1,VB2,VSB1,VSB2, it must solve the CDH problem. However, there is no way to solve this problem in polynomial time. Scenario 2) the adversary hopes to obtain the information of the session key by distinguishing the random number from the session key, which is also difficult to achieve due to the difficulty of the DLP problem. Therefore, this protocol provides key confidentiality.

    3.6 Forward security

    Since the user selects random numberaandbto participate in the calculation of the session key every time the session key is generated, even if the adversary gets two passwords of a user,PWX1andPWX2, the previous session key of the user cannot be calculated due to the difficulty of DLP problem. Even the loss of a user’s password (one or both) does not affect the security of the user’s previous communications. This agreement therefore provides forward security.

    3.7 Known key security

    Known key security means that even if an adversary obtains the session key used in a user’s communication, it will not affect the security of the user’s other session keys. In this protocol, there are two independent random Numbersaandbbetween each group of session keys, so each group of keys is independent. For four keys in each set, only one of them cannot be used to deduce any of the other three session keys due to the difficulty of the DLP problem.

    3.8 Man-in-the-middle attack

    This agreement can effectively prevent man-in-the-middle attacks.

    Situation 1 the adversary impersonatorScommunicates with the legitimate user, and cannot pass the user’s verification in the second round without knowing the user’s verification value. Situation two: if you imitate a legitimate user and serverSto communicate, because do not know the password of this user, can not pass the verification ofS.

    4 Efficiency Analysis

    The efficiency of the key exchange protocol will directly determine its practicability. Although the public-key algorithm has a series of advantages that cannot be compared with the symmetric cipher algorithm, it cannot be widely used in the key exchange protocol due to its high computational cost. The main contents of efficiency comparison include dot multiplication, hash function, exponential operation, number of protocol rounds, etc.Table 1 lists the computation amount required for each session key generated by the protocol.

    Table 1 Efficiency of our proposed scheme

    As can be seen from the comparison results, compared with the other two protocols, the protocol in this paper improves the computing efficiency at the expense of a certain server storage unit, and also enhances the security of the protocol.

    5 Conclusions

    In this paper, a new cryptographic key protocol is proposed by using the chaos mapping theorem. After proving the theorem, an example is given in detail. Then, we first proposed a new parameter, called the security/efficiency ratio (S/E ratio), for obtaining both security and efficiency integration performance. Through the security analysis and performance analysis of the new scheme, it is proved that the scheme is a round PAKA scheme which is safe and efficient. Next, the proposed scheme will be expanded from three aspects: 1) introducing smart CARDS or biometrics to the security level. 2) from the perspective of function, the research on issues such as fairness or entanglement is of great significance. 3) from a complex and diverse algorithm perspective, especially building new cryptocurrency/ blockchain is our interest.

    猜你喜歡
    安全性
    兩款輸液泵的輸血安全性評(píng)估
    新染料可提高電動(dòng)汽車(chē)安全性
    既有建筑工程質(zhì)量安全性的思考
    某既有隔震建筑檢測(cè)與安全性鑒定
    基于安全性需求的高升力控制系統(tǒng)架構(gòu)設(shè)計(jì)
    加強(qiáng)廣播電視信息安全性的思考
    科技傳播(2019年22期)2020-01-14 03:05:32
    網(wǎng)約車(chē)安全性提高研究
    活力(2019年17期)2019-11-26 00:42:18
    注意藥酒服用的安全性
    田間施用滅幼脲在桃中的殘留安全性評(píng)估
    ApplePay橫空出世 安全性遭受質(zhì)疑 拿什么保護(hù)你,我的蘋(píng)果支付?
    国产欧美日韩精品一区二区| 一级毛片aaaaaa免费看小| 亚洲人成网站在线播| 国产免费又黄又爽又色| 最近中文字幕2019免费版| 亚洲av国产av综合av卡| 亚洲精品色激情综合| 毛片一级片免费看久久久久| 99热全是精品| 91精品一卡2卡3卡4卡| av在线蜜桃| 色综合亚洲欧美另类图片| 日本免费a在线| 男插女下体视频免费在线播放| 成人亚洲精品av一区二区| 国产伦理片在线播放av一区| 亚洲激情五月婷婷啪啪| 淫秽高清视频在线观看| 亚洲精品第二区| 天堂影院成人在线观看| 你懂的网址亚洲精品在线观看| eeuss影院久久| 欧美性猛交╳xxx乱大交人| 在线免费十八禁| 丝袜喷水一区| 国产成人精品久久久久久| 草草在线视频免费看| 天美传媒精品一区二区| 亚洲av不卡在线观看| 尾随美女入室| 蜜臀久久99精品久久宅男| 一级a做视频免费观看| 99久国产av精品国产电影| 色尼玛亚洲综合影院| 免费大片黄手机在线观看| 街头女战士在线观看网站| 夫妻午夜视频| 日韩一区二区三区影片| 亚洲精品自拍成人| 少妇的逼好多水| 美女cb高潮喷水在线观看| 极品教师在线视频| 看免费成人av毛片| 日本wwww免费看| 啦啦啦中文免费视频观看日本| 欧美3d第一页| 欧美+日韩+精品| 国产精品成人在线| 男女高潮啪啪啪动态图| 久久人人爽人人片av| 日韩一区二区视频免费看| 久久精品国产亚洲av高清一级| 少妇人妻久久综合中文| 99久国产av精品国产电影| 91成人精品电影| 最近中文字幕2019免费版| 国产一区二区在线观看av| 91在线精品国自产拍蜜月| 韩国高清视频一区二区三区| 成年人免费黄色播放视频| 黄片无遮挡物在线观看| 一区二区三区四区激情视频| www.自偷自拍.com| 中文字幕另类日韩欧美亚洲嫩草| av免费在线看不卡| 中文乱码字字幕精品一区二区三区| 波多野结衣av一区二区av| 大陆偷拍与自拍| 日韩不卡一区二区三区视频在线| 亚洲综合精品二区| 精品一品国产午夜福利视频| 欧美亚洲 丝袜 人妻 在线| 国产亚洲最大av| 亚洲欧美一区二区三区国产| 亚洲视频免费观看视频| 亚洲熟女精品中文字幕| 亚洲国产欧美网| 国产在线一区二区三区精| 女性生殖器流出的白浆| 爱豆传媒免费全集在线观看| 亚洲国产精品成人久久小说| 日韩在线高清观看一区二区三区| 五月伊人婷婷丁香| 日本爱情动作片www.在线观看| 丝袜美足系列| 9191精品国产免费久久| 免费高清在线观看日韩| 国产精品无大码| 日韩中字成人| 久久久精品94久久精品| av卡一久久| 成年人午夜在线观看视频| 妹子高潮喷水视频| 免费黄频网站在线观看国产| 黄色配什么色好看| 中文天堂在线官网| 欧美激情高清一区二区三区 | 久久97久久精品| 大片免费播放器 马上看| 亚洲国产欧美网| www日本在线高清视频| 精品少妇一区二区三区视频日本电影 | 久久这里有精品视频免费| 80岁老熟妇乱子伦牲交| 在线精品无人区一区二区三| 亚洲国产精品一区二区三区在线| 国产 一区精品| 18禁裸乳无遮挡动漫免费视频| 男女高潮啪啪啪动态图| 午夜福利视频精品| 久久人人爽人人片av| 国产精品麻豆人妻色哟哟久久| 亚洲精品美女久久久久99蜜臀 | 青春草视频在线免费观看| 老汉色av国产亚洲站长工具| 这个男人来自地球电影免费观看 | 国产色婷婷99| 欧美最新免费一区二区三区| 日韩一本色道免费dvd| 亚洲伊人久久精品综合| av在线播放精品| 少妇 在线观看| 亚洲国产毛片av蜜桃av| 精品少妇黑人巨大在线播放| 国产男女超爽视频在线观看| 狠狠婷婷综合久久久久久88av| 大香蕉久久成人网| 亚洲欧洲国产日韩| 多毛熟女@视频| 啦啦啦在线免费观看视频4| 最近手机中文字幕大全| 国产精品熟女久久久久浪| 国产精品一二三区在线看| 久久精品国产鲁丝片午夜精品| 亚洲国产精品999| 国产精品无大码| 国产成人免费无遮挡视频| 丝瓜视频免费看黄片| av.在线天堂| 国产精品免费大片| 国语对白做爰xxxⅹ性视频网站| 9热在线视频观看99| 亚洲欧洲日产国产| 国语对白做爰xxxⅹ性视频网站| 中文字幕制服av| 在线观看人妻少妇| 叶爱在线成人免费视频播放| 国产精品成人在线| 麻豆乱淫一区二区| 婷婷色av中文字幕| 日本欧美视频一区| 永久网站在线| 精品久久蜜臀av无| 在现免费观看毛片| 亚洲第一av免费看| 精品国产乱码久久久久久男人| 婷婷色综合大香蕉| 国产一区亚洲一区在线观看| 我要看黄色一级片免费的| 亚洲精品中文字幕在线视频| 少妇的逼水好多| 国产在线视频一区二区| 欧美精品一区二区大全| 亚洲av男天堂| 久久午夜综合久久蜜桃| 侵犯人妻中文字幕一二三四区| 国产免费又黄又爽又色| 两个人免费观看高清视频| 国产成人精品在线电影| 国产 一区精品| 久久精品久久精品一区二区三区| 777久久人妻少妇嫩草av网站| 亚洲欧美色中文字幕在线| 人人妻人人爽人人添夜夜欢视频| 久久人妻熟女aⅴ| 亚洲精品日韩在线中文字幕| 777米奇影视久久| 久久国产亚洲av麻豆专区| 人妻系列 视频| 国产午夜精品一二区理论片| 天天操日日干夜夜撸| 午夜激情久久久久久久| 免费日韩欧美在线观看| 久久久久久久亚洲中文字幕| 黄频高清免费视频| 一本—道久久a久久精品蜜桃钙片| 性色avwww在线观看| 丁香六月天网| 狠狠婷婷综合久久久久久88av| 国产精品人妻久久久影院| 一本久久精品| 亚洲图色成人| 免费观看性生交大片5| a 毛片基地| 我的亚洲天堂| 韩国高清视频一区二区三区| 亚洲,欧美,日韩| 免费人妻精品一区二区三区视频| 亚洲av电影在线观看一区二区三区| 亚洲精品成人av观看孕妇| kizo精华| 超色免费av| 成人漫画全彩无遮挡| 国产一级毛片在线| 在线天堂中文资源库| 搡女人真爽免费视频火全软件| 91在线精品国自产拍蜜月| 三级国产精品片| 欧美激情 高清一区二区三区| 亚洲av欧美aⅴ国产| 有码 亚洲区| 国产精品熟女久久久久浪| 97在线人人人人妻| 成人亚洲精品一区在线观看| 69精品国产乱码久久久| 国产视频首页在线观看| 欧美国产精品va在线观看不卡| 熟妇人妻不卡中文字幕| 尾随美女入室| 青草久久国产| 亚洲情色 制服丝袜| 亚洲精品第二区| 热99久久久久精品小说推荐| 美女大奶头黄色视频| 国产精品免费大片| 丝袜脚勾引网站| 国产精品麻豆人妻色哟哟久久| 超色免费av| 亚洲精品国产av成人精品| 黄片小视频在线播放| 一本色道久久久久久精品综合| 韩国高清视频一区二区三区| 国产精品 国内视频| 少妇猛男粗大的猛烈进出视频| 美女中出高潮动态图| 哪个播放器可以免费观看大片| 亚洲精品日本国产第一区| 欧美日本中文国产一区发布| 国产激情久久老熟女| 18禁观看日本| 波多野结衣一区麻豆| 成年人午夜在线观看视频| 看免费成人av毛片| 国产精品女同一区二区软件| 日韩精品免费视频一区二区三区| av片东京热男人的天堂| 中文字幕亚洲精品专区| 日产精品乱码卡一卡2卡三| 性色avwww在线观看| 18禁国产床啪视频网站| 国产亚洲午夜精品一区二区久久| tube8黄色片| 午夜av观看不卡| 久久久久精品性色| 久久精品人人爽人人爽视色| 欧美中文综合在线视频| 国产一区有黄有色的免费视频| 成人黄色视频免费在线看| 亚洲精品日本国产第一区| 色94色欧美一区二区| 欧美精品av麻豆av| 日韩一区二区视频免费看| 国产一区二区在线观看av| 久久久精品区二区三区| av网站免费在线观看视频| 丰满少妇做爰视频| av有码第一页| 91在线精品国自产拍蜜月| 秋霞伦理黄片| 亚洲av福利一区| 久久久久久人妻| 国产黄频视频在线观看| 欧美日韩精品网址| 免费观看在线日韩| 国语对白做爰xxxⅹ性视频网站| 精品少妇黑人巨大在线播放| 精品第一国产精品| 国产午夜精品一二区理论片| 亚洲国产欧美在线一区| 免费黄频网站在线观看国产| 亚洲综合色惰| 午夜精品国产一区二区电影| 1024视频免费在线观看| 久久久久网色| 国产成人精品久久久久久| 成人18禁高潮啪啪吃奶动态图| 亚洲第一av免费看| 亚洲成国产人片在线观看| 香蕉精品网在线| 午夜日本视频在线| 欧美国产精品va在线观看不卡| 看十八女毛片水多多多| 成人漫画全彩无遮挡| 在线观看免费视频网站a站| 日韩制服骚丝袜av| 久久人人97超碰香蕉20202| 日产精品乱码卡一卡2卡三| 亚洲一区中文字幕在线| 肉色欧美久久久久久久蜜桃| 大片免费播放器 马上看| 欧美人与善性xxx| 国产精品三级大全| 日韩视频在线欧美| 日韩中文字幕视频在线看片| 精品亚洲成a人片在线观看| 香蕉国产在线看| 最近的中文字幕免费完整| 国产免费福利视频在线观看| 久久精品国产综合久久久| 欧美日本中文国产一区发布| 久久久久久久久免费视频了| 免费在线观看完整版高清| 国产精品 欧美亚洲| 国产精品麻豆人妻色哟哟久久| 日韩精品有码人妻一区| 三上悠亚av全集在线观看| 亚洲人成电影观看| 麻豆精品久久久久久蜜桃| 纵有疾风起免费观看全集完整版| 欧美国产精品va在线观看不卡| 久久久久久久久久人人人人人人| videossex国产| 五月开心婷婷网| 我的亚洲天堂| 十八禁网站网址无遮挡| xxxhd国产人妻xxx| 熟女av电影| 国产亚洲午夜精品一区二区久久| 人妻 亚洲 视频| 日韩av免费高清视频| 免费黄频网站在线观看国产| 爱豆传媒免费全集在线观看| av在线app专区| 26uuu在线亚洲综合色| 久久久精品区二区三区| 国产一区二区三区av在线| 国产日韩欧美视频二区| 国产黄频视频在线观看| 妹子高潮喷水视频| 午夜av观看不卡| 久久久精品区二区三区| 青草久久国产| 黄色 视频免费看| 一级毛片黄色毛片免费观看视频| 亚洲成人手机| 亚洲成色77777| 国产免费视频播放在线视频| 伦理电影大哥的女人| 亚洲色图综合在线观看| 成人免费观看视频高清| av卡一久久| 女性生殖器流出的白浆| 精品卡一卡二卡四卡免费| av有码第一页| 国产免费一区二区三区四区乱码| 黑丝袜美女国产一区| 99久久综合免费| 国产在线免费精品| 免费观看av网站的网址| 一区二区三区乱码不卡18| 国产精品.久久久| 久久97久久精品| 精品一区二区三卡| 男人操女人黄网站| 在线 av 中文字幕| 亚洲成av片中文字幕在线观看 | 不卡视频在线观看欧美| 国产激情久久老熟女| 亚洲伊人色综图| 天天躁夜夜躁狠狠久久av| 在线观看免费高清a一片| 18禁国产床啪视频网站| av片东京热男人的天堂| 欧美亚洲日本最大视频资源| 永久网站在线| 在线观看免费高清a一片| 精品一品国产午夜福利视频| 日本午夜av视频| 嫩草影院入口| 国产xxxxx性猛交| 两性夫妻黄色片| 色播在线永久视频| 国产精品国产av在线观看| 人人妻人人澡人人看| 久久精品久久久久久久性| 成人亚洲欧美一区二区av| 国产人伦9x9x在线观看 | 日本wwww免费看| 亚洲五月色婷婷综合| 欧美日韩综合久久久久久| 国产视频首页在线观看| av线在线观看网站| 超色免费av| 老司机亚洲免费影院| 精品人妻熟女毛片av久久网站| 熟女少妇亚洲综合色aaa.| 精品视频人人做人人爽| 国产亚洲最大av| 欧美激情 高清一区二区三区| 中国国产av一级| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 男人舔女人的私密视频| 精品一区二区免费观看| 午夜影院在线不卡| 精品久久蜜臀av无| av视频免费观看在线观看| 久久午夜综合久久蜜桃| 国产精品二区激情视频| 久久 成人 亚洲| 亚洲成色77777| 精品久久久精品久久久| 亚洲一码二码三码区别大吗| 秋霞在线观看毛片| av免费观看日本| 精品99又大又爽又粗少妇毛片| 日韩不卡一区二区三区视频在线| 少妇精品久久久久久久| 国产男女内射视频| 另类亚洲欧美激情| 欧美日韩视频高清一区二区三区二| 精品人妻熟女毛片av久久网站| 久久 成人 亚洲| 国产av精品麻豆| 不卡av一区二区三区| 国产成人精品久久二区二区91 | 亚洲国产成人一精品久久久| 女人精品久久久久毛片| h视频一区二区三区| 男女国产视频网站| 亚洲,欧美,日韩| 国产成人免费无遮挡视频| 久久国产精品大桥未久av| 最近手机中文字幕大全| 久久免费观看电影| 国产一级毛片在线| 久久久久久伊人网av| 欧美av亚洲av综合av国产av | 亚洲欧美一区二区三区国产| 午夜av观看不卡| 日韩制服丝袜自拍偷拍| 日韩三级伦理在线观看| 赤兔流量卡办理| 9色porny在线观看| 国产成人精品在线电影| 成年人午夜在线观看视频| 2022亚洲国产成人精品| 国产精品蜜桃在线观看| 亚洲一级一片aⅴ在线观看| 日韩电影二区| 天堂8中文在线网| 国产成人精品福利久久| 一本大道久久a久久精品| 美女大奶头黄色视频| 久久精品久久久久久久性| 日韩精品有码人妻一区| 国产免费又黄又爽又色| 丰满迷人的少妇在线观看| 国产欧美亚洲国产| 亚洲精品国产av成人精品| 老鸭窝网址在线观看| 国产精品国产三级国产专区5o| 日本色播在线视频| 97在线人人人人妻| 一边亲一边摸免费视频| 尾随美女入室| 9191精品国产免费久久| 男的添女的下面高潮视频| 建设人人有责人人尽责人人享有的| 观看av在线不卡| 97在线人人人人妻| 欧美国产精品一级二级三级| 看免费成人av毛片| 欧美人与性动交α欧美软件| 18在线观看网站| 亚洲精品国产一区二区精华液| 在线观看一区二区三区激情| 搡老乐熟女国产| av有码第一页| av女优亚洲男人天堂| 中文欧美无线码| 伊人久久大香线蕉亚洲五| 亚洲精品乱久久久久久| 久久久欧美国产精品| 高清不卡的av网站| 最近最新中文字幕大全免费视频 | 在线 av 中文字幕| 街头女战士在线观看网站| 老熟女久久久| www.精华液| 捣出白浆h1v1| 高清欧美精品videossex| 国产黄色免费在线视频| 999久久久国产精品视频| xxx大片免费视频| 亚洲第一青青草原| 欧美日韩国产mv在线观看视频| 欧美精品一区二区大全| 国产精品蜜桃在线观看| 亚洲精品乱久久久久久| 亚洲国产精品999| 久久午夜福利片| 中文天堂在线官网| 纯流量卡能插随身wifi吗| 在线观看三级黄色| 亚洲成av片中文字幕在线观看 | 亚洲精品美女久久久久99蜜臀 | 国产免费视频播放在线视频| 永久免费av网站大全| 亚洲精品中文字幕在线视频| 女人精品久久久久毛片| 亚洲第一青青草原| 午夜老司机福利剧场| 日韩av不卡免费在线播放| 久久久久久人人人人人| 久久久久视频综合| 国产成人一区二区在线| 国产精品久久久久成人av| 国产精品偷伦视频观看了| av在线app专区| 国产精品一区二区在线不卡| 性高湖久久久久久久久免费观看| 久久久久精品性色| 欧美日韩精品成人综合77777| 国产一区有黄有色的免费视频| 两个人看的免费小视频| 欧美激情高清一区二区三区 | 午夜福利,免费看| 一级毛片我不卡| 日韩av在线免费看完整版不卡| www.自偷自拍.com| 激情五月婷婷亚洲| 久久久国产精品麻豆| 男人爽女人下面视频在线观看| 观看av在线不卡| 青春草视频在线免费观看| 日本爱情动作片www.在线观看| 久久人妻熟女aⅴ| 久久久精品区二区三区| 久久久久视频综合| 久久精品国产亚洲av涩爱| 国产在视频线精品| 在线观看免费日韩欧美大片| 久久国产亚洲av麻豆专区| 中文天堂在线官网| www.自偷自拍.com| 伦理电影免费视频| 99国产综合亚洲精品| 一边摸一边做爽爽视频免费| 久久久精品国产亚洲av高清涩受| 国产精品国产av在线观看| 国产免费一区二区三区四区乱码| 国产极品天堂在线| 久久久a久久爽久久v久久| 丰满迷人的少妇在线观看| 精品国产乱码久久久久久男人| 激情视频va一区二区三区| 少妇人妻久久综合中文| 久久久欧美国产精品| 一级毛片我不卡| 黄片无遮挡物在线观看| 国产免费又黄又爽又色| 中文字幕av电影在线播放| 成人毛片a级毛片在线播放| 成年av动漫网址| 亚洲精品国产色婷婷电影| 人体艺术视频欧美日本| 久久久久久免费高清国产稀缺| 大码成人一级视频| 国产欧美亚洲国产| 狂野欧美激情性bbbbbb| 亚洲国产av新网站| 欧美激情 高清一区二区三区| 我要看黄色一级片免费的| 男女边摸边吃奶| 亚洲成人一二三区av| 搡女人真爽免费视频火全软件| 80岁老熟妇乱子伦牲交| av卡一久久| 欧美日韩成人在线一区二区| 日本91视频免费播放| 日韩成人av中文字幕在线观看| 永久免费av网站大全| 久久久精品区二区三区| 成人国产麻豆网| 午夜影院在线不卡| 啦啦啦在线免费观看视频4| a级毛片在线看网站| 午夜精品国产一区二区电影| 亚洲成国产人片在线观看| 两个人免费观看高清视频| 久久韩国三级中文字幕| 免费高清在线观看视频在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 校园人妻丝袜中文字幕| 纵有疾风起免费观看全集完整版| 国产深夜福利视频在线观看| 亚洲av电影在线观看一区二区三区| 亚洲欧美精品自产自拍| 欧美 日韩 精品 国产| 久久久精品94久久精品| 国产av精品麻豆| 美女视频免费永久观看网站| av又黄又爽大尺度在线免费看| 国产精品.久久久| 一边摸一边做爽爽视频免费| 久久久久国产一级毛片高清牌| 伦理电影大哥的女人| 三级国产精品片| 啦啦啦在线观看免费高清www| 看十八女毛片水多多多| 韩国高清视频一区二区三区| 亚洲av成人精品一二三区| 男人添女人高潮全过程视频| 久久久久久久久免费视频了| 最近中文字幕2019免费版|