• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption

    2021-12-14 03:51:02TaoFengHongmeiPeiRongMaYouliangTianandXiaoqinFeng
    Computers Materials&Continua 2021年1期

    Tao Feng,Hongmei Pei,Rong Ma,Youliang Tian and Xiaoqin Feng

    1Lanzhou University of Technology,Lanzhou,730050,China

    2College of Computer Science and Technology,Guizhou University,Guizhou,China

    3School of Computer,Xiandian University,Xi’an,China

    Abstract:Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model.

    Keywords:Blockchain;privacy protection;attribute encryption;access control;searchable-encryption

    1 Introduction

    Blockchain technology,as an undisturbed,chronologically verifiable chain-like storage architecture,provides a new method for data security and privacy protection,and its application in power balance trading platforms has also received extensive attention.For example,Xia et al.[1]analyzed the trading mechanism of the electricity surplus market.In order to make information symmetrical and fair,they designed smart contracts for multi-party bidding of power resources based on blockchain technology,and realized decentralized transaction decisions.Literature[2]summarizes the related applications and research of existing blockchain technology,and focuses on the application of blockchain traceability technology in various fields.According to the above research and investigation,blockchain will help improve solutions in multiple areas such as the Internet of Things,smart cities and supply chains.However,the ledger that records and stores transaction information in blockchain technology is open to any node that joins the blockchain network.Through mathematical analysis of transaction records in the global ledger,attackers may pose a threat to users’ transaction privacy and identity privacy[3].Transaction privacy threats refer to certain threats that contain detailed information about transactions.For example,an attacker can obtain some valuable information through in-depth analysis of a series of transactions of a specific account,transaction details,related accounts,and capital ows.Identity privacy threat mainly refers to the potential threat of the identity of the trader.In addition,on the basis of analyzing the transaction data,the attacker can obtain the identity information of the trader by combining some background knowledge.Jordan[4]uses cluster analysis to analyze transaction data in the blockchain and determine different addresses belonging to the same user.This is a good example of the use of analyzing transaction data to obtain the identity of a trader.In addition,since all transactions performed by users are permanently recorded in the blockchain,once the transaction is implemented,all relevant transaction information will be leaked.In addition,as the blockchain is increasingly used in daily payments,attackers can use off-chain information[5]to infer the identity of the account in the blockchain.

    In the traditional blockchain,the user’s account transaction information is directly stored in the block without using encryption technology,so the user’s account is completely open to all nodes.At the same time,when a user initiates a transaction,the transaction amount in the transaction information is completely disclosed.The verification node on the blockchain performs mathematical analysis on the user’s transaction amount and account balance to verify whether the transaction is legal.Although this method realizes the decentralization of the blockchain and cannot be tampered with,the user’s account privacy[6]will be completely exposed.In response to these problems,there are some blockchain privacy protection mechanisms.Therefore,Shen Tu et al.[7]proposed a more effective blind signature hybrid scheme based on elliptic curve encryption algorithm m in reference.This scheme is simple and easy to operate,and is usually suitable for various digital currencies,but it is a centralized currency scheme.After that,in the hybrid scheme,Gao et al.[8]uses cryptographic techniques such as blind signatures to protect privacy issues,but this scheme increases computational costs,and the implementation of token processing by a third party inevitably increases additional service overhead.Some scholars also use ring signatures to protect the privacy of the blockchain.For example,Noether et al.[9]proposed an improved ring-based secret transaction scheme,which can hide the amount in reference.In this scheme,a large number of ring signatures are placed in multiple layers of linkable spontaneous anonymous group signatures[10],and its solution can protect identity privacy and transaction privacy.Although ring signature provides strong anonymity,it has three limitations:

    1.Its transaction event volume is huge,each transaction event is nearly several kilobytes,which increases the storage space of the entire blockchain record.

    2.The inherent disadvantage of ring signatures is that the size of the signature is proportional to the number of participants.Therefore,in reality,each transaction has only a limited number of outputs(for example,by default,each transaction has 4 outputs).

    3.The hidden amount increases the difficulty of review,that is,it not only verifies whether a secret cryptocurrency is generated during the transaction,but also determines the additional amount at a specific moment.

    Chen et al.[11]proposed an anti-quantum proxy blind signature scheme based on lattice cryptography,which provides user anonymity and non-traceability for distributed applications of BIoT.The proposed proxy blind signature scheme can completely solve the unforgeable problem without authorization to protect user privacy.Chiesa et al.[12]proposed the Zerocash scheme,which introduced zk-SNARK[13],a non-interactive zero-knowledge proof technology in cryptography that converts into digital currency,which can ensure the unlinkability of transactions And confidentiality,while it supports any amount of money.However,the disadvantage of this scheme is that if an attacker obtains the secret data introduced at the beginning,the token may be forged.Subsequently,in order to solve the privacy problem in the public chain off-chain payment protocol,many studies have constructed of ine payment protocols,such as two-way micro-payment channels[14]Lightning Network and Spirtes[15].However,in these schemes,both parties in the transaction must use the relay node to complete the transaction,and the transaction information is public to the relay node,so the privacy of both parties in the transaction will be exposed to the relay node.For of ine payment privacy issues,there are some studies,such as the Tumble Bit solution proposed by Alshenibr et al.[16].This solution can hide payment channel information from relay nodes.In addition,Tumble Bit solutions are generally suitable for compatible Bitcoin systems.But the time and efficiency costs are relatively high.Green et al.[17]proposed the Bolt scheme,which ensures that payments under the same channel are independent of each other,and the payment time does not require block confirmation to reach the second level.If someone pays through the payment channel provided by the payee,the payee will receive a notification.There are still many problems to be solved in the security of payment protocols.

    A privacy protection mechanism for blockchain retrieval based on searchable keywords is proposed[18],which realizes the private search of authorized keywords without changing the retrieval order.But the keywords in this scheme are relatively short,they cannot resist collusion,and can communicate privately between nodes.Aiming at data sharing privacy,Do et al.[19]proposed a distributed data storage system using blockchain technology and a private keyword search scheme,which provides authorization for data owners and supports dedicated keyword search for encrypted data sets.However,this program has not yet implemented document revocation and Boolean search.The data storage incentive mechanism of wireless sensor network(WSN)[20],which uses double chains,one chain is used to store the data of each node,and the other chain is used to control data access.In addition,the reserved hash function is used to compare the stored data with the new data block.New data can be stored in the node closest to the existing data,and only different sub-blocks can be stored,which can greatly save the storage space of network nodes.However,the confidentiality of the data was not discussed.Using the DCOMB method,literature[21]proposed a blockchain-based IoT data query model.This model combines the IoT data stream with the timestamp of the blockchain to improve the interoperability of data and the versatility of the IoT database system.The data query model in this solution can quickly query the public key corresponding to the data stream.The query is in a fully encrypted environment,which can ensure the privacy and security of IoT data.However,the data prereading process will take extra time,and MySQL query performance will cost more.

    In the above scheme,the data privacy problem has not been completely resolved.Therefore,it is urgent to solve its privacy problem.The contribution of this paper is as follows:

    1.In this paper,the public key searchable encryption method is used to encrypt the transaction privacy data in the blockchain,which solves the privacy leakage problem caused by the disclosure of all data in the traditional public blockchain,meanwhile,realizes the privacy of protecting the sensitive information of the blockchain transaction.

    2.The use of attribute encryption technology combined with secret sharing enables fine grained access control of transaction ciphertext in the blockchain.

    3.In addition,the users who have access to transaction can quickly search ciphertext,which realizes the supervision of transaction information.

    The Organization of the paper is structured as follows:In Section 1,we introduce the research on the privacy of blockchain;We introduce the basic cryptographic primitives in Section 2;In Section 3,the system model in general and the security model of security requirements are proposed;In Section 4,the specific construction of the scheme is described;In Section 5,we analyze the security of the scheme in detail;We compare the related work in Section 6;In Section 7,we summarize our scheme.

    2 Preliminary Knowledge

    2.1 Bilinear Mapping

    2.2 Determining the Bilinear Diffie–Hellman Assumption(DBDH)

    2.3 Lsss Linear Secret Sharing Scheme

    3 System Model

    The block chain data privacy access control system model based on searchable attribute encryption is shown in Fig.1,which includes four types of participating entities:Data owner,verification nodes,user and miner node,Trading generates is shown in Fig.2.

    Figure 1:System model

    Data Owner:Firstly,initializing generates the index key and the trapdoor key,extracts the keywords of the transaction,then uses the index key to encrypt the index and form the index ciphertext;Secondly,encrypt the trapdoor key to form the trapdoor key ciphertext and share the data.Finally,using the secure signature algorithm signs the transaction and encrypts,meanwhile,data owners appends the indexes keyword to the ciphertext file of the transaction ciphertext.Above all the data owner can be a user on the blockchain for Bitcoin transactions or a miner.

    Figure 2:Trading generates

    User:The registration system generates an identity identifier RID corresponding to the real identity and a private key corresponding to the user attribute.In addition,user decrypts the trapdoor key ciphertext and gains the user key to generate a trapdoor,and sends the blockchain to request the transaction ciphertext.

    Verification Nodes:Verify the correctness of the user’s identity and permissions,and calculate the user’s attribute and private key parameters and permission parameters in the attribute collection to distribute the trapdoor key ciphertext,and distribute the user key UK to the legitimate user.

    Miner Node:The miner node broadcasts all the transaction information during this period,and each node performs verification and joins the blockchain after verification.The trapdoor and the index sent by the data owner are calculated and matched,then the transaction ciphertext will be sent to the data consumer after the matching is successful.

    3.1 Threat Model

    The solution proposed in this paper only the Verification Node is completely credible,the private key can be generated and distributed honestly for the user.Most miner nodes are honest but curious.In addition,users may collude to decrypt data that they do not have access to.

    3.2 Security Model

    The security model refers to the game between the opponent and the challenger.The game is described as follows:

    IND-CPA security model

    Initialization:Challenger A runs the initialization algorithm to generate the public parameters and master key,and sends the public parameters to the adversary.

    Phase 1:The adversary C continually repeats the corresponding set of attributesS1,…,Sq,where none of the attributes satisfy the access structure.

    Challenge:The enemy C picks two messagesM0,M1and sends them to the challenger A.The challenger A randomly picks a byteb∈ 0,1{ }and encrypts the message M of the access structure,then the challenger A sends the ciphertext to the rival C.

    Phase 2:Phase 1 is repeated guess:The guess of the enemy C inputb,if the opponent guessesb′=b,the enemy C will win the game.The advantage of rival C in this game is defined asAdv=|Pr(b=b′)-1/2|.

    Definition 1:If the advantageAdv=|Pr(b=b′)-1/2|of the above game is negligible in the time of all polynomials,the proposed solution can be IND-CPA security.

    IND-CKA security model

    Initialization:Repeat the initialization of the above security model.

    Phase 1:The adversary adaptively proposes the following polynomial query.

    Hash Ask:The adversary can ask the random oracleH.

    Trapdoor request:The adversary can request any keyword trapping.

    Challenge:The adversary submits two keywords and gives the challenger C,the limit is that the enemy can’t ask for the keyword.

    Phase 2:Phase 1 is repeated.

    Guess:The opponent A outputs the guessb′ofb,if the opponent guessesb′=b,the enemy C will win the Game.The advantage of rival C in this game is defined asAdv=|Pr(b=b′)-1/2|.

    Definition 2:If the advantage of the above game is negligible at the time of the polynomial,the proposed scheme can be IND-CKA security.

    4 Specific Construction

    In this part,we present the specific implementation process of the blockchain data privacy protection access control method algorithm based on searchable attribute encryption.

    a)Registration

    The user submits a registration application to the system,obtains the identity RID and the user attribute set corresponding to the real identity information,and the data owners(transaction users)register to obtain the key and the identity identifier.

    b)Initialization

    c)Transaction generation and signature

    Transaction user A generates transaction information,encrypts its own identity,runs the wallet signature algorithm and signs it with the private key corresponding to the wallet address,then sends it to transaction user B.The user signature is calculated as follows:

    d)Index generation

    The trader extracts the keyword from the transaction plaintext information,and encrypts the keyword with the index keygμand the random number τ,μ.The keywords of the transaction information are calculated as follows:

    h)Key generation

    i)Decryption

    5 Security Certificate

    6 Analysis and Comparison

    6.1 Privacy Protection Analysis

    Content privacy:This paper uses the ciphertext policy-based attribute encryption mechanism algorithm to encrypt trapdoor key information,which is more secure than symmetric encryption algorithms.By encrypting trapdoor key information with the LSSS linear secret sharing structure and encrypting transaction information with searchable encryption,we can ensure the privacy of both parties’ content.In the process of generating the private key,the random number and the identifier RID of the user interaction are introduced.Even if different users collude with each other,they cannot obtain the private key without permission.Therefore,even if there is collusion,illegal users cannot obtain the transaction information and the secret of sharing.

    Identity privacy:Use the verification node in the blockchain data privacy protection access control method based on searchable attribute encryption.The verification node stores the trapdoor key ciphertext.The transaction user A does not need to be online at any time,and randomly generates key UK and identity RID for each user.In the process of interaction,the RID sequence represents the identity of the user,which protects the identity privacy of the user.

    Searching privacy:Our scheme’s search mechanism is against multiple attacks.In the process of index generation,the transaction party A uses the random number μ to encrypt the indexed keyword,and the node on the blockchain cannot perform the internal keyword guessing attack by matching the candidate keyword with the trapdoor.In the trapdoor generation phase,we use random numbers to hide the search keywords,which prevents malicious nodes from performing keyword replay attacks after trapdoor cracking.Therefore,blockchain network nodes and attackers cannot obtain useful information about keywords.Therefore,our solution guarantees the privacy of the keyword without reducing the security of the previous algorithm.

    Attribute privacy:The verification node implements fine-grained access control,and the verification node authorizes the user of the blockchain by verifying theVR,which avoids the risk of submitting the access structure to the blockchain network.This mechanism protects the attributes of the linear access structure developed by the counterparty.

    6.2 Scheme Comparison

    The literature[7]applied the elliptic curve encryption algorithm to propose a more efficient blind signature hybrid scheme,which protects the privacy of transaction information.In literature[9],the transaction amount is hidden by the ring signature,and a secret transaction scheme based on ring signature is proposed,thus protecting transaction privacy and identity privacy.Literature[12]presented a zero cash scheme using public key encryption to protect transaction privacy.In Literature[18],public key cryptography is used to propose a blockchain retrieval privacy protection mechanism based on searchable keywords.Literature[19]proposed a distributed data storage system using blockchain technology and a privacy keyword search scheme.It can be seen from Tab.1 that this paper adopts the access control method of searchable hierarchical attribute encryption,which not only hides the transaction amount for the nodes without access rights on the blockchain,but also the permission of the blockchain user node can quickly and efficiently query valid information of the transactions through trapdoor keywords.

    6.3 Performance Comparison

    In this section,we analyze the performance of the solution.We use E for exponential operation and P for linear operation.H represents a hash operation,and m represents the number of users.In Tab.2,we present the performance calculations for our scheme and Reference[18–19].

    Table 1:Comparison of this article and existing privacy protection schemes

    Table 2:Performance calculation comparison

    7 Conclusion

    Since the global ledger that uses blockchain technology to store transaction information is open to any node joining the blockchain network,it is necessary to further strengthen and improve the data privacy of the blockchain.A blockchain data privacy protection access control scheme based on searchable attribute encryption is proposed.This scheme uses attribute encryption based on ciphertext strategy to encrypt trapdoor keys,and then uses searchable encryption to encrypt transactions on the blockchain.User authorization allows authorized users to access transaction information.It not only realizes the privacy protection of transaction information on the blockchain,but also enables authorized users to efficiently access transaction information.Under the random oracle model,the safety and effectiveness of the scheme are proved.

    Acknowledgement:Thanks to teacher Feng for his guidance on the scheme of my paper,thanks to teacher Youliang Tian for his proposal on the modification of my paper,and finally thanks to Xiaoqin Feng and Rong Ma for the revision of the overall grammar of my paper.

    Funding Statement:This research was supported by The National Natural Science Foundation of China(No.61462060,No.61762060)and The Network and Information Security Innovation Team of Gansu Provincial Department of Education Lanzhou University of Technology(No.2017C-05).Tao Feng is the corresponding author.

    Con icts of Interest:The authors declare that they have no con icts of interest to report regarding the present study.

    黄频高清免费视频| 一级,二级,三级黄色视频| 午夜影院日韩av| 丰满迷人的少妇在线观看| 99精国产麻豆久久婷婷| 男女下面进入的视频免费午夜 | 久久九九热精品免费| 欧美老熟妇乱子伦牲交| 亚洲精品中文字幕在线视频| 国产成人av激情在线播放| 国产av又大| 国产成人啪精品午夜网站| 两人在一起打扑克的视频| 他把我摸到了高潮在线观看| 亚洲五月婷婷丁香| 国产熟女xx| 90打野战视频偷拍视频| 三上悠亚av全集在线观看| 丁香六月欧美| 首页视频小说图片口味搜索| 日本免费a在线| 日韩 欧美 亚洲 中文字幕| 国产精品1区2区在线观看.| 婷婷精品国产亚洲av在线| 欧美精品啪啪一区二区三区| svipshipincom国产片| 老鸭窝网址在线观看| 99国产精品免费福利视频| 每晚都被弄得嗷嗷叫到高潮| 亚洲一区二区三区不卡视频| 一级片'在线观看视频| 18美女黄网站色大片免费观看| 1024香蕉在线观看| 人人妻,人人澡人人爽秒播| 日韩国内少妇激情av| 中文字幕最新亚洲高清| 91国产中文字幕| 久久久久久大精品| 波多野结衣av一区二区av| 黑人巨大精品欧美一区二区mp4| 99久久综合精品五月天人人| 18禁裸乳无遮挡免费网站照片 | 久久久国产精品麻豆| 丁香欧美五月| 亚洲人成网站在线播放欧美日韩| 亚洲色图综合在线观看| 欧美成人免费av一区二区三区| cao死你这个sao货| 日韩欧美三级三区| 亚洲国产精品999在线| 精品少妇一区二区三区视频日本电影| 亚洲精品av麻豆狂野| 人妻久久中文字幕网| 亚洲人成电影观看| 国产一区二区三区在线臀色熟女 | e午夜精品久久久久久久| 免费搜索国产男女视频| 欧美日本中文国产一区发布| 无遮挡黄片免费观看| 麻豆成人av在线观看| 中文字幕高清在线视频| 久久草成人影院| 精品免费久久久久久久清纯| a级片在线免费高清观看视频| 每晚都被弄得嗷嗷叫到高潮| 亚洲午夜精品一区,二区,三区| 一级毛片女人18水好多| 国产单亲对白刺激| 超色免费av| 欧美日韩乱码在线| 精品国产美女av久久久久小说| 一边摸一边做爽爽视频免费| 男男h啪啪无遮挡| 免费av中文字幕在线| 欧美黄色淫秽网站| 在线观看日韩欧美| 啪啪无遮挡十八禁网站| 免费高清视频大片| 亚洲国产精品sss在线观看 | av视频免费观看在线观看| 午夜免费成人在线视频| 欧美日韩精品网址| 国产伦一二天堂av在线观看| 高潮久久久久久久久久久不卡| 国产97色在线日韩免费| 国产欧美日韩一区二区精品| 国产精品久久久久久人妻精品电影| 成年人免费黄色播放视频| 美女午夜性视频免费| 少妇粗大呻吟视频| 一级黄色大片毛片| 好男人电影高清在线观看| 一级a爱片免费观看的视频| 91麻豆精品激情在线观看国产 | 久久久国产成人精品二区 | 久久香蕉精品热| 精品国产国语对白av| 国产人伦9x9x在线观看| 69精品国产乱码久久久| а√天堂www在线а√下载| 日本精品一区二区三区蜜桃| 欧美av亚洲av综合av国产av| 日本免费一区二区三区高清不卡 | 久久伊人香网站| 一级片'在线观看视频| 国产精品日韩av在线免费观看 | ponron亚洲| 久久国产精品影院| 99国产精品一区二区三区| 久久午夜综合久久蜜桃| 欧美丝袜亚洲另类 | 久久久精品欧美日韩精品| 精品国产一区二区三区四区第35| 欧美亚洲日本最大视频资源| 亚洲一区中文字幕在线| 久久人妻av系列| 国产亚洲欧美98| 一级片免费观看大全| 天堂√8在线中文| 亚洲精品国产精品久久久不卡| 美女午夜性视频免费| 久久人人97超碰香蕉20202| 亚洲五月色婷婷综合| 在线十欧美十亚洲十日本专区| 美女福利国产在线| 人人妻人人添人人爽欧美一区卜| √禁漫天堂资源中文www| 久久香蕉激情| 电影成人av| 天堂中文最新版在线下载| 露出奶头的视频| 女生性感内裤真人,穿戴方法视频| 午夜福利一区二区在线看| 亚洲精品一区av在线观看| 久久香蕉精品热| 久久久久国产精品人妻aⅴ院| 成人永久免费在线观看视频| 夜夜躁狠狠躁天天躁| 亚洲欧美精品综合久久99| 国产麻豆69| 国产国语露脸激情在线看| 中文欧美无线码| 日韩人妻精品一区2区三区| 满18在线观看网站| 日本a在线网址| 国产一区二区在线av高清观看| 午夜福利欧美成人| 村上凉子中文字幕在线| 日韩国内少妇激情av| 又黄又粗又硬又大视频| 黄色毛片三级朝国网站| 国产精品永久免费网站| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲精华国产精华精| 久久人妻熟女aⅴ| 亚洲av日韩精品久久久久久密| 国产成年人精品一区二区 | 三级毛片av免费| 午夜精品在线福利| 亚洲七黄色美女视频| 女性生殖器流出的白浆| 99热只有精品国产| 久久精品国产亚洲av香蕉五月| 欧美亚洲日本最大视频资源| 亚洲欧美激情在线| 久热爱精品视频在线9| 国产成+人综合+亚洲专区| 一本综合久久免费| 国产亚洲精品一区二区www| 国产成人精品久久二区二区免费| av国产精品久久久久影院| 欧美最黄视频在线播放免费 | 可以在线观看毛片的网站| 熟女少妇亚洲综合色aaa.| 高清在线国产一区| 久久人妻av系列| 成人18禁高潮啪啪吃奶动态图| 黑人欧美特级aaaaaa片| 久久 成人 亚洲| 欧美日韩瑟瑟在线播放| 亚洲欧美日韩另类电影网站| av免费在线观看网站| 欧美性长视频在线观看| 国产免费男女视频| 色老头精品视频在线观看| 亚洲专区国产一区二区| 欧美精品亚洲一区二区| 亚洲精品成人av观看孕妇| 亚洲欧美激情在线| 亚洲三区欧美一区| 精品国产亚洲在线| 悠悠久久av| 一级毛片女人18水好多| 美女 人体艺术 gogo| 桃色一区二区三区在线观看| 国产97色在线日韩免费| 精品久久蜜臀av无| 欧美中文综合在线视频| 高清在线国产一区| 亚洲欧洲精品一区二区精品久久久| 欧美大码av| 久久国产亚洲av麻豆专区| 9191精品国产免费久久| 日韩大尺度精品在线看网址 | 性欧美人与动物交配| 女人被狂操c到高潮| 亚洲成a人片在线一区二区| 欧美黄色淫秽网站| 夜夜躁狠狠躁天天躁| 国产熟女xx| 9191精品国产免费久久| 亚洲自偷自拍图片 自拍| 老司机在亚洲福利影院| 亚洲 欧美 日韩 在线 免费| 老司机靠b影院| ponron亚洲| 久久人人精品亚洲av| 村上凉子中文字幕在线| 精品人妻在线不人妻| 88av欧美| 99国产综合亚洲精品| 日本免费a在线| 亚洲精华国产精华精| av网站免费在线观看视频| 嫁个100分男人电影在线观看| 青草久久国产| 69精品国产乱码久久久| 久99久视频精品免费| 99香蕉大伊视频| 午夜老司机福利片| 操美女的视频在线观看| 色综合欧美亚洲国产小说| √禁漫天堂资源中文www| 丰满迷人的少妇在线观看| 9色porny在线观看| 亚洲一区二区三区不卡视频| 亚洲专区字幕在线| 超碰97精品在线观看| 午夜精品国产一区二区电影| 日韩欧美国产一区二区入口| 国产亚洲精品第一综合不卡| 在线国产一区二区在线| 国产精品 国内视频| 亚洲自偷自拍图片 自拍| 一个人免费在线观看的高清视频| 日日爽夜夜爽网站| 国产黄a三级三级三级人| 国产亚洲精品第一综合不卡| 精品国产超薄肉色丝袜足j| 欧美日韩黄片免| 成人国产一区最新在线观看| 亚洲国产毛片av蜜桃av| 人人妻人人爽人人添夜夜欢视频| 90打野战视频偷拍视频| 亚洲av第一区精品v没综合| 啪啪无遮挡十八禁网站| 午夜免费激情av| 无人区码免费观看不卡| 夫妻午夜视频| 精品第一国产精品| 久久精品亚洲精品国产色婷小说| 亚洲自偷自拍图片 自拍| 一级a爱视频在线免费观看| 久久久久久人人人人人| 亚洲成人免费av在线播放| av视频免费观看在线观看| 久久久水蜜桃国产精品网| 天天添夜夜摸| 丝袜人妻中文字幕| x7x7x7水蜜桃| 久久久久精品国产欧美久久久| 国产1区2区3区精品| 亚洲一区中文字幕在线| 亚洲一区二区三区色噜噜 | 91麻豆精品激情在线观看国产 | 日韩欧美在线二视频| 看片在线看免费视频| 一边摸一边做爽爽视频免费| 一边摸一边做爽爽视频免费| 国产av一区二区精品久久| 日韩av在线大香蕉| 国产亚洲欧美精品永久| www.熟女人妻精品国产| 成人三级做爰电影| 亚洲精品av麻豆狂野| 99久久99久久久精品蜜桃| 日本黄色视频三级网站网址| 99久久人妻综合| 精品国产一区二区三区四区第35| 中文字幕人妻丝袜一区二区| 亚洲av第一区精品v没综合| 成人黄色视频免费在线看| 日本撒尿小便嘘嘘汇集6| 天天添夜夜摸| 久久中文字幕一级| 一区在线观看完整版| 成人三级做爰电影| 久久 成人 亚洲| 成人特级黄色片久久久久久久| 亚洲伊人色综图| 日韩精品免费视频一区二区三区| 黄色视频不卡| 亚洲精华国产精华精| 亚洲 欧美一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 天堂√8在线中文| 久久人妻熟女aⅴ| 很黄的视频免费| 精品国内亚洲2022精品成人| 日韩中文字幕欧美一区二区| 妹子高潮喷水视频| 黄色女人牲交| 日韩欧美免费精品| 国产精品美女特级片免费视频播放器 | 国产熟女xx| 女人被躁到高潮嗷嗷叫费观| 欧美午夜高清在线| 国产一区二区三区综合在线观看| 久久久久国内视频| 亚洲国产中文字幕在线视频| 国产伦一二天堂av在线观看| 自线自在国产av| 久久精品影院6| 老鸭窝网址在线观看| 最新在线观看一区二区三区| 免费在线观看日本一区| 久久香蕉精品热| 日韩 欧美 亚洲 中文字幕| 露出奶头的视频| 久久这里只有精品19| 怎么达到女性高潮| 在线观看www视频免费| av视频免费观看在线观看| 99国产综合亚洲精品| 三级毛片av免费| 91精品国产国语对白视频| 老司机在亚洲福利影院| 亚洲国产欧美日韩在线播放| 久久中文看片网| 中国美女看黄片| 国产激情久久老熟女| 欧美日韩国产mv在线观看视频| 男人舔女人的私密视频| 在线天堂中文资源库| 午夜精品久久久久久毛片777| 亚洲精品av麻豆狂野| 亚洲三区欧美一区| 免费在线观看完整版高清| 99riav亚洲国产免费| 亚洲国产中文字幕在线视频| 欧美精品亚洲一区二区| 精品人妻在线不人妻| 色精品久久人妻99蜜桃| 成人18禁在线播放| 久热爱精品视频在线9| 免费av毛片视频| 亚洲一区二区三区欧美精品| 亚洲精品国产色婷婷电影| 女同久久另类99精品国产91| 亚洲,欧美精品.| 黄片大片在线免费观看| 久久人妻av系列| 每晚都被弄得嗷嗷叫到高潮| 久久久国产精品麻豆| aaaaa片日本免费| 久久精品亚洲精品国产色婷小说| 免费少妇av软件| 免费搜索国产男女视频| 搡老乐熟女国产| 老汉色∧v一级毛片| 视频区欧美日本亚洲| av福利片在线| 美女福利国产在线| 97碰自拍视频| 免费高清在线观看日韩| 成人国语在线视频| 欧美日韩瑟瑟在线播放| 在线观看免费视频网站a站| 亚洲精华国产精华精| 精品第一国产精品| 每晚都被弄得嗷嗷叫到高潮| 国产一区二区三区综合在线观看| bbb黄色大片| 搡老熟女国产l中国老女人| 免费少妇av软件| 丝袜人妻中文字幕| 高潮久久久久久久久久久不卡| www.自偷自拍.com| 午夜福利在线免费观看网站| 亚洲免费av在线视频| 在线十欧美十亚洲十日本专区| 男女做爰动态图高潮gif福利片 | 欧美+亚洲+日韩+国产| 美女高潮到喷水免费观看| 色婷婷av一区二区三区视频| 一本大道久久a久久精品| 人人妻人人爽人人添夜夜欢视频| 黄色片一级片一级黄色片| 国产亚洲精品综合一区在线观看 | 久久婷婷成人综合色麻豆| 一个人免费在线观看的高清视频| 欧美成人免费av一区二区三区| 国产精品98久久久久久宅男小说| 午夜福利,免费看| 无人区码免费观看不卡| 日韩国内少妇激情av| 午夜福利一区二区在线看| 如日韩欧美国产精品一区二区三区| 国产99久久九九免费精品| 韩国精品一区二区三区| 亚洲av熟女| 免费不卡黄色视频| 亚洲va日本ⅴa欧美va伊人久久| 国产不卡一卡二| 欧美色视频一区免费| 国产亚洲精品综合一区在线观看 | 成人三级黄色视频| 久久天躁狠狠躁夜夜2o2o| xxxhd国产人妻xxx| 国产三级在线视频| 18美女黄网站色大片免费观看| 高潮久久久久久久久久久不卡| 日韩精品青青久久久久久| 国产又爽黄色视频| 亚洲黑人精品在线| 国产99久久九九免费精品| 亚洲伊人色综图| 亚洲精品中文字幕一二三四区| 国产av一区在线观看免费| 国产亚洲av高清不卡| 啦啦啦 在线观看视频| 亚洲免费av在线视频| 免费日韩欧美在线观看| 黄色女人牲交| 视频区图区小说| 99国产精品一区二区三区| 国产91精品成人一区二区三区| 日本wwww免费看| 变态另类成人亚洲欧美熟女 | 亚洲视频免费观看视频| 中文字幕人妻熟女乱码| 国产伦一二天堂av在线观看| 国产精品香港三级国产av潘金莲| 成人手机av| 美国免费a级毛片| 亚洲视频免费观看视频| 日本vs欧美在线观看视频| 777久久人妻少妇嫩草av网站| 国产三级黄色录像| 性欧美人与动物交配| 精品一区二区三区视频在线观看免费 | 人人妻,人人澡人人爽秒播| 国产精品久久久久久人妻精品电影| 人妻丰满熟妇av一区二区三区| 国产精品1区2区在线观看.| 午夜两性在线视频| 精品久久久久久久毛片微露脸| 免费不卡黄色视频| 亚洲欧美日韩另类电影网站| 琪琪午夜伦伦电影理论片6080| 亚洲男人的天堂狠狠| 日本免费一区二区三区高清不卡 | 淫秽高清视频在线观看| 午夜久久久在线观看| 精品国产超薄肉色丝袜足j| 免费女性裸体啪啪无遮挡网站| 黄片播放在线免费| 国产野战对白在线观看| a级毛片在线看网站| 黄色毛片三级朝国网站| 久久亚洲精品不卡| 视频区图区小说| 一二三四在线观看免费中文在| 国产亚洲欧美在线一区二区| 欧美日韩亚洲国产一区二区在线观看| 在线观看免费视频日本深夜| 天天添夜夜摸| 成人影院久久| 国产亚洲精品第一综合不卡| 午夜免费激情av| 中文字幕精品免费在线观看视频| 国产免费av片在线观看野外av| 18禁黄网站禁片午夜丰满| 老司机在亚洲福利影院| 久久久国产精品麻豆| 黑人猛操日本美女一级片| 人人妻,人人澡人人爽秒播| 91国产中文字幕| www日本在线高清视频| 亚洲熟妇熟女久久| 国产精品久久电影中文字幕| 一进一出抽搐gif免费好疼 | 一区二区三区国产精品乱码| 另类亚洲欧美激情| 色婷婷av一区二区三区视频| 亚洲人成网站在线播放欧美日韩| 久久久久久久午夜电影 | 丝袜在线中文字幕| 日韩欧美免费精品| 我的亚洲天堂| 精品一品国产午夜福利视频| 亚洲人成伊人成综合网2020| 亚洲熟女毛片儿| 久久中文字幕一级| xxxhd国产人妻xxx| 啦啦啦免费观看视频1| 99精品久久久久人妻精品| 国产精品98久久久久久宅男小说| 国产精品爽爽va在线观看网站 | 亚洲专区字幕在线| 亚洲精品美女久久久久99蜜臀| 亚洲国产中文字幕在线视频| 波多野结衣高清无吗| 真人一进一出gif抽搐免费| 一二三四在线观看免费中文在| 中文字幕另类日韩欧美亚洲嫩草| 男女高潮啪啪啪动态图| 纯流量卡能插随身wifi吗| 母亲3免费完整高清在线观看| 亚洲欧美一区二区三区久久| 99国产精品免费福利视频| 国产精品久久电影中文字幕| 亚洲少妇的诱惑av| 69精品国产乱码久久久| 国产精品亚洲一级av第二区| 交换朋友夫妻互换小说| 在线国产一区二区在线| 黄片小视频在线播放| 国产精品 欧美亚洲| 亚洲成人精品中文字幕电影 | 国产单亲对白刺激| 老司机靠b影院| 久久久久国内视频| 免费日韩欧美在线观看| 老司机福利观看| 999精品在线视频| 老鸭窝网址在线观看| 国产免费男女视频| 成人亚洲精品一区在线观看| 国产在线精品亚洲第一网站| 欧美黑人精品巨大| 精品久久蜜臀av无| 韩国精品一区二区三区| 久久中文字幕一级| 久久午夜综合久久蜜桃| 国产亚洲av高清不卡| 91麻豆精品激情在线观看国产 | 国产成人欧美在线观看| 人妻丰满熟妇av一区二区三区| 在线观看66精品国产| 国产一区在线观看成人免费| 美女高潮到喷水免费观看| 欧洲精品卡2卡3卡4卡5卡区| 欧美日韩黄片免| 这个男人来自地球电影免费观看| 亚洲av五月六月丁香网| 久久久久久大精品| 久久青草综合色| 国产精品免费一区二区三区在线| 欧美中文日本在线观看视频| 99国产极品粉嫩在线观看| 99热国产这里只有精品6| 久久久久久人人人人人| 一区在线观看完整版| 色哟哟哟哟哟哟| 这个男人来自地球电影免费观看| 老熟妇乱子伦视频在线观看| 国产成人精品久久二区二区91| 免费日韩欧美在线观看| 丝袜美腿诱惑在线| 亚洲av片天天在线观看| 国产一区二区在线av高清观看| 我的亚洲天堂| 91精品三级在线观看| xxxhd国产人妻xxx| 欧美日本中文国产一区发布| 日日夜夜操网爽| 欧美日本中文国产一区发布| 亚洲在线自拍视频| 欧美日本中文国产一区发布| 50天的宝宝边吃奶边哭怎么回事| 在线免费观看的www视频| 级片在线观看| 他把我摸到了高潮在线观看| 伦理电影免费视频| 欧美激情 高清一区二区三区| 国产精品久久电影中文字幕| av欧美777| 国产精品永久免费网站| 欧美午夜高清在线| 丰满迷人的少妇在线观看| 欧美黄色片欧美黄色片| 人人澡人人妻人| 国产成年人精品一区二区 | 在线观看一区二区三区| 国产激情久久老熟女| 日韩欧美一区二区三区在线观看| 国产片内射在线| 久久中文看片网| 高潮久久久久久久久久久不卡| 久久久水蜜桃国产精品网| 亚洲 欧美一区二区三区| 国产精品日韩av在线免费观看 | 日韩大尺度精品在线看网址 | 国产精品一区二区三区四区久久 | av天堂在线播放| 操美女的视频在线观看| 在线视频色国产色| 成人亚洲精品av一区二区 | 亚洲一区高清亚洲精品| 免费少妇av软件| 夫妻午夜视频| 免费在线观看完整版高清| av国产精品久久久久影院| 久久久国产精品麻豆|