• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multi-Candidate Voting Model Based on Blockchain

    2021-11-07 02:22:54DongliangXuWeiShiWenshengZhaiandZhihongTian
    IEEE/CAA Journal of Automatica Sinica 2021年12期

    Dongliang Xu,Wei Shi,Wensheng Zhai,and Zhihong Tian

    Abstract—Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as its need for a concurrent guaranteed trusted third party,should not be overlooked.With the advent of blockchain technology in recent years,its features such as decentralization,anonymity,and non-tampering have made it a good candidate in solving the problems that electronic voting faces.In this study,we propose a multi-candidate voting model based on the blockchain technology.With the introduction of an asymmetric encryption and an anonymity-preserving voting algorithm,votes can be counted without relying on a third party,and the voting results can be displayed in real time in a manner that satisfies various levels of voting security and privacy requirements.Experimental results show that the proposed model solves the aforementioned problems of electronic voting without significant negative impact from an increasing number of voters or candidates.

    I.INTRODUCTION

    A.Motivation and Significance

    ELECTRONIC voting is an online voting method based on cryptography technology.Voters can vote conveniently online through mobile phones,computers,and other terminals[1].This method will automatically count the votes and display the voting results.However,existing electronic voting models are frequently disputed by the public due to their opacity and vulnerability to loss of voting data,breach of personal privacy,and hackers’ attacks stemming from the centralization of data storage and the generated voting results.

    Since the birth of Bitcoin [2]in 2008,digital currency has steadily gained attention.From 2014 onwards,researchers have intensively focused on its underlining technology,namely,blockchain.Its decentralization,anonymity,and nontampering characteristics have led to research on its applicability to credit investigation,trade,finance,Internet of vehicles [3],smart campus virtualization platform [4],and other fields.

    The application of blockchain technology to electronic voting can significantly improve its anonymity,eligibility,and impartiality through data decentralization,anonymity,nontampering,and other features,as well as its functions such as automatic vote counting and examination with a smart contract.Szabo [5]defined smart contracts as a set of commitments in a digital form,including agreements on which contract participants can enforce these commitments.An agreement is a set of rules that both parties must abide by,and commitments include contract terms for implementing business logic and rules-based operations that define the nature and purpose of the contract.The digital form indicates that the contract will be composed of codes whose output can be predicted and executed automatically.Developing an efficient and effective smart contract that adapts to necessary security levels remains a problem to be tackled.On the basis of blockchain and smart contracts,this study uses an elliptic curve encryption algorithm for signature and verification.This study proposes a general electronic voting model based on blockchain,which is implemented and tested in Hyperledger Fabric.Furthermore,this study compares the security objectives and application scope with existing models.It leaves the investigation of a new secure blockchain-based solution for electronic voting to the future work.

    B.State of the Art

    With the development of Internet technology [6]and cryptography,online electronic voting has become a new voting solution that can effectively solve the disadvantages of traditional paper voting such as high cost,tedious steps,and numerous errors.Existing electronic voting models mainly include ring and blind signature-based,anonymous channelbased [7],homomorphic encryption-based,and hybrid network-based electronic voting models.Generally,ring and blind signatures require anonymous channel and a trusted third party (TTP) as signatories,whereas homomorphic encryption and hybrid network have high computational complexity,making them difficult to put into practice.

    Fig.1.Blockchain schematic.

    Chaum [8]proposed the first electronic voting model,which adopted the public key cryptosystem,and used digital false name voting to hide the identity of the voter; thus,any party concerned could verify whether the ballot was fully counted by using digital false name voting,thereby realizing the integrity of votes counting.In 1985,Cohen and Fisher [9]suggested an electronic voting model based on homomorphic encryption,which required the entire voting process to be kept synchronous.Benaloh and Tuinstra [10],Sako and Kilian[11],and Iverson [12]presented their own electronic voting models based on homomorphic encryption,but each model has advantages and disadvantages and is impractical with large-scale transmission and high-intensity calculation,thereby making them unsuitable for large-scale voting.

    The first practical large-scale scenario of an electronic voting model (i.e.,FOO) was proposed by Fujiokaet al.in 1992 [13].In this model,the roles of voting participants are voting initiator,voter,and vote-counting persons,who use blind signature and bit-promise technology to encrypt the voting information and send it to a TTP to count the votes.Evidently,the model can neither abandon the vote nor completely guarantee whether the TTP is credible.However,the model still attracts considerable attention,and many universities and research institutions have improved and developed the corresponding electronic voting software system.However,any of the above-mentioned electronic voting models,including the FOO,must be based on a TTP,a credible counting body,to count the votes.Such centralization is a huge risk to voters’ privacy and will lead to data tampering and loss.Given that these protocols have a TTP and require voters to trust the TTP,users are unable to detect and defend against collusion attacks by counting agencies and regulators.The existence of these problems will lead to the distrust of users and thus restrict the promotion of electronic voting.

    In 2002,Kiayias and Yung [14]proposed the first electronic voting model that was capable of self-counting and used open third-party voting procedures to count votes; moreover,these researchers introduced a fault-tolerant mechanism,which is applicable to small-scale scene voting,to correct “faults” in the voting process.Haoet al.[15]presented a two-round anonymous voting model with a self-counting function in 2010,thereby significantly improving the efficiency,calculation cost,and number of rounds because this model did not require anonymous channels.Such electronic voting models with self-counting capability weaken the TTP,convert the counting process into a publicly verifiable process,and allow any party concerned to perform and verify the counting process after all votes have been cast,thus weakening the unique status of counting institutions and enhancing the credibility of electronic voting.

    In recent years,with the popularity of Bitcoin,the underlying blockchain technology has also gained the attention of many researchers.As shown in Fig.1,blockchain[16]is involved in any number of nodes in the system.A ll information is stored over a period of time through the calculation of cryptography algorithm and records in data blocks.In addition,the generated data “password” is used to verify the validity of the information and links to the next block and jointly by all participating node systems to decide whether the record is authentic.In the blockchain,to maintain the same data in the whole chain and ensure the fairness of each participant,all participants must have a unified protocol;that is,the consensus mechanism solves the problem of unifying data [17]in the blockchain and the problem of trust caused by proceeding to the center [18].

    Blockchain is essentially an open,transparent,nontamperable distributed database ledger technology [19]that records all transaction information.In the absence of thirdparty intermediaries,blockchain has the characteristics of decentralization and non-tampering,which is conducive to solving problems such as difficult verification,privacy disclosure,and tampering with votes.Moreover,a smart contract can complete the self-counting function and realize the automatic vote counting process.

    Recently,researchers developed many applications in accordance with these characteristics.Leeet al.[20]proposed a blockchain-based voting platform in 2016 to conduct national-level elections.The paper only gives a description of the process of the model and requires a TTP to conduct hidden user votes and vote counting.Yan and You [21]used the distributed ElGamal encryption system and zero-know ledge proof protocol; they also designed and developed a blockchain voting platform based on Ethereum and adopted the digital signature identity access mechanism to ensure the identity legitimacy of voters.In this paper,we propose a secure electronic voting model for additional candidates,and a smart contract,which was implemented in the TTP.The proposed model is designed to replace the traditional voting protocol in order to decrease the cost of the trust system.Using a digital signature (i.e.,the identity of the access mechanism to ensure the legitimacy of voters’ identity),a voting blockchain platform is designed and developed on the basis of the etheric fang platform.

    Crameret al.[22]first proposed the problem of multicandidate voting in 1996 and suggested a “1-out-of-m” multicandidate voting model (i.e.,selecting one candidate among multiple candidates).However,considering that the model uses the ElGamal homomorphic encryption system,the calculation is complex.Thus,the model cannot be extended from 1-out-of-mtok-out-of-m(i.e.,multiple candidates are selected from multiple candidates) type voting.In 2006,Zhonget al.[23]proposed ak-out-of-mmulti-candidate voting protocol that combined secure multi-party and multiprecision computation without central trusted institutions.This model satisfies the characteristics of anonymity,fairness,and non-repeatable voting of electronic voting and is a favorable solution.

    C.Elliptic Curve Cryptography Algorithm

    The encryption algorithm and key distribution [24]and management mechanisms [25]used in this study are mainly based on elliptic curve cryptography (ECC).ECC is used to establish public key encryption [26]based on elliptic curve mathematics.The use of the elliptic curve mathematics in cryptography was introduced in 1987 by Koblitz [27]and M iller [28].

    The mathematical basis of ECC is the in solubility of elliptic curve discrete logarithm problem (ECDLP).Discrete logarithm problem on elliptic curve: known elliptic curveEp(a,b)on finite fieldFp,and the pointG(x,y),X(X=xG,x

    D.Security Requirements for Blockchain-Based Electronic Voting Models

    A fter studying the existing electronic voting models and the characteristics of blockchain,we introduce the following requirements that a blockchain-based secure [29]electronic voting model must satisfy:

    1) Legitimacy:The voting activity initiated by the poll sponsor shall be reviewed to ensure that the content of the poll is presented in accordance with the requirements of the law.Moreover,voters must satisfy the voting requirements and thus,unqualified voters are prohibited from voting.

    2) Anonymity:The identity of the voter is hidden.The content of the ballot will be encrypted to prevent the ballot information from being stolen maliciously and then leaked to affect the voting process.

    3) “Unforgeability”:The attacker cannot forge the voting information,and the recorded legal voting information cannot be tampered with.Voters can verify whether their votes are correct and valid through the model to ensure that the voting results cannot be forged.

    4) Self-Counting:Third-party or manual vote counting is no longer necessary when the final result of a voting is counted by the model and the vote results are automatically updated.The voting process shows when a vote is cast,and the voting result changes accordingly without revealing the voters’specific voting content.

    II.K-OUT-OF-M ELECTRONIC VOTING MODEL

    In this paper,we propose an electronic voting model ofkout-of-m(i.e.,voters can selectk,k∈[0,m]frommcandidates) based on the blockchain technology.The model uses the characteristics of blockchain to decrypt every ballot under the premise of guaranteeing the anonymity of voters,namely,the model can perform complex transmission of voting information without compromising voters’ identities.Most importantly,the model is not limited to a specific implementation of a certain blockchain.The voting model can be realized provided that the blockchain platform uses ECC asymmetric encryption and has access to mechanism and as mart contract.

    A.Model Establishment

    In this model,the main participants are the counting nodeV0,the verified voters (V1,V2,...,Vn),the candidates(C0,C1,...,Cm?1),voting initiatorI,andKcandidates (Kis a variable).Among them,the voting initiatorImust ensure that the content of the voting is in compliance with relevant laws and regulations,and voters must be verified to have the right to vote to enter the blockchain network (such as uploading some certification materials).Given that the two requirements mentioned above have different verification standards in various situations,this model assumes that the two requirements have been established.

    1) Counting Node and Votes:The counting nodeV0in the model is automatically generated by the smart contract afterIsuccessfully initiates the voting and is deployed on the node provided by the initiator.This node becomes the counting nodeV0and cannot be logged into by any user.It only serves as the communication object of each voter and is responsible for recording and displaying the voting situation.Counting nodes can be considered as special contract accounts in the existing Ethereum and Hyperledger Fabric platforms.

    whereG(x,y) is a point in the elliptic curveEp(a,b),in which,in the given finite fieldFp,nis the order ofG;XV0is the public key ofV0;andxV0is the private key ofV0.The votecounting nodeV0generatesXV0andxV0using formula (1) and broadcasts itsXV0to all nodes before the voting start timeTstart.

    Voters in the model (V1,V2,...,Vn) are the user nodes that can be logged into and constitute the main body of the voting activity.A fter legitimacy verification,the user can access the blockchain network and become the new voter.Voters select candidates and vote.Voters as nodes are part of the blockchain and keep accounts in accordance with the consensus mechanism to ensure the authenticity and credibility of information on the chain.

    whereG(x,y)is a point in the elliptic curveEp(a,b),in which,in the given finite fieldFp,nis the order ofG;XV1···Vnare the public keys of (V1···Vn);andxV1···Vnare the private keys of(V1···Vn).The vote-counting nodes (V1···Vn) generateXV1···VnandxV1···Vnusing formula (2) and broadcast theirXV1···Vnto all nodes before the voting start timeTstart.

    2) Voting Information:The model supportsk-out-of-mtype voting,and the voting informationmesencoding mode is ambit binary number converted into a decimal number as shown in Table I.

    3) Voting Anonymity Confusion Algorithm:The use of blockchain for electronic voting also raises new questions.In the case of voting,e.g.,the encrypted information transmitted during a vote and the time will be recorded on the blockchain.Among them,mesis invisible through encryption.However,in accordance with the voting time of different voters recorded on the chain and the number of votes changing in real time displayed byV0,the voters’mesis completely infeasible to infer.Given this situation,we propose an anonymitypreserving voting (APV) algorithm for voting to ensure the anonymity of the model.

    A lgorithm 1 APV A lgorithm Require: P//Maximum number of mixed voters mes1···mesC( )//Votes information r1,r2,...,rmEnsure: R( )//The number of votes startp=1 restC=Cwhile do//The number of remaining voters restC>P+1//The number of remaining voters is greater than the maximum number of mixed voters plus one 2,Pp∈[2,P]p=Rand( )//Generating a random number messtartp···messtartp+p?1) V0 mes g=( )// received pof and divided them into group g? ∈for rgdo Wait(p)//Wait for a multiple of p(ms)Update(R,r)//Update the total number of votes Rbased on r restCrestC?p==startp startp+p p=restC g=( )// received the last pof and divided them into group g mesC?p···mesCV0 mes? ∈for rgdo Wait(p)//Wait for a multiple of p(ms)Update(R,r)//Update the total number of votes Rbased on r

    B.Model Specification

    1) Voting Information Transmission:As shown in Fig.2,the voting informationmsgis transmitted after encryption in the blockchain.The following information is an example of the voting data transmission of the voting nodeV1to illustrate the information encryption transmission and verification method of the model.

    a)V1generatesmesV1:V1selectskcandidates to vote for.The selected candidates code is 10···01,and voting information ismsgV1=2m?1+1.

    TABLE IENCODING

    b)V1generatesDV1:

    whereis a random integer selected byV1(ris not necessarily equal tor′),andx(1) is the abscissa of.The encryptedEIV1is generated byV1usingXV0in accordance with Formula (1).

    c)V0decryptsCIV1:V0receivedCIV1=(c1,c2) fromV1.

    wherenis the order ofG.

    If this is true,thenmesV1is confirmed to be sent byV1and is thus not a forgery.

    2) Voting Process:After the voting is successfully initiated,Isets the voting start timeTstartand the voting end timeTend.BeforeTstart,V0generatesXV0andxV0,and broadcastsXV0;nqualified voters (V1,V2,...,Vn) access the blockchain network and generate {XV1,XV2,...,XVn},{xV1,xV2,...,xVn},and broadcast {XV1,XV2,...,XVn}.BetweenTstartandTend,each voter selectskcandidates and sends the encrypted information to the counting nodeV0.V0is responsible for identifying the voter,counting the qualified votes,and displaying the current voting result.As shown in Fig.3,the following is an example of the voting process of the voting nodeV1to illustrate the voting process of this model:

    V1selectskcandidates,so the selected candidate code is 10···01,form informationmesV1=2m?1+1.DV1is signed usingmesV1andxV1in accordance with the above-mentioned signature method.EIV1is encrypted usingDV1andXV1in accordance with the above-mentioned encryption method,andEIV1is sent toV0.

    A fter receivingEIV1fromV1,V0decryptsEIV1to determineDV1under the control of the smart contract and then verifies the signature inDV1usingXV1;if successful,thenmesV1is sent byV1and is not faked.Then,XV1is used as a mark to verify that this voter is a first-time voter.A fterward,mesV1is counted,andV1is marked as having voted.The voting informationEIV1is written into the blockchain.

    V0automatically counts the qualified votes received and shows the voting result by using Algorithm 1 under the control of the smart contract.

    When the time reachesTend,all users who have not voted will automatically generate voting informationmes=00···00.Then,it will be sent toV0.AfterV0has received the information of all voters,the final voting result is calculated.

    3) Decentralized:In the previous sections,we the use the concept of a counting node in the proposed model.It generates voting information and stores it in the blockchain network during interactions with the voters.However,the counting node is not a centralized database or a TTP in the traditional sense.Instead,it is essentially a node deployed by one or a group of smart contracts in the blockchain.The difference between the counting node and a voting node is that certain smart contracts must be executed on the counting node in order to complete the counting function.A ll the encrypted information generated by a voting activity will be recorded in the block,and the block is confirmed to be valid through the consensus mechanism,then stored in each participating node.Furthermore,the ballot can be modified solely by the counting function,which avoids the centralization risk of traditional electronic voting strategies.

    III.EXPERIMENT AND RESULT ANALYSIS

    We have proposed ak-out-of-mvoting model based on blockchain.In this section,the Hyperledger Fabric implementation model is adopted,and Hyperledger Caliper is used for the performance test to evaluate the accuracy and security properties of the model and compare it with other models.The Hyperledger Fabric [30]is a blockchain framework implementation by the Linux foundation,which leverages container technology to host smart contracts called“chaincode” that comprise the application logic of the system.The node deployed by chaincode can be considered our voting node.

    A.Experimental Environment and System Architecture for Model Validation

    Docker Compose [31]is a tool for defining and running multi-container Docker applications.We can use an Ain’t markup language (YAML) file to configure the application’s services with it.Then,with a single command,we implement and start all the services from our configuration in the YAML file.Therefore,we use Docker Compose to start multiple node containers on a single machine with the Hyperledger Fabric,rather than multiple physical machines,for experiments.Fig.4 illustrates the system architecture for model validation based on the Hyperledger Fabric.

    In Fig.4,voters use voting peers,which can be seen as voting nodes by the voting system,to access the blockchain network.The Certificate Authority node guarantees the access of voting nodes is legitimate; the orderer node guarantees the consistency of the voting information of each voter,the endorser node takes charge of verifying signatures,and the smart contract node takes charge of implementing smart contracts.The endorser node and the smart contract node can together be regarded as the counting node.

    B.Model Performance Test

    We used Hyperledger Caliper [32]for performance testing[33].This tool is used for a blockchain performance benchmark for Hyperledger Burrow,Fabric,Iroha,and Saw tooth.Currently,the supported performance indicators are success rate,transaction,read throughput transaction,read latency,and resource consumption.Moreover,the system uses a consensus mechanism based on Kafka [34].

    Fig.4.System architecture diagram for model validation.

    1) Relationship Between Number of Voters and Model Performance:The relationship between the number of voters and the performance of the model was tested.In the fabric network we implemented,the number of voters is the same as that of peer nodes,and the number of candidates is 10.When the performance of the model,the limit on the number of votes is temporarily removed,that is,each node can vote without limit.This is because if the number of votes is limited,the number of pieces of valid voting information will never exceed the number of nodes,and the performance cannot be tested in the case of a small number of nodes.In our experiment,each node votes or queries 1000 times at a specific frequency,referred to as the Send Rate.The experimental results are presented as follows.

    In Figs.5 and 6,vote refers to the voting operation,query refers to the operation of searching the voting result,Send Rate refers to the number of operation requests per second,Avg Latency refers to the average time delay of each operation,and Throughput refers to the number of completed operation requests per second.The delay of query illustrated in Fig.5 is approximately 0.02 s,and the throughput rate depicted in Fig.6 is close to the Send Rate.That is,every operation request can be processed in time,and the number of voters has no impact on the performance of query operation.In Fig.5,a vote’s delay increases rapidly with the Send Rate and slightly with the number of nodes.In Fig.6,the increase in the Send Rate of a vote’s time-dependent throughput rate rises slightly.Furthermore,the throughput rate decreases slightly with the increase in the number of nodes.Moreover,in actual conditions,each node will conduct a qualified vote once,and the delay and throughput rate of the voting operation are acceptable.As illustrated by the experimental results,the throughput rate and time delay of the voting operation as well as the viewing of voting results in the smallscale voting scenario satisfy the requirements of the model.

    2) Relationship Between the Number of Candidates and Performance:The model we designed is suitable for the “kout-of-m”-type voting because the size of the voting information depends onm.Thus,we must test the impact of different numbers of candidates on the performance of the model.The following experiment uses 4peers-1order(i.e.,the number of voters is 4),and the voting quantity limit is temporarily removed.Each node votes or queries by 1000 times in accordance with the different frequencies.The experimental results are presented as follows.

    Fig.5.Avg Latency with different numbers of voters.

    Fig.6.Throughput with different numbers of voters.

    In Figs.7 and 8,vote refers to the voting operation,query refers to the operation of searching the voting result,Send Rate refers to the number of operation requests per second,Avg Latency refers to the average time delay of each operation,and Throughput refers to the number of operation requests that can be completed per second.In Fig.7,when the number of candidates is not too large,it slightly influences the voting delay.The delay is too increased only when the number of candidates is very large.The number of candidates has a very minor influence on the delay of the query.In Fig.8,when the number of candidates is relatively small,it slightly influences the throughput of the voting.The throughput declines significantly only when the number of candidates is significantly large,whereas the number of candidates only slightly influences the throughput of a query.The number of candidates affects only the binary digits of the voting information.Thus,the influence the number of candidates has on the vote count hasO(n2) complexity.However,given that the counting process is simple,it only slightly influences the performance.The effect of the number of candidates on Algorithm 1 isO(n) complexity,with minimal impact on the performance.

    Fig.7.Avg Latency with different number of voters.

    Fig.8.Throughput with different number of voters.

    C.Self-Counting Accuracy Testing

    We tested the accuracy of self-counting by comparing the real results with the self-counting results.The actual voting time and the voting results were counted simultaneously to test the validity of Algorithm 1.In this experiment,the maximum number of mixed votes per node is 3.In addition,10peers-1order(i.e.,the number of voters is 10) is adopted,and the experiment is conducted in the case of 4 candidates.The experimental results are illustrated in Table II.

    TABLE IIMODEL SELF-COUNTING TEST

    The information presented in Table II is the voting information of the current voter,and the self-counting result is the real-time counting result displayed by the system when the current voter votes.Considering that the value ofpcannot be determined each time,the display delay of the voting results is completely random.In Table II,the voting information ofV3is 0010,and the difference between the self-counting result whenV3votes and the self-counting result whenV9votes are(0,1,1,1).Thus,the voting information ofV3cannot be inferred.Therefore,when the voting time and the selfcounting result time are known,the specific conditions of voters’ votes cannot be deduced regularly,but the current voting results can be displayed with a short delay,and the votes can be accurately counted after the voting ends.In addition,the entire vote counting process is conducted using a smart contract,and no artificial vote-counting drawbacks are observed.Given that the smart contracts are fully public,the voters can trust the results.Therefore,under the premise of guaranteeing anonymity,the model has the property of accurate self-counting.

    D.Model Security Testing

    The legitimacy of voting is guaranteed by the access audit of blockchain.Given the different legitimacy standards of voting,legitimacy is not discussed in this study.However,some attackers that intend to falsify the voting results can still be qualified to access the blockchain network.For example,in scenarios with loose standards of legitimacy review,such as a referendum,the identity of attackers and eligible voters can overlap,that is,attackers may be part of the eligible voters.On this basis,we tested the security properties of the model.

    To facilitate the testing of the performance of the model,we must remove the limit on the number of votes,but the security test must limit each voter to one eligible vote.Subsequently,we used the node configuration of 10peers-1order,set the maximum number of mixed votes to 3,and conducted multiple experiments in the case of 4 candidates to test the security of the proposed voting model.

    The experimental results are provided in Table III,assuming the following scenario:VAis a qualified voter and an attacker in the voting link,andV1is a non-attacker voter,and decryption is a necessary step of the query.Results show thatV1decryptedEIV1successfully,butV1voting withXV1andVAdecryptingEIV1both fail.V1voting withXV1succeeded only once.The above-mentioned experiments confirm the two properties of the model.The analysis and proofs are presented as follows.

    TABLE IIIMODEL SECURITY TESTING

    1) Property 1: Unforgeability:In Table III,the experiment ofV1voting withXV1only one time out of 100,thereby confirming thateach voter can vote only once in each voting activity,and the encoding of voting determines that each voter can vote at most once for each candidate.Therefore,a voter cannot forge a vote count.

    In Table III,VAfailed to vote multiple times withXV1,thoughVAhas the ability to send sending fake voting informationEIfV1(encrypted false voting information sent byV1)toV0with the public keyXV1,becauseVAhad determinedXV0,XV1,...,XVn.Then,V0receivedEIfV1and decrypted it withxV0under the control of the selected smart contract.Therefore,V0could determineD fV1,includingmesfV1andDfV1,and verify the signature forDfV1withXV1to obtainmes′fV1.becauseVAdid not havexV1.Finally,V0could determine that theEIfV1received is a forgery and would not write it to the blockchain.In summary,VAcould not vote asV1without a corresponding private key.That is,each voter cannot vote as another voter and falsify the result.

    Given that our proposed model is based on the blockchain implementation,and the information stored on the chain is the encrypted voting information,the qualified voting data that has been recorded could not be tampered.During all tests,no manual operation was performed during the counting process,and no random change in the votes was observed.In summary,the proposed model ensures the unforgeability of voting information and results.

    2) Property 2: Anonymity:Anonymity is mainly reflected in separating voters from their voting information.In our model,anonymity is enabled by encrypting the transmission of voting information as well as performing Algorithm 1.

    Except for the time stamp,the parties pass the information and the fixed relevant information in the blockchain.All the information passed and written to the block in the blockchain network isEI.Thus,all voters can provide allEI.As shown in Table III,all instances ofV1decryptingEIV1were clearly successful,but all instances ofVAdecryptingEIV1failed.In fact,ifVAaims to observe the voting informationmes1,then it mustobtainxV0,which can be converted from the solution of ECDLP[27].However,in 2017,Kusakaet al.[35]used the parallel Pollard ρ algorithm to solve a 114-bit pairing-friendly Barreto-Naehrig curve by spending six months on 2000 CPUs.Because ECDLP is unsolvable when the data size scales up,which is why obtaining the voting information of other voters through the decryption ofEIis not feasible.

    The experimental results and arguments summarized in Table III confirm that the specific voting information of voters cannot be inferred with the public information provided when Algorithm 1 is used in the voting model.Voters can not determine the specific voting information of other voters;thus,we conclude that the proposed model has achieved anonymity.

    E.Comparison with Existing Models

    We compared all the voting models discussed in this paper in terms of their voting methods,voting types,TTPs,counting methods,and the presence or absence of the mixed voting mechanism.The models involved in the comparison are all relatively mature voting models,which basically satisfy the anonymity and non-forgery requirements.

    The comparison results (see Table III) show that in terms of voting methods,unlike the FOO model,our proposed model uses the blockchain technology,thereby avoiding,problems caused by traditional electronic voting methods,such as the requirement for a TTP and the inability to unify votes in real time avoided.However,given the limitation of the blockchain technology,the throughput rate is lower in our model than in traditional electronic voting when the number of candidates scales up.This situation means that our model is suitable for small-scale voting scenarios.In terms of voting types,our proposed model supports “k-out-of-m” voting,which includes the “1-out-of-m” voting type of Yan’s model [21]with strong voting applicability.This model does not require a TTP to guarantee the voting process and results.A comparing with the model in [20],third-party vote-counting fraud is not an issue for our proposed model.Furthermore,our proposed model uses smart contract automatic vote counting,which is simpler and more efficient than the whole vote counting proposed in the model in [23].The smart contract code is open; thus,vote counting results are trustworthy.The vote counting result accuracy obtained by our proposed algorithm is much higher than that of the automatic vote counting proposed in the model in [15].In particular,A lgorithm 1 proposed in this study solves the problem of inferring the specific voting information of a voter on the basis of the available voting time and real-time voting results in the blockchain voting model,as shown in Table IV,thus,the model can display the voting results in real time without compromising the voters’ anonymity.In general,this model has great advantages in terms of anonymity,non-forgery,and self-counting and has disadvantages in its throughput rate in large-sized voting scenarios.Our proposed model is more suitable for small-sized and medium-sized voting scenarios.

    IV.CONCLUSIONS

    In this paper,we propose a “k-out-of-m” multi-candidate voting model based on blockchain technology that ensures: 1)the preservation of anonymity during the voting process through ECC encryption and a signature mechanism and 2)the prevention of forgery of voting information by combining blockchain technology,automatic statistics,and display of voting results through a smart contract.Furthermore,this study introduces an APV algorithm to mitigate the drawbacks of the blockchain voting method.We use the Hyperledger Fabric framework to conduct experiments on the proposed model.Hyperledger Caliper is used to test the performance of the model.Experiments are designed and tested extensively with respect to the security requirements of the model and the effectiveness and efficiency of the proposed APV algorithm.Through these experiments,we confirm that the model is particularly well suited for small-scale voting situations and overcomes the disadvantages of traditional electronic voting pertaining to lack of anonymity,excessive centralization,and ease of forgery.

    TABLE IVCOMPARISON OF KNOw N VOTING MODELS

    av卡一久久| 又黄又爽又刺激的免费视频.| 国产av国产精品国产| 成人手机av| 人妻一区二区av| 在线免费观看不下载黄p国产| 9色porny在线观看| 欧美日韩精品成人综合77777| 亚洲精华国产精华液的使用体验| 久久精品夜色国产| av天堂久久9| 搡女人真爽免费视频火全软件| 国产男女超爽视频在线观看| 欧美精品高潮呻吟av久久| 人妻人人澡人人爽人人| 成人国产av品久久久| 少妇熟女欧美另类| 青春草亚洲视频在线观看| 最黄视频免费看| 国产熟女欧美一区二区| 精品国产一区二区三区四区第35| 亚洲精品成人av观看孕妇| 欧美日韩视频高清一区二区三区二| 免费播放大片免费观看视频在线观看| 永久网站在线| 国产av一区二区精品久久| 美女视频免费永久观看网站| 久久精品国产综合久久久 | 啦啦啦啦在线视频资源| av卡一久久| 多毛熟女@视频| 亚洲天堂av无毛| 国产成人精品久久久久久| 亚洲精华国产精华液的使用体验| 狠狠精品人妻久久久久久综合| 久久国内精品自在自线图片| 黑人猛操日本美女一级片| 国产 一区精品| 国产有黄有色有爽视频| 少妇被粗大的猛进出69影院 | 考比视频在线观看| 亚洲精品中文字幕在线视频| 国产精品久久久久久av不卡| 亚洲综合色网址| 亚洲精品久久久久久婷婷小说| 欧美最新免费一区二区三区| 亚洲三级黄色毛片| 亚洲精品国产av蜜桃| www日本在线高清视频| 国产精品女同一区二区软件| 亚洲国产精品专区欧美| 视频在线观看一区二区三区| 国产一区二区激情短视频 | 亚洲欧洲国产日韩| 日韩人妻精品一区2区三区| 亚洲精品美女久久av网站| 老女人水多毛片| 国产乱来视频区| 精品少妇内射三级| 青春草亚洲视频在线观看| 色婷婷av一区二区三区视频| 男女边摸边吃奶| 久久女婷五月综合色啪小说| 日韩一区二区视频免费看| 天天躁夜夜躁狠狠躁躁| 国产精品熟女久久久久浪| 久久精品久久精品一区二区三区| 日韩中文字幕视频在线看片| 欧美精品一区二区免费开放| 亚洲欧美一区二区三区黑人 | 少妇的逼水好多| 中文字幕免费在线视频6| 一级黄片播放器| 大香蕉97超碰在线| 欧美日韩视频高清一区二区三区二| 中文精品一卡2卡3卡4更新| 男人舔女人的私密视频| 97精品久久久久久久久久精品| 黄色视频在线播放观看不卡| 人妻少妇偷人精品九色| 亚洲精品av麻豆狂野| 成人国语在线视频| 国产熟女午夜一区二区三区| 最近最新中文字幕大全免费视频 | 国产又爽黄色视频| 高清毛片免费看| 亚洲人与动物交配视频| 一本久久精品| 国产成人av激情在线播放| 国产国拍精品亚洲av在线观看| 欧美日韩精品成人综合77777| kizo精华| 亚洲少妇的诱惑av| 秋霞在线观看毛片| 中文精品一卡2卡3卡4更新| 午夜福利在线观看免费完整高清在| 精品国产一区二区三区四区第35| 国产爽快片一区二区三区| 人妻系列 视频| 免费日韩欧美在线观看| 最近中文字幕高清免费大全6| 国产亚洲欧美精品永久| 久久精品久久久久久噜噜老黄| 这个男人来自地球电影免费观看 | 欧美精品av麻豆av| 爱豆传媒免费全集在线观看| 免费播放大片免费观看视频在线观看| 亚洲一区二区三区欧美精品| 天堂中文最新版在线下载| 国产免费现黄频在线看| 久久亚洲国产成人精品v| 老女人水多毛片| 精品99又大又爽又粗少妇毛片| 韩国av在线不卡| 国产片特级美女逼逼视频| 大片免费播放器 马上看| 狂野欧美激情性xxxx在线观看| 中文精品一卡2卡3卡4更新| 人人妻人人澡人人看| 欧美日韩成人在线一区二区| 亚洲一码二码三码区别大吗| 岛国毛片在线播放| 热99久久久久精品小说推荐| 国产xxxxx性猛交| 99久久人妻综合| 国产一级毛片在线| 少妇 在线观看| 亚洲国产精品成人久久小说| 一级毛片我不卡| 9191精品国产免费久久| 校园人妻丝袜中文字幕| 成人影院久久| 午夜久久久在线观看| 日韩中文字幕视频在线看片| 菩萨蛮人人尽说江南好唐韦庄| 欧美bdsm另类| 国产精品一国产av| 超色免费av| av网站免费在线观看视频| 香蕉丝袜av| 国产精品一区二区在线观看99| 久久精品国产亚洲av涩爱| 日韩视频在线欧美| 久久久a久久爽久久v久久| 99久久人妻综合| 精品99又大又爽又粗少妇毛片| 女的被弄到高潮叫床怎么办| 人妻系列 视频| 国产精品国产三级国产专区5o| 久久精品夜色国产| 久久精品夜色国产| a 毛片基地| 欧美精品亚洲一区二区| 老司机亚洲免费影院| 高清欧美精品videossex| 午夜老司机福利剧场| 王馨瑶露胸无遮挡在线观看| 少妇猛男粗大的猛烈进出视频| 一二三四中文在线观看免费高清| 色视频在线一区二区三区| 视频中文字幕在线观看| 中国国产av一级| 成人18禁高潮啪啪吃奶动态图| 免费av中文字幕在线| 夫妻午夜视频| 狂野欧美激情性xxxx在线观看| 久久久精品94久久精品| 国产男人的电影天堂91| 亚洲精品久久午夜乱码| 亚洲国产精品成人久久小说| 精品人妻一区二区三区麻豆| 日本欧美视频一区| 巨乳人妻的诱惑在线观看| 国产淫语在线视频| 男人添女人高潮全过程视频| 国产淫语在线视频| 成年女人在线观看亚洲视频| 午夜免费观看性视频| 两个人免费观看高清视频| 欧美变态另类bdsm刘玥| 另类亚洲欧美激情| 久久av网站| 亚洲精品美女久久久久99蜜臀 | 丝袜喷水一区| 国产日韩欧美在线精品| 夜夜爽夜夜爽视频| 久热这里只有精品99| 亚洲人成网站在线观看播放| 国产精品不卡视频一区二区| 久久久久久久久久成人| 黄色配什么色好看| 性高湖久久久久久久久免费观看| 欧美最新免费一区二区三区| 熟女电影av网| 在线看a的网站| freevideosex欧美| 国产精品一国产av| 日本wwww免费看| 少妇的丰满在线观看| 午夜久久久在线观看| 伦理电影免费视频| 视频中文字幕在线观看| 18禁在线无遮挡免费观看视频| 精品卡一卡二卡四卡免费| 欧美 亚洲 国产 日韩一| 丝袜脚勾引网站| 国产精品国产三级国产专区5o| 啦啦啦啦在线视频资源| 久久久久久久国产电影| 日日啪夜夜爽| h视频一区二区三区| 另类亚洲欧美激情| 欧美日本中文国产一区发布| 亚洲人成77777在线视频| 免费女性裸体啪啪无遮挡网站| 久久99一区二区三区| 男女啪啪激烈高潮av片| 欧美日韩成人在线一区二区| 日韩中字成人| 日韩中文字幕视频在线看片| 夫妻午夜视频| 一区二区三区四区激情视频| 午夜老司机福利剧场| 国产精品久久久久久精品电影小说| 日韩一区二区三区影片| 纯流量卡能插随身wifi吗| 97在线人人人人妻| h视频一区二区三区| 精品少妇黑人巨大在线播放| 亚洲经典国产精华液单| 国产成人精品久久久久久| 1024视频免费在线观看| 婷婷色综合大香蕉| 一本—道久久a久久精品蜜桃钙片| 欧美少妇被猛烈插入视频| 成人影院久久| 日日撸夜夜添| 亚洲av福利一区| 午夜免费鲁丝| 美国免费a级毛片| 青春草国产在线视频| 日韩视频在线欧美| 国产免费现黄频在线看| 亚洲精品自拍成人| 人人妻人人澡人人看| √禁漫天堂资源中文www| 亚洲色图综合在线观看| 最后的刺客免费高清国语| 最近的中文字幕免费完整| 久久久久久人妻| 成年动漫av网址| 日韩,欧美,国产一区二区三区| 日本黄大片高清| 中文字幕人妻熟女乱码| 国产精品免费大片| 丝袜美足系列| 欧美日韩亚洲高清精品| 又黄又爽又刺激的免费视频.| 欧美老熟妇乱子伦牲交| 免费高清在线观看日韩| 亚洲精品自拍成人| 精品久久久久久电影网| 黑人猛操日本美女一级片| 18禁在线无遮挡免费观看视频| 亚洲精品成人av观看孕妇| 国产乱人偷精品视频| 热99久久久久精品小说推荐| 最近中文字幕2019免费版| 日本与韩国留学比较| 各种免费的搞黄视频| xxxhd国产人妻xxx| 黄色视频在线播放观看不卡| 观看美女的网站| 亚洲国产最新在线播放| 亚洲精品456在线播放app| 男女午夜视频在线观看 | 69精品国产乱码久久久| 国产男人的电影天堂91| 亚洲 欧美一区二区三区| a级毛片黄视频| 女人被躁到高潮嗷嗷叫费观| 国产精品久久久av美女十八| 国产探花极品一区二区| 永久免费av网站大全| 午夜av观看不卡| 2018国产大陆天天弄谢| 久久国产亚洲av麻豆专区| 午夜激情av网站| 亚洲图色成人| 久久人人97超碰香蕉20202| 建设人人有责人人尽责人人享有的| 在现免费观看毛片| videossex国产| 最近中文字幕高清免费大全6| 国国产精品蜜臀av免费| av片东京热男人的天堂| 波多野结衣一区麻豆| 国产永久视频网站| 中文字幕另类日韩欧美亚洲嫩草| 黄色配什么色好看| 国产成人一区二区在线| 两个人免费观看高清视频| 久久久a久久爽久久v久久| 久久久久久久国产电影| 丰满饥渴人妻一区二区三| 国产老妇伦熟女老妇高清| 欧美人与性动交α欧美软件 | 一级片免费观看大全| 国产成人91sexporn| 曰老女人黄片| 久久精品aⅴ一区二区三区四区 | 亚洲av综合色区一区| 欧美97在线视频| 国产精品一区二区在线观看99| 欧美亚洲 丝袜 人妻 在线| 日韩中文字幕视频在线看片| 亚洲欧美日韩另类电影网站| 女人久久www免费人成看片| 自拍欧美九色日韩亚洲蝌蚪91| 成人二区视频| 欧美日韩综合久久久久久| av线在线观看网站| 成年av动漫网址| 十分钟在线观看高清视频www| 性色avwww在线观看| 国产精品女同一区二区软件| 国产一区二区在线观看av| 亚洲中文av在线| 午夜福利视频在线观看免费| 热re99久久精品国产66热6| videossex国产| 中文字幕最新亚洲高清| 成人黄色视频免费在线看| 少妇 在线观看| 丰满迷人的少妇在线观看| 国产成人精品婷婷| 啦啦啦视频在线资源免费观看| 亚洲精品久久久久久婷婷小说| 亚洲av在线观看美女高潮| 超碰97精品在线观看| av在线老鸭窝| 国产探花极品一区二区| 精品酒店卫生间| 久久亚洲国产成人精品v| 少妇人妻精品综合一区二区| 国产精品一区www在线观看| 久久韩国三级中文字幕| 久久综合国产亚洲精品| 男女下面插进去视频免费观看 | 色婷婷久久久亚洲欧美| 观看美女的网站| 精品久久蜜臀av无| 超色免费av| 寂寞人妻少妇视频99o| 久久久精品免费免费高清| 极品少妇高潮喷水抽搐| 最后的刺客免费高清国语| 午夜福利视频精品| 久久午夜福利片| 侵犯人妻中文字幕一二三四区| 日本欧美国产在线视频| 97精品久久久久久久久久精品| 高清欧美精品videossex| 久久午夜综合久久蜜桃| 国产精品女同一区二区软件| 久久热在线av| 国产成人免费观看mmmm| 男人操女人黄网站| 亚洲国产精品999| 亚洲人成网站在线观看播放| 亚洲性久久影院| 欧美人与善性xxx| 18禁国产床啪视频网站| kizo精华| 九草在线视频观看| 免费高清在线观看日韩| 在线天堂最新版资源| 久久久久久久久久久久大奶| 一级片免费观看大全| 十分钟在线观看高清视频www| 一边亲一边摸免费视频| 各种免费的搞黄视频| 日本爱情动作片www.在线观看| 亚洲欧美清纯卡通| 国产亚洲午夜精品一区二区久久| 一级,二级,三级黄色视频| 日韩精品有码人妻一区| 日韩三级伦理在线观看| 久久久国产一区二区| www.熟女人妻精品国产 | 丰满迷人的少妇在线观看| 狂野欧美激情性bbbbbb| 欧美成人精品欧美一级黄| 日本91视频免费播放| 国产精品人妻久久久久久| 国产欧美亚洲国产| 免费高清在线观看视频在线观看| 久久影院123| 青春草国产在线视频| 亚洲在久久综合| 又大又黄又爽视频免费| 色婷婷久久久亚洲欧美| 亚洲精品一二三| 亚洲一区二区三区欧美精品| 久久久久精品久久久久真实原创| av在线播放精品| 十八禁高潮呻吟视频| av.在线天堂| 国产高清国产精品国产三级| 天天躁夜夜躁狠狠躁躁| 国产精品久久久久久久电影| 久久久国产一区二区| 久久精品夜色国产| 国产伦理片在线播放av一区| 中文字幕人妻熟女乱码| 亚洲情色 制服丝袜| 久久久久久久国产电影| 久久久精品免费免费高清| 国产精品无大码| 狂野欧美激情性xxxx在线观看| 久久精品国产鲁丝片午夜精品| 少妇的逼水好多| 日韩制服丝袜自拍偷拍| 久久久久久久久久成人| 在线观看免费日韩欧美大片| 伦理电影免费视频| 国产深夜福利视频在线观看| 老司机影院毛片| 搡女人真爽免费视频火全软件| 九色亚洲精品在线播放| 国产精品国产av在线观看| 国产成人免费观看mmmm| 国产成人aa在线观看| 日韩欧美一区视频在线观看| 久久久久久久久久人人人人人人| 国产麻豆69| 春色校园在线视频观看| 欧美+日韩+精品| 最新中文字幕久久久久| 国产国拍精品亚洲av在线观看| 色哟哟·www| 中文乱码字字幕精品一区二区三区| 亚洲少妇的诱惑av| 超色免费av| 我要看黄色一级片免费的| kizo精华| 亚洲天堂av无毛| 99久国产av精品国产电影| 人妻 亚洲 视频| 亚洲国产精品专区欧美| 亚洲国产精品一区三区| 精品亚洲乱码少妇综合久久| 岛国毛片在线播放| 九草在线视频观看| 亚洲熟女精品中文字幕| 亚洲内射少妇av| 日韩免费高清中文字幕av| 亚洲成av片中文字幕在线观看 | 99精国产麻豆久久婷婷| 男女边吃奶边做爰视频| 飞空精品影院首页| 国产一区二区三区综合在线观看 | 少妇的丰满在线观看| av不卡在线播放| 熟女av电影| 美女中出高潮动态图| 婷婷色麻豆天堂久久| 9191精品国产免费久久| 国产亚洲精品第一综合不卡 | 十分钟在线观看高清视频www| 美女国产高潮福利片在线看| 黑丝袜美女国产一区| 一级a做视频免费观看| 乱人伦中国视频| 一级片免费观看大全| 一级毛片我不卡| 中国美白少妇内射xxxbb| 日韩三级伦理在线观看| 欧美国产精品va在线观看不卡| 18禁国产床啪视频网站| 成人国语在线视频| 国产乱来视频区| 狠狠婷婷综合久久久久久88av| 激情五月婷婷亚洲| 亚洲国产精品国产精品| 日本免费在线观看一区| 有码 亚洲区| 男女午夜视频在线观看 | 日日摸夜夜添夜夜爱| 精品亚洲成a人片在线观看| 视频在线观看一区二区三区| 卡戴珊不雅视频在线播放| 成年人免费黄色播放视频| 亚洲综合色惰| 欧美成人精品欧美一级黄| 欧美精品一区二区大全| 在现免费观看毛片| 免费看光身美女| 有码 亚洲区| 久久精品国产a三级三级三级| 日韩中字成人| 精品国产国语对白av| 欧美激情极品国产一区二区三区 | 18禁观看日本| 夫妻性生交免费视频一级片| 校园人妻丝袜中文字幕| 日本欧美视频一区| 免费高清在线观看视频在线观看| 免费大片18禁| 日本91视频免费播放| 日韩不卡一区二区三区视频在线| 我要看黄色一级片免费的| 熟女av电影| 黑人猛操日本美女一级片| 另类精品久久| 日韩av在线免费看完整版不卡| 欧美日韩视频高清一区二区三区二| 秋霞伦理黄片| 色吧在线观看| 国产爽快片一区二区三区| 边亲边吃奶的免费视频| 欧美另类一区| 精品亚洲乱码少妇综合久久| 日韩中字成人| 欧美xxxx性猛交bbbb| 永久免费av网站大全| 97人妻天天添夜夜摸| 男女下面插进去视频免费观看 | 国产成人一区二区在线| 青春草亚洲视频在线观看| 亚洲人成网站在线观看播放| 一级毛片电影观看| 18+在线观看网站| 久久ye,这里只有精品| 欧美老熟妇乱子伦牲交| 激情五月婷婷亚洲| 麻豆乱淫一区二区| 母亲3免费完整高清在线观看 | 精品99又大又爽又粗少妇毛片| 亚洲美女黄色视频免费看| 欧美 亚洲 国产 日韩一| av有码第一页| 欧美少妇被猛烈插入视频| 老熟女久久久| 久久99蜜桃精品久久| 亚洲欧美日韩另类电影网站| 人体艺术视频欧美日本| 爱豆传媒免费全集在线观看| 中文字幕亚洲精品专区| 亚洲av国产av综合av卡| 国产成人aa在线观看| 狠狠婷婷综合久久久久久88av| 大片免费播放器 马上看| 国产成人精品一,二区| 少妇的丰满在线观看| 免费看av在线观看网站| 日本黄大片高清| 最后的刺客免费高清国语| 国产不卡av网站在线观看| 国产精品无大码| 免费看av在线观看网站| 街头女战士在线观看网站| 人妻少妇偷人精品九色| 日本-黄色视频高清免费观看| 卡戴珊不雅视频在线播放| 欧美激情极品国产一区二区三区 | 大片电影免费在线观看免费| 午夜影院在线不卡| 99热国产这里只有精品6| 麻豆乱淫一区二区| 国产一区二区激情短视频 | 欧美国产精品va在线观看不卡| 蜜桃在线观看..| 男女国产视频网站| 中文字幕制服av| 精品国产一区二区三区久久久樱花| 久久午夜福利片| 亚洲成av片中文字幕在线观看 | 成人综合一区亚洲| 国产国拍精品亚洲av在线观看| 性色av一级| av在线观看视频网站免费| 亚洲精品国产av成人精品| 最近最新中文字幕大全免费视频 | 亚洲av欧美aⅴ国产| 少妇人妻精品综合一区二区| 国产高清不卡午夜福利| 欧美国产精品va在线观看不卡| 国产成人精品无人区| 青春草亚洲视频在线观看| 久久久久久久亚洲中文字幕| 亚洲成国产人片在线观看| 一二三四在线观看免费中文在 | 男的添女的下面高潮视频| 亚洲综合精品二区| 国产一区二区激情短视频 | 欧美成人午夜精品| 欧美亚洲 丝袜 人妻 在线| 99久久综合免费| 午夜影院在线不卡| 欧美人与性动交α欧美精品济南到 | 成人漫画全彩无遮挡| 久久热在线av| 日韩欧美一区视频在线观看| 日韩中文字幕视频在线看片| 十八禁高潮呻吟视频| 国产精品偷伦视频观看了| 中文字幕免费在线视频6| 菩萨蛮人人尽说江南好唐韦庄| 国产精品99久久99久久久不卡 | 亚洲国产精品专区欧美| 国产av国产精品国产| 看十八女毛片水多多多| 欧美国产精品va在线观看不卡| 欧美xxⅹ黑人|