• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

    2021-12-15 08:12:10YongWoonHwangandImYeongLee
    Computers Materials&Continua 2021年11期

    Yong-Woon Hwang and Im-Yeong Lee

    Department of Software Convergence in Soonchunhyang University,Asan-si,31538,Korea

    Abstract:Recently,with the advancement of Information and Communications Technology (ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if data is transmitted in plain text when collecting data in an IoTcloud environment,it can be exposed to various security threats such as replay attacks and data forgery.Thus,digital signatures are required.Data integrity is ensured when a user(or a device)transmits data using a signature.In addition,the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices) in an industrial IoT environment.However,signatures based on pairing during aggregation compromise efficiency as the number of signatories increases.Aggregate signature methods(e.g.,identity-based and certificateless cryptography)have been studied.Both methods pose key escrow and key distribution problems.In order to solve these problems,the use of aggregate signatures in certificate-based cryptography is being studied,and studies to satisfy the prevention of forgery of signatures and other security problems are being conducted.In this paper,we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.In this proposed method,by providing key insulation,security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.This can be applied to create an environment in which data is collected safely and efficiently in IoT-cloud is environments.

    Keywords:Internet of things;certificate-based aggregate signature;key insulation;cloud;lightweight;physical attack

    1 Introduction

    Recent developments in Information and Communications Technology (ICT),the Internet of Things (IoT) have facilitated industrial “smartization”;smart factories and smart industries that link the real and virtual worlds via Cyber Physical Systems (CPS).A CPS processes tasks and information of the physical world in virtual space using IoT and other networks,and continuously adapts to changes without human intervention.If a CPS is to function well,the nature of the IoT environment is important because many physical things must be connected to sensors and communication devices.In an IoT-cloud environment,data is collected from IoT devices and stored safely in the cloud,whereby legitimate users can access the cloud and check the data.It is currently mainly used in Industrial Internet of Things (IIoT) environments such as manufacturing,transportation,and energy fields,as well,as medical environments and smart homes [1-3].However,if sensors transmit plain text,data forgery and replay attacks are possible.In particular,millions of dollars worth of assets could be at risk if communications are not secured in large network systems such as IIoT environments [4].

    To solve this problem,a lightweight cryptography technology is required to provide data confidentiality,and a digital signature technology that ensures the integrity of the data generated by a sensor device in an IoT environment is necessary.A sensor signs all messages and passes them (through a gateway) to the cloud as shown in Fig.1.A user verifies the signature,ensuring message integrity.In an IoT environment,users can receive safe services only when the integrity of data collected from all devices is ensured.In addition,in an environment where large-scale data is collected such as IIoT,the concept of aggregation is important to efficiently distribute data.

    Figure 1:Data signing and verification process in the IoT-cloud (e.g.,smart factory)

    However,among previously studied aggregate signature methods,there are many methods that create aggregate signatures using pairing operations.This is inefficient.The computational burden rises as the number of signatories increases.An early digital signature method used a Public Key Infrastructure (PKI) encryption system.This was followed by signature and aggregate signature methods employing Identity-Based Cryptography (IBC),Identity-Based Signatures (IBS),Identity-Based Aggregate Signatures (IBAS),and Certificateless Cryptography (CLC).However,both the IBC and CLC methods pose key escrow and/or key distribution problems [5-7].To solve these problems,Certificate-Based Signatures (CBS) and Certificate-Based Aggregate Signatures (CB-AS)have been proposed,and studies are being conducted to ensure they meet a number of security requirements,such as data integrity,non-repudiation,and resistance to the forgery of signatures.

    In this paper,we analyze CB-AS and propose a new lightweight CB-AS scheme for IoT-cloud environments.Specifically,this proposed method is an efficient CB-AS method that provides key insulation,and the contribution of the paper is as follows:1) The signature cannot be forged by an attacker.2) In order to solve the key exposure problem due to physical attacks such as side-channel attacks,key insulation is applied to continuously update the signature keys generated in the sensor devices.3) The size of the entire signature is reduced in group environments,such as IIoT,by a gateway collecting and aggregating signed messages from multiple sensor devices.The final verifier can verify the signatures for multiple messages with one verification,and this provides integrity and non-repudiation functions for messages.4) Since it is performed using pairing-free operations in the signature generation,aggregation,and verification steps,the operation efficiency is high compared to the aggregate signature methods proposed using pairings.

    The proposed scheme in this paper focuses on integrity rather than confidentiality of data.It will be applicable to a sensor device network environment that safely collects data continuously in real time in an IIoT environment that has been expanded to an IoT-cloud environment.The paper is structured as follows.Section 2 deals with related studies and explains the CBS and CB-AS constructs,security threats,and previously studied key insulation and CB-AS systems.Section 3 introduces the security requirements of Certificate-Based Key Insulated Aggregate Signatures (CBKIAS).Section 4 describes our method in detail.Section 5 analyzes the security and efficiency of the method,and Section 6 is the conclusion.

    2 Background

    This section describes the Elliptic Curve Discrete Logarithm Problem (ECDLP),digital signatures,and key insulation.It also reviews studies on CB-AS.

    2.1 ECDLP

    Elliptic curve encryption is a public key encryption method using the fact that the discrete logarithm problem on the elliptic curve is difficult.Compared to conventional public key cryptography,the same security can be obtained with fewer bits,encryption is processed at a high speed,and key management is easy because a short key is used.Therefore,it is widely used in IoT and other lightweight environments.The elliptic curve for elliptic curve encryption is a set of solutions (X,Y) of the equationy2=x3+ax+b(mod p)defined for arbitrary integers a,b.The fact that the point P=(X,Y) is on the elliptic curve means that the above equation is satisfied,and Q=x·P can be defined for any integer x for two points P,Q.Finding the solutionxis a problem of discrete logarithm elliptic curves.In other words,it is easy to find Q usingx·P in Q=x·P,but it is very difficult to infer the x value even if you know Q and P [8].

    2.2 Digital Signatures

    A digital signature is a method of verifying one’s identity in a network,and generally uses cryptographic technology related to Public Key Cryptography (PKC).When a message is signed with the sender’s private key and transmitted,the receiver uses the sender’s public key to verify the validity of the signature.This provides a non-repudiation function via the signed message,that can prove that a message has been transmitted from the sender and provides the signer’s authentication and message integrity.

    Digital signatures started from PKC based signatures and have evolved into various types of signatures such as IBS,Certificateless Signature (CLS),and CBS,and research on signatures that aggregate many signatures into one signature is also being conducted [9-12].PKC is a security technology that utilizes public key cryptography and can provide various functions such as signing and authentication.However,since PKC uses a certificate to verify a user’s public key,there is a storage problem for the certificate and overhead for management such as distribution,verification,and revocation.

    Therefore,Shamir developed an IBS.In IBS the public key is a user identifier,eliminating the certificate management overhead [13-15].However,a key escrow problem occurs because all users require private keys [16-18].

    To solve this problem,Gentry et al.(2003) developed a (CBC) scheme that combined the advantages of the PKC and IBC.A user creates a public/private key pair and receives a certificate with an identity and a public key from a trusted Certification Authority (CA).The CBC certificate serves as a private (secret) key for the user.Signing and decryption are performed employing the user’s certificate and private key simultaneously.Thus,the key escrow problem caused by the Key Generation Center (KGC) issuance of keys to each IBS owner is solved,and certificate management (problematic with the earlier PKC schemes) is simplified.Additionally,public key verification overload is eliminated.There are CBS and CB-AS techniques using CBC [19-26].

    2.3 Key Insulation

    In signature-based methods,the private key used in signing must be absolutely secure.If this key is exposed,there are several security threats to the smart factory of Fig.1.Assuming that the attacker has exposed a key by physically attacking a sensor in the factory,the attacker can use that key to forge a message and signature from the sensor.This can trigger errors in manufacturing and the entire system could stop.This is fatal in a large,interconnected environment such as a smart factory or other IIoT.It is essential to safely manage and store the private keys,and among the various methods to do this is key insulation technology.

    Key insulation was introduced by Dodis in 2002.Users update their private keys using a physically secure device termed a Helper (Fig.2) [27].Each user creates a public key,a private key,and a temporary secret key for initial signature.After that,the helper takes the user’s public key,creates key,known as an update key,that can be used for period t,and sends it to the user.With the received update key,the user updates the existing signature key with a signature key that can be used for period t.Then,the Helper issues a new key to be used during the following period,t′.The IBC,CBC,and CLS methods use key insulation methods to solve the problem of key exposure [28-31].

    Figure 2:Signature key generation structure using key insulation

    2.4 Certificate-Based Aggregate Signatures(CB-AS)

    A CBS is a signature for a single message.The CB-AS method collects multiple messages and creates an aggregated signature.In CBS,if multiple senders transmit data,a signature is generated for each message.Thus,the number of signatures increases as the number of signatories rises,and the verifier must check all signatures.CB-AS aggregates the multiple signatures into one.Sender public keys are used for verification,but all signatures are verified together.This reduces verification and memory overheads,computing cost,and bandwidth.Many pairing-free-based CB-AS methods have been applied in IIoT environments such as smart factories [23-26].

    2.4.1 CB-AS Model

    Fig.3 is a diagram showing the basic structure of CB-AS.The CB-AS method features a CBS that first registers a sensor with a CA and then issues a certificate.In general,the technique features seven phases.The Setup and Certificate Generate (CertGen) phases are performed by the CA.During Setup,the public parameters and a master CA key are created.In the CertGen phase,when a user requests,a certificate corresponding to the user ID and public key is generated and transmitted.In the Key Generate (KeyGen) phase,the user (signatory) generates a public/private key pair and then a signature for messages using the certificate,the public and private keys,and his/her identity.In the Sign phase,the user signs the message and sends it to the gateway,which verifies the message and signature.Messages and signatures from multiple signatories are aggregated into one by the gateway and transmitted to cloud storage.The verifier checks all messages and the aggregated signature [23-26].

    Figure 3:Structure of certificate-based aggregate signature

    2.4.2 CB-AS Attack Model

    The CB-AS method is vulnerable to forgery of messages and signatures.The public CB-PKC key can be authenticated via a certificate,but an attacker may substitute the public key of another user.A public key replacement attack on a CBS may forge the signature that device (A) sends to device (B) and replace the public key of device (A) (which is open for signature verification) with a public key generated by the attacker.Such an attack is possible because the substituted public key of the attacker,which can bypass verification of a signature generated using the private key of device (A),cannot be authenticated as the public key of device (A).In addition,the CA can forge the signature of device (A) using a certificate [25-27].

    The security model of CB-AS must counter two types of attacks.The two models are similar to games in which competent attackers A1and A2communicate with Challenger (C) to successfully forge signatures.In the oracle model,Challenger (C) is responsible for calculating and executing a value when a user requests it.A1serves as an outsider who can arbitrarily substitute a new key for the public key of a legitimate user,but does not know the certificate or master key.A2is an attacker who can act as a malicious CA or control the CA master key,but cannot replace the public keys of users.If A1or A2want to forge signatures,the signature can be forged by repeatedly executing a number of queries with attack type 1 and 2 below.The security threats mentioned above occur not only with CB-AS,but also with CB-KIAS where key insulation is provided.When comparing CB-KIAS and CB-AS,it includes a key update phase and a signing key generation phase.

    Security Attack Type I,Adversary A1

    In Security Attack Type I,II,an attack is performed based on the CB-KIAS model,which provides a key insulation function.

    · Setup:Challenger (C) creates a CA master public/private key and system parameters by executing this phase.

    · KeyGen:The counterfeiter (attacker) sends its identity to obtain a key.Challenger (C) gets the key,creates a public keyPUiand delivers it to the attacker.

    · PublicKeyReplace:The attacker can replace the user’s public key withPUi.It is not necessary to obtain the user’s private key.The attacker can repeat this phase.

    · CertGen:The attacker requests authentication for(ID,PUi) and Challenger (C) sends the certificate obtained by executing CertGen to the attacker.

    · Signature Key:The attacker makes a request to obtain a signing key,and Challenger (C)generates a temporary signature keyTskIDi,0and sends it to the attacker A1.

    · Sign Generate (SignGen):The attacker requests the(ID,m) signature and Challenger (C)executes SignGen to obtain that signature.Then,Challenger (C) sends the signature to the counterfeiter and records the response.

    It is possible to use the oracle to query Setup,KeyGen,PublicKeyReplace,CertGen,Signature Key and SignGen (depending on the competence of A1).Then the attacker (counterfeiter) can output

    -AIhas never requestedID′through the Signature Key oracle.

    -AIhas never requested(ID′,PUi′)through the Signature Key oracle.

    -(σ′,m′,t′)is a legitimate counterfeit message and signature pair,but A1has never requestedthrough the SignGen oracle.

    Definition 1.In CB-AS Attack Type I,if there is no attacker A1who can win with a nonnegligible probability within probabilistic polynomial time (PPT),it is existentially impossible to engage in forgery.

    Security Attack Type II,Adversary A2

    · Setup,KeyGen,CertGen,Signature Key,SignGen:Same as the setup of Attack Type I,and parameter values are send to A2.

    · Helper Key:When the counterfeiter receives the Helper key query,Challenger(C) generates the Helper’s private key and public key (hsk1,hsk2,hpk1,hpk2) and sends them to the counterfeiter A2.As A2knows the CA master key,she/he can mount a forgery attack,and can execute the Setup,KeyGen,Helper Key,Signature Key,SignGen oracle queries.Then,the counterfeiter can output(ID′,PUi′,σ′,m′).

    -A2has never requested anID′through the Signature Key oracle.

    -(σ′,m′,t)is a valid counterfeit message and signature pair,but A2has never requestedthrough the SignGen oracle.

    Definition 2.In CB-KIAS Attack Type II,it is existentially impossible to engage in forgery in the absence of an attacker A2,who can win with a non-negligible probability within probabilistic polynomial time (PPT).

    2.5 Analysis of Existing CB-AS Schemes

    CB-AS was first proposed by Gentry in 2003,and recently proposed CB-AS schemes have many efficient methods that do not use pairing operations.Tab.1 shows existing CBS,IBAS,and CB-AS methods that have been studied as well as the proposed method.The Li et al.[32]scheme solves the problem of key exposure due to physical attack by using a certificate-based signature using a key insulation technique.However,since it uses a pairing operation,there is a disadvantage in that the computational amount is high,and in 2017,Lu et al.[30]raised the problem that the signature could be forged by a malicious CA in the Li et al.scheme.This is because some(e.g.,l(M)rm) of the signature that contains the message is not related to the signer’s private key.Thus,a malicious CA could forge the signature by removing l(M)rmand adding l(M′)r′mwithout affecting the validity of the signature.

    Table 1:Comparison of certificate-based signature,certificate-based aggregate signature,identitybased aggregate signatures schemes

    Xiong et al.[22]proposed an efficient CBS scheme that does not use a pairing operation.As a feature,a key insulation technique is applied to solve the security threats that occur when the key is exposed by a physical attack.The system affords high computational efficiency in lightweight IoT environments.However,as it lacks an aggregation function,it is necessary to individually verify all data from multiple sensors.

    The Reddy et al.[29]scheme and the Shen et al.[11]scheme employ identity-based aggregate signatures,but only the Reddy et al.scheme features key insulation.Since both methods use pairing,and the larger the number of signatures,the higher the amount of computation.Also,since IBS allow the KGC to create a user’s key,curiously,a key escrow issue can arise from KGC.To solve the key escrow problem,use need to create their own keys for signing.

    The methods of the Chen et al.[24]scheme and the Verma et al.second method feature CB-AS.Either can be used in IoT and IIoT environments because computation is efficient (pairing is not employed).However,key insulation is not provided.Xiong et al.showed that one of the methods of Verma et al.was susceptible to public key replacement attack and signature forgery by a malicious CA.As in Attack Type I in 2.4.2,assuming that the attackerA1tries to forge a valid signature on all messagesmirepresented by users withIDiand public keysYi,in Verma et al.H0(IDi‖Yi),which is calculated during the signature process of method 1,can be removed and replaced withH0(IDi′‖Yi′).Since this does not contain the random value generated during the signing process,the attacker can easily eraseH0(IDi‖Yi)and replace it.Attack Type II is similar to Attack Type I,but in Attack Type II,an attacker can substituteH1(mi′‖IDi′‖Yi′‖par)forH1(mi‖IDi‖Yi‖par)in the signing process,and can successfully forge the signature even when the user’s secret key is not known [31].

    Xiong et al.[31]proposed a second method.It is a CB-KIAS proposed to solve the signature forgery problem occurring in the Verma et al.method discussed above.This Xiong et al.method includes both the aggregation function and key insulation function required by this proposed scheme.However,since a pairing operation is used,there is a disadvantage considering the amount of operations increase according to the number of signatures when generating signatures,verifying signatures,and verifying aggregated signatures.

    The goal of our proposed method is to provide overall operational efficiency by not using a pairing operation unlike the second Xiong et al.method.In addition,we will solve the problem of forged signatures due to the attacks presented in Section 2.4.2,and respond to security threats that occur when keys are exposed due to physical attacks through periodic key updates in a key insulation method.

    3 Security Requirements

    · Data Integrity and Reliability:It is essential to ensure the integrity and reliability of data(messages) transmitted to/from sensors in an IoT environment.In existing CB-AS systems,the gateway individually verifies data transmitted by multiple sensors,and aggregates and transmits this information.A user who wishes to check the data must verify the final aggregated signature.Such verification is essential to ensure message integrity/non-repudiation,and the reliability of devices that transmit and receive messages.

    ·Unforgeablity:As described in Section 2.4.2,signature forgery can occur via an A1instigated public key substitution attack or when A2employs the CA master key to create a user certificate.A1should not be able to generate a legitimate signature even via public key replacement employing a valid user identity.A2should not be able to forge a signature even if that signature is generated using both the signatory’s key and certificate.Therefore,a verifier should not be able to verify a forged signature.

    · Side-channel Attack Key Exposure Prevention:Messages are signed to ensure integrity and sensor reliability.That is,the signer’s (sensor device’s) signature key should not be leaked to the outside or extracted through a public value.If an attacker can deduce or steal the signature key through a physical attack,such as a side-channel attack,the attacker can forge the signature of the generated messages.This reduces the reliability of IoT sensor devices,and an attacker can forge and transmit any number of messages through the extracted signature key value.Therefore,by applying a method such as key insulation,the signature key of the signer will be continuously updated.

    4 The Proposed CB-KIAS Scheme

    In this paper,we propose a certificate-based aggregate signature scheme that provides key insulation for secure data collection and processing through sensor networks in IoT-cloud environments.Fig.4 is a schematic diagram of the scenario of this proposed method.In a network environment connected to a virtual CPS space,sensors generate data,sign messages,and send them to a gateway.Each gateway serves as an aggregator that verifies,collects,and aggregates data from multiple sensors and stores the information in the cloud.A user who wants to check the aggregated data can download the information and perform a single verification.The CA initially registers each sensor and issues certificates when requested.The Helper creates and updates(partial) keys for each sensor.The proposed scheme satisfies the security requirements for signature forgery prevention and non-repudiation of signatures.Aggregate signatures based on pairing-free operations can reduce the size of signatures in storage and reduce the amount of verification computations for validators.In addition,when a sensor device generates a signature key,a key insulation method is applied to periodically update the key used for signatures.This can prevent a security threat that may occur due to the exposure of the sensor key due to a physical attack such as a side-channel attack.

    Figure 4:Scenario of the proposed scheme

    4.1 System Parameters

    The system parameters are:

    ·IDi:Identifier of sensor i

    ·E,P:Elliptic curve on group G with prime order q,generator point of group G

    ·Certi:Certificate of sensor i

    ·MK,PCA:CA’s master private key/master public key pair

    ·DPKIDi,DSKIDi:Public key/private key pair of sensorIDi

    ·s,zi:Random values

    ·hSKIDi:The helper private key for sensorIDi

    ·udskIDi,t:A value used by sensorIDito update the signature key

    ·σi:The signature for the message

    ·TSKIDi,0:The initial temporary signature key generated by the sensor

    ·TSKIDi,t:The updated signature keys generated by sensorIDi

    ·H0(·):Cryptographic hash function

    ·H1(·):Cryptographic hash function

    ·H2(·):Cryptographic hash function

    4.2 System Scenario

    The eight phases of our scheme include a KeyUpdate key insulation process and the seven phases of the CB-AS listed in Section 2.4.1.

    · Setup:The CA receives the security parameters and generates the public parameters,the master secret key,and the CA public key.(Step 1 of Fig.4)

    · KeyGen:Each sensor generates a public/private key pair using the public parameters and random values,and requests a certificate from the CA.(Step 2 of Fig.4)

    · CertGen:The CA generates a certificateCertIDicorresponding to IDiusing IDi,DPKIDi,a public parameter,and the master secret key of the CA.The certificate is transmitted to the sensor.The CA creates a random value and sends it to the Helper.(Step 3 of in Fig.4)

    · KeyUpdate:Initially the helper creates a temporary valuehSKIDifor signature generation and passes it to the sensor,and the sensor creates a temporary keyTSKIDi,0that can be used for signing.The Helper creates an updated valueudskIDi,tand sends it to the sensor,which then updatesTSKIDi,0toTSKIDi,tfor signature using the public hash functions and update value received from the Helper.(Step 4 of Fig.4)

    · Sign:The sensor signs the message using theIDi,DPKIDi,CertIDiand signature keyTSKIDi,tthen sends the message and signature to the gateway.(Step 5 of Fig.4)

    · Signature Verify:The gateway verifies the signature of the received messages usingIDi,DPKIDiand certificateCertIDifor each sensor device.(Step 6 of Fig.4)

    · Aggregate Signature:In the proposed method,the gateway serves as both a validator and aggregator.Messages and signatures (m1,...,mn,σ1,...,σn)collected from multiple sensor devices are verified with(ID1,...,IDi,DPKID1,...,DPKIDi,CertID1,...,CertIDi) then aggregated through the gateway,and the aggregated data is transmitted to cloud storage.After aggregation,n signatures become one signature,reducing signature size.A verifier can check n messages in a single step.(Step 7 of Fig.4)

    · Aggregate Signature Verify:A user who wants to check the aggregated data can verify the integrity of the message collected from each sensor device by retrieving the aggregated data(m1,...,mn,σ)from the cloud storage as a final verifier and performing verification with(ID1,...,IDi,DPKID1,..,DPKIDi,CertID1,...,CertIDi).(Step 8 of Fig.4).

    4.3 Description of the Proposed Scheme

    4.3.1 Setup Phase

    Setup is performed by entering the security parameter K into the CA,and the public keyPKCA=MK·Pis generated as shown in Eq.(1) after selecting a random values∈Z*q.Then,the public parameterPPis created as shown in Eq.(2).Sincesis used as the master key value,it is kept secret while PKCAandPPare disclosed.

    4.3.2 KeyGen Phase

    SensorIDiselects a random valuexIDi∈Z*qand generates a public/private key pair(DPKIDi,DSKIDi) as shown in Eq.(3).Then,a certificate is requested by sending IDiandDPKIDito the CA.

    4.3.3 CertGen Phase

    The CA receives IDiandDPKIDifrom the sensor and generates the certificateCertIDicorresponding to the sensor device IDiusing thePPandMKas follows.

    The CA transmits the certificate to the sensor and sends the registered sensor information to the Helper via a secure channel.

    4.3.4 Key Update Phase

    The KeyUpdate phase is divided into three steps.First,when the Helper sends a temporary value for signing key generation to the sensor device,the device creates a temporary key for signing.The second step is for the Helper to generate and transmit an update valueudskIDi,tthat the sensor uses to update the signature key of the sensor device.Finally,the sensor takes the received update value and updates the signature key,TSKIDi,tusing it.Eq.(7) shows how the sensor generates temporary keyTSKIDi,0for signing,assuming that it was initially sentfrom the Helper to create the signature key.

    Helper key update step:The Helper generates the update valueudskIDi,temploying the user information received from the CA and transmits it to the sensor.

    Sensor signature key update:The sensor receivesudskIDi,tfrom the Helper and can update the existing temporary signature keyTSKIDi,t-1toTSKIDi,tas follows.(TheTSKIDi,tkey can be used for time t.)

    4.3.5 Sign Phase

    The sensor signs messagemi∈{0,1}*using the signature keyTSKIDi,tand itsIDi,DPKIDi,andCertIDiand sends the result to the gateway.

    Step 1.The sensor device calculatesUi=ri·Pby selecting a random valueri∈Z*q.

    Step 2.The value required for signature is generated as follows and the signature is output.

    4.3.6 Signature Verify Phase

    The gateway receives signed messages from sensors and verifies the signatures usingIDi,DPKIDi,andCertIDias shown in Eq.(13).If the criterion is met,the message is regarded as legitimate,and if the criterion is not met,it is not.

    4.3.7 Aggregate Signature Phase

    When messages are received from multiple sensors,the gateway performs verification,and then aggregates messages with valid signatures.Signed messages received from n sensors are collected under one signature.Aggregation can be expressed as in Eq.(14),whereWis the signature of message (m1,...,mn).

    4.3.8 Aggregate Signature Verify Phase

    Users who wish to check aggregated messages download them from the cloud.Then the users verify the validity of the aggregated signatureWusingcertificates(CertID1,...,CertIDi)and the aggregated messages(m1,...,mn).The user can verify the validity of the signatures of multiple messages with a single signature verification,and can therefore verify the integrity of the messages collected from all sensor devices.Verification proceeds using Eq.(15).

    5 Analysis of Proposed Scheme

    In this section,we will identify whether the proposed method meets the data integrity,forgery resistance,and key leakage resilience requirements from Section 3.

    5.1 Security Analysis

    ·Data Integrity and Reliability:Verification is essential to ensure message integrity,reliability,and non-repudiation.In this paper,the signatureσi=(Ui,Wi,Zi)generated by each sensor device uses a certificate value,the device’s private key,and a public key.VerifyingWi·Pincludes the operationwhich verifies message integrity.In addition,the verifier can know that the data has been sent from sensorIDiby verifyingσiusing the public key of the CA,the public key of the sensor device,and the public key of the Helper,as well as public parameters and the message.Thus,it can be seen that the message has not been modified during transmission.

    · Unforgeability:In a CB-PKC signature protocol,an attack on unforgeability can occur.The types of attacks can be divided into an attack by an attacker A1,capable of public key replacement,and an attack by an attacker A2,a malicious CA.A1has the ability to replace the public keys of other users with their own generated keys.Due to the safety of ECDLP,private keys corresponding to users’public keys cannot be determined,but only public keys need be replaced to bypass validation.Public key replacement attacks often occur in certificateless methods where there is no certificate that can authenticate the public key of a sensor device,e.g.,the signer.However,even if there are certificates,attacker A1can perform a public key replacement attack by creating a new private key/public key pair like the attack model in Section 2.4.2.This is very difficult because it has to be performed within the polynomial time,and because the public key is usually authenticated by a CA.However,it was analyzed that Verma et al.scheme 2 is vulnerable to a public key exchange attack by Xiong et al.This attack modifies the operation of the signature value regardless of the issued certificate,so that the signature can be forged,and the verifier can still process it as valid.In our proposed method,the form of individual signature isσi=(Ui,Wi,Zi),and the signatureσi′=(Ui′,Wi′,Zi′)that could create a valid message cannot be generated using the forged public keyby attacker A1.The signature generation formula for the message isWi=dID+TSKIDi,t+riH2(mi,t,IDi,Ui,DPKIDi),and the attacker A1cannot create a legitimateWibecause theTSKIDi,tare unknown.The signature verification formula (Eq.(13)) is calculated using the public key of CA,the public key of the sensor device,the public key of the Helper,other public parameters,and the message.It is impossible for attacker A1to forge the signature by replacing it with the public key of another device without CA assistance.

    Attacker A2is a malicious CA and has the ability to know all the certificates of registered sensor devices because it knows MK.Because A2does not have the ability to replace public keys,if A2wants to forge a signature of a sensor device,it will try to generate a signature with the value of the sensor’s certificate.The signature generation formula for a message isWi=dID+TSKIDi,t+riH2(mi,t,IDi,Ui,DPKIDi).Since the signature keyTSKIDi,tgenerated by the sensor device is used to generate the signature,the CA cannot forge the signature with onlyZi,anddID,and cannot extractTSKIDi,t.The signer’s signature cannot be forged using only external public parameters,including in the CA A2scenario.In particular,in the proposed scheme,the signature key used must includeudskIDi,t,created through the Helper,the previous temporary key valueTSKIDi,0of the sensor device,and the certificate.Therefore,a malicious CA cannot forge the sensor device’s signature using the MK.

    ·Key Exposure Resilience:In our proposed method,the sensor devices initially register with the CA,receive a certificate,and receivehSKIDiH1from the Helper in order to generate keys.Then the devices create temporary keysTSKIDi,0for signing.Next,udskIDi,tis received from the Hepler in the KeyUpdate Phase,and a keyTSKIDi,t,that can be used to sign for a period of time t,is generated and used when signing.TSKIDi,tincludes the sensor device identifierIDi,the device public key/private key pair(DPKIDi,DSKIDi),the Helper’s private keyhSKIDi,andZifrom the certificate.At this point,even ifTSKIDi,tis exposed by a physical attack,each sensor device can update its signature key through the Helper and use the new key for signing.Later,when a verifier checks the signature,theTSKIDi,tis verified with the public keyDPKIDiof the sensor device and the public key of the Helper.Since the period t in which the signature can be used is included as a parameter,when an attacker who obtained the previousTSKIDi,tsigns with it the verifier will be unable to verify.Therefore,it is impossible to perform various attacks such as signature forgery or masquerade attacks by obtaining the signature keyTSKIDi,tthrough physical attack.

    5.2 Efficiency

    An IoT environment requires efficient computation.In a network environment in which many sensor devices participate in communications,the system is required to work without problems using low-performance devices with either Elliptic Curve Cryptography (ECC) or paring-free based lightweight cryptographic operations rather than heavy cryptographic operations using on Rivest-Shamir-Adleman (RSA) and pairing operations.In the aggregation process,as the number of messages and signatures increases,the total time for signature,aggregation,and verification increases in direct proportion.In this proposed method,pairing operations are not used.Compared to other pairing-free methods,ECC-based elliptic curve addition and multiplication operations are efficiently applied to reduce the total operation time,and the amount of calculation is more efficient than the pairing operations applied in the existing Xiong et al.[31]scheme.In addition,compared to the Chen et al.and Reddy et al.methods,which do not use pairing operations,as shown in Tab.2,the computational efficiency is high,and the computational amount is similar to the Verma et al.methods.For the simulation environment of this proposed method and the existing methods,Windows 10 was used,running on an Intel i5-4690 processor with 3.50 GHz clock rate and 8 GB of memory.The ECC implementation used a Koblitz elliptic curvey2=x3+ax+b(modp)with a=1 and b=1,with a 163-bit random prime defined inF2163.The execution timeTsmof the scalar multiplication operation in ECC was 0.431 ms,and the addition operationTsabetween points in ECC was 0.017 ms.In addition,the hash operation execution timeHwas 0.079 ms,the scalar exponential operation execution timeTsewas 4.416 ms,and finally,the pairing operation p was 20.225 ms.Tab.2 compares the efficiency of other recently proposed CB-AS methods with the proposed method,and Fig.5 is a graph of the expected execution times.As shown in Fig.5,this proposed method has a higher computational efficiency than Verma et al.schemes 1 and 2,which do not use pairing operations but also don’t provide key insulation.In addition,compared to the Xiong et al.scheme,which is an aggregate signature method that provides key insulation,the amount of computation is reduced,thereby increasing the efficiency of the overall computational amount in the proposed scheme.

    Table 2:Security and efficiency analysis of existing schemes and proposed scheme

    Figure 5:Comparison of total computation time between the proposed scheme and existing schemes

    6 Conclusion

    The proposed scheme is a certificate-based aggregate signature scheme that provides key insulation for secure and efficient data collection and provision in IoT-cloud environments.As a feature of this proposed scheme,signatures cannot be forged by an attacker,and the signature keys generated in the sensor devices are continuously updated by applying a key insulation technique to solve the key exposure problem caused by physical attacks such as side-channels attacks.In addition,the aggregate signature function allows the signatures of messages received from multiple sensor devices to be aggregated into one signature,thereby reducing the total size of the signature.Additionally,the final verifier can verify the signature of multiple messages with a single verification.This provides integrity and reliability for messages,and can be used in environments such as IIoT.Finally,since it is performed using pairing-free operations in the signature generation,aggregation,and verification phases,the operation efficiency is high compared to CB-AS methods proposed using pairings (Tab.2).

    For future research,it is necessary to study signcryption that can add data encryption for the confidentiality of data transmitted in the IoT environment.In particular,research on weight reduction to reduce the amount of computations performed in each phase for efficient communication between IoT devices should also be conducted.

    Funding Statement:This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1085718) and was supported by the Soonchunhyang University Research Fund.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美日韩视频高清一区二区三区二| 日本欧美国产在线视频| 国产在视频线精品| 狠狠精品人妻久久久久久综合| 日韩欧美一区视频在线观看 | av卡一久久| 乱系列少妇在线播放| 亚洲精品一区蜜桃| 最近中文字幕2019免费版| 97人妻精品一区二区三区麻豆| 国产精品日韩av在线免费观看| 啦啦啦中文免费视频观看日本| 激情五月婷婷亚洲| 男女边摸边吃奶| 好男人在线观看高清免费视频| 久久久久久国产a免费观看| 亚洲av男天堂| 精品人妻视频免费看| 哪个播放器可以免费观看大片| 亚洲精品久久久久久婷婷小说| 国产av在哪里看| 美女主播在线视频| 亚洲国产精品专区欧美| 日韩大片免费观看网站| 亚洲自偷自拍三级| 日韩av免费高清视频| 久久久精品欧美日韩精品| 一区二区三区四区激情视频| 一个人免费在线观看电影| 99九九线精品视频在线观看视频| 国产av不卡久久| 最近中文字幕高清免费大全6| 久99久视频精品免费| 亚洲人成网站高清观看| 我的老师免费观看完整版| 美女主播在线视频| 国产成人a∨麻豆精品| 国产单亲对白刺激| 午夜免费男女啪啪视频观看| 国产黄频视频在线观看| av在线天堂中文字幕| 欧美xxxx性猛交bbbb| 日韩电影二区| 91午夜精品亚洲一区二区三区| 在线免费观看的www视频| 午夜福利在线观看吧| 亚洲成人一二三区av| 国产成人午夜福利电影在线观看| 蜜臀久久99精品久久宅男| 久久久久久国产a免费观看| 简卡轻食公司| 少妇的逼水好多| 国产永久视频网站| 舔av片在线| 成人性生交大片免费视频hd| 亚洲av中文字字幕乱码综合| 神马国产精品三级电影在线观看| 精品一区在线观看国产| 韩国av在线不卡| 亚洲在线观看片| 精品不卡国产一区二区三区| 久久久成人免费电影| 一二三四中文在线观看免费高清| 亚洲精品一区蜜桃| 国产精品一区二区性色av| 我的女老师完整版在线观看| 精品一区二区三区视频在线| 少妇的逼水好多| 精品人妻偷拍中文字幕| 777米奇影视久久| 一本一本综合久久| 秋霞伦理黄片| 男女边摸边吃奶| 欧美精品国产亚洲| 一本一本综合久久| 久久久久久久久中文| 大又大粗又爽又黄少妇毛片口| 看十八女毛片水多多多| 免费av毛片视频| 免费大片18禁| 免费看日本二区| 80岁老熟妇乱子伦牲交| 国产亚洲5aaaaa淫片| 国产国拍精品亚洲av在线观看| 亚洲精品国产av成人精品| 亚洲国产精品国产精品| 插逼视频在线观看| 欧美精品国产亚洲| 国产老妇伦熟女老妇高清| 国产综合懂色| 亚洲欧美一区二区三区黑人 | 男女国产视频网站| 亚洲国产精品成人久久小说| 精品一区二区三卡| 亚洲第一区二区三区不卡| 国产精品久久久久久精品电影| 久久99热这里只频精品6学生| 人妻少妇偷人精品九色| 欧美变态另类bdsm刘玥| 日韩一本色道免费dvd| 一边亲一边摸免费视频| 男人狂女人下面高潮的视频| 亚洲成人av在线免费| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产精品一区www在线观看| 国产在线男女| 亚洲精品日韩av片在线观看| 插阴视频在线观看视频| 赤兔流量卡办理| 男女啪啪激烈高潮av片| 校园人妻丝袜中文字幕| 十八禁国产超污无遮挡网站| 午夜福利网站1000一区二区三区| 久久久久久国产a免费观看| 三级国产精品片| 久久精品国产亚洲av涩爱| 在线观看一区二区三区| 亚洲精品影视一区二区三区av| 如何舔出高潮| 国产免费又黄又爽又色| 人妻制服诱惑在线中文字幕| 黄色一级大片看看| 日韩欧美三级三区| 天天躁日日操中文字幕| 在线观看免费高清a一片| 久久99热6这里只有精品| 美女被艹到高潮喷水动态| 亚洲av二区三区四区| 亚洲真实伦在线观看| 蜜桃久久精品国产亚洲av| 国产免费又黄又爽又色| ponron亚洲| 3wmmmm亚洲av在线观看| 日韩强制内射视频| 成人性生交大片免费视频hd| 男女那种视频在线观看| 日日啪夜夜爽| 一级毛片aaaaaa免费看小| 久久亚洲国产成人精品v| 免费av不卡在线播放| 人人妻人人澡欧美一区二区| 日韩大片免费观看网站| 国产视频首页在线观看| 插阴视频在线观看视频| 女人被狂操c到高潮| 美女被艹到高潮喷水动态| 欧美不卡视频在线免费观看| 国产亚洲5aaaaa淫片| 国产av不卡久久| 日韩av在线免费看完整版不卡| 日本与韩国留学比较| 天美传媒精品一区二区| 中文在线观看免费www的网站| 亚洲精品aⅴ在线观看| 舔av片在线| 狠狠精品人妻久久久久久综合| 一级毛片黄色毛片免费观看视频| 偷拍熟女少妇极品色| av线在线观看网站| 亚洲av国产av综合av卡| 国语对白做爰xxxⅹ性视频网站| 亚洲丝袜综合中文字幕| 国产精品福利在线免费观看| videossex国产| 美女被艹到高潮喷水动态| 亚洲成人精品中文字幕电影| 大香蕉97超碰在线| 亚洲欧美日韩东京热| av免费在线看不卡| 嘟嘟电影网在线观看| 精品不卡国产一区二区三区| 国产高清国产精品国产三级 | 天美传媒精品一区二区| 大又大粗又爽又黄少妇毛片口| 2021天堂中文幕一二区在线观| av卡一久久| 青春草视频在线免费观看| 人人妻人人澡欧美一区二区| 一本一本综合久久| 国产成人一区二区在线| 亚洲av免费在线观看| 非洲黑人性xxxx精品又粗又长| 岛国毛片在线播放| 一级a做视频免费观看| 超碰97精品在线观看| 九九在线视频观看精品| 嫩草影院精品99| 高清毛片免费看| 纵有疾风起免费观看全集完整版 | 欧美潮喷喷水| 亚洲国产av新网站| 免费在线观看成人毛片| 天堂中文最新版在线下载 | 好男人视频免费观看在线| 成人一区二区视频在线观看| 搡女人真爽免费视频火全软件| 在线 av 中文字幕| 三级经典国产精品| 欧美一区二区亚洲| 亚洲人成网站高清观看| 26uuu在线亚洲综合色| 免费观看的影片在线观看| 亚洲国产日韩欧美精品在线观看| 最近最新中文字幕免费大全7| 国产中年淑女户外野战色| 白带黄色成豆腐渣| 亚洲欧洲日产国产| 亚洲国产精品国产精品| 亚洲国产精品sss在线观看| 免费观看的影片在线观看| 人妻一区二区av| 美女国产视频在线观看| 亚洲精品456在线播放app| 国产午夜福利久久久久久| 偷拍熟女少妇极品色| 精品久久久久久久久久久久久| 午夜日本视频在线| 免费观看无遮挡的男女| 欧美丝袜亚洲另类| 麻豆精品久久久久久蜜桃| 美女cb高潮喷水在线观看| 99热这里只有是精品在线观看| 亚洲精品国产av蜜桃| 中文字幕免费在线视频6| 国产av国产精品国产| 国产精品久久视频播放| 久久久久精品性色| 成人性生交大片免费视频hd| 国产综合懂色| 伊人久久国产一区二区| 欧美日本视频| 日韩人妻高清精品专区| 日韩av免费高清视频| 亚洲精品日本国产第一区| 高清在线视频一区二区三区| 内射极品少妇av片p| 亚洲乱码一区二区免费版| 精品一区在线观看国产| 秋霞在线观看毛片| 麻豆成人av视频| 亚洲自拍偷在线| 最近手机中文字幕大全| 大香蕉久久网| 午夜亚洲福利在线播放| 久久久久久久久中文| 国产成人免费观看mmmm| 国产精品一二三区在线看| 国产有黄有色有爽视频| 天美传媒精品一区二区| 国产精品不卡视频一区二区| 九色成人免费人妻av| 亚洲美女搞黄在线观看| 亚洲精品久久久久久婷婷小说| 最近手机中文字幕大全| 日韩,欧美,国产一区二区三区| 国产国拍精品亚洲av在线观看| 别揉我奶头 嗯啊视频| 国产av在哪里看| 一本一本综合久久| 全区人妻精品视频| 一个人观看的视频www高清免费观看| 亚洲av中文字字幕乱码综合| 99久久中文字幕三级久久日本| 免费看av在线观看网站| 22中文网久久字幕| 精品欧美国产一区二区三| 一个人看的www免费观看视频| 乱人视频在线观看| 国产在线男女| 有码 亚洲区| 天堂影院成人在线观看| 日本wwww免费看| 免费看av在线观看网站| 久久99精品国语久久久| 国产成人aa在线观看| 夜夜看夜夜爽夜夜摸| 一区二区三区四区激情视频| 内射极品少妇av片p| 国国产精品蜜臀av免费| 黄色欧美视频在线观看| 国产欧美另类精品又又久久亚洲欧美| 伊人久久国产一区二区| 国产精品av视频在线免费观看| 人妻系列 视频| 身体一侧抽搐| 亚洲精品国产av成人精品| 欧美激情久久久久久爽电影| 嫩草影院新地址| 小蜜桃在线观看免费完整版高清| 精品久久国产蜜桃| 日韩电影二区| 免费电影在线观看免费观看| 伊人久久国产一区二区| 亚洲怡红院男人天堂| 婷婷色av中文字幕| 91午夜精品亚洲一区二区三区| 午夜福利视频1000在线观看| 99视频精品全部免费 在线| 久久6这里有精品| 国产成人一区二区在线| 精品人妻熟女av久视频| 大陆偷拍与自拍| 免费观看性生交大片5| 日韩一区二区视频免费看| 久久久久精品久久久久真实原创| 亚洲av不卡在线观看| 国产亚洲5aaaaa淫片| 久99久视频精品免费| 午夜福利在线观看免费完整高清在| 91精品伊人久久大香线蕉| 欧美变态另类bdsm刘玥| 亚洲精品国产成人久久av| 国产探花在线观看一区二区| 久久人人爽人人爽人人片va| 免费黄频网站在线观看国产| 日日撸夜夜添| 在线观看人妻少妇| 97超视频在线观看视频| 又黄又爽又刺激的免费视频.| 亚洲国产av新网站| 亚洲国产精品国产精品| 亚洲综合色惰| 老师上课跳d突然被开到最大视频| 国产不卡一卡二| 亚洲成人一二三区av| 日产精品乱码卡一卡2卡三| 国产片特级美女逼逼视频| 欧美日韩一区二区视频在线观看视频在线 | 国产成人午夜福利电影在线观看| 91久久精品国产一区二区三区| 免费人成在线观看视频色| 国产成人免费观看mmmm| 观看免费一级毛片| 99久久中文字幕三级久久日本| 亚洲图色成人| 精品一区二区免费观看| 亚洲天堂国产精品一区在线| 99久久中文字幕三级久久日本| 色尼玛亚洲综合影院| 国产不卡一卡二| 国产精品久久久久久久久免| av国产免费在线观看| 国产亚洲一区二区精品| 国产三级在线视频| 国产精品伦人一区二区| 精品人妻视频免费看| 啦啦啦啦在线视频资源| 精华霜和精华液先用哪个| 建设人人有责人人尽责人人享有的 | 啦啦啦啦在线视频资源| 少妇人妻一区二区三区视频| 久热久热在线精品观看| 少妇被粗大猛烈的视频| 免费黄网站久久成人精品| 欧美bdsm另类| 99久久人妻综合| 日韩不卡一区二区三区视频在线| 亚洲国产精品国产精品| 最近最新中文字幕免费大全7| 天堂影院成人在线观看| 国产成年人精品一区二区| 国产大屁股一区二区在线视频| 国产精品久久久久久精品电影| av线在线观看网站| 最近最新中文字幕免费大全7| 亚洲天堂国产精品一区在线| 日韩三级伦理在线观看| 国产淫语在线视频| 亚洲精品国产成人久久av| 小蜜桃在线观看免费完整版高清| 国产精品精品国产色婷婷| 欧美日本视频| 69人妻影院| 黄色配什么色好看| 亚洲精品影视一区二区三区av| 人人妻人人澡人人爽人人夜夜 | 特级一级黄色大片| 99九九线精品视频在线观看视频| 国产探花极品一区二区| 亚洲国产精品成人综合色| 色综合色国产| 国模一区二区三区四区视频| 亚洲欧美精品自产自拍| 精品人妻熟女av久视频| 免费看a级黄色片| 日本黄色片子视频| 久久精品国产自在天天线| 成年av动漫网址| 亚洲欧洲国产日韩| 亚洲天堂国产精品一区在线| 亚洲熟妇中文字幕五十中出| 国产激情偷乱视频一区二区| 国产一区二区亚洲精品在线观看| 亚洲精品一二三| 99九九线精品视频在线观看视频| 亚洲欧美日韩东京热| 丝袜美腿在线中文| 最近中文字幕2019免费版| 春色校园在线视频观看| 永久免费av网站大全| 久久久久网色| 午夜福利在线在线| 91精品国产九色| 又大又黄又爽视频免费| 亚洲国产精品国产精品| 欧美精品国产亚洲| 免费av观看视频| 少妇裸体淫交视频免费看高清| 看免费成人av毛片| 欧美成人一区二区免费高清观看| 午夜福利在线观看免费完整高清在| 国产老妇伦熟女老妇高清| 国产永久视频网站| 国产69精品久久久久777片| 亚洲成人中文字幕在线播放| 99久久人妻综合| 丰满人妻一区二区三区视频av| 国产成人a区在线观看| 一级片'在线观看视频| 一级毛片aaaaaa免费看小| 色综合站精品国产| 欧美激情国产日韩精品一区| 性插视频无遮挡在线免费观看| 色网站视频免费| 禁无遮挡网站| 91午夜精品亚洲一区二区三区| 国产视频内射| 少妇丰满av| 精品亚洲乱码少妇综合久久| 亚洲熟妇中文字幕五十中出| 亚洲欧美成人精品一区二区| 欧美zozozo另类| 老司机影院毛片| 毛片女人毛片| 2022亚洲国产成人精品| 特大巨黑吊av在线直播| 日日撸夜夜添| 天堂av国产一区二区熟女人妻| 成人漫画全彩无遮挡| 人妻制服诱惑在线中文字幕| 国产精品1区2区在线观看.| av在线天堂中文字幕| 黄色配什么色好看| 午夜福利视频1000在线观看| 午夜日本视频在线| 中文字幕制服av| 精品久久久久久电影网| 精品亚洲乱码少妇综合久久| 亚洲精品成人久久久久久| 建设人人有责人人尽责人人享有的 | 69av精品久久久久久| 男人和女人高潮做爰伦理| 久久久久久久久久久免费av| 夫妻午夜视频| 伊人久久国产一区二区| 国产精品国产三级专区第一集| 亚洲四区av| 久久鲁丝午夜福利片| 一级a做视频免费观看| 成人美女网站在线观看视频| 亚洲国产精品专区欧美| 午夜精品国产一区二区电影 | 成年版毛片免费区| 校园人妻丝袜中文字幕| 97超碰精品成人国产| 一边亲一边摸免费视频| 丝袜喷水一区| 亚洲欧洲国产日韩| 亚洲精品国产av蜜桃| 亚洲国产精品sss在线观看| 国产乱来视频区| 日韩一本色道免费dvd| 成人av在线播放网站| 国产在视频线精品| 中文字幕av在线有码专区| 色吧在线观看| 国产免费又黄又爽又色| 久久综合国产亚洲精品| 老司机影院毛片| 久久久久精品性色| 深夜a级毛片| 亚洲国产精品国产精品| 久久精品综合一区二区三区| 欧美激情久久久久久爽电影| 国产精品嫩草影院av在线观看| av在线观看视频网站免费| 内地一区二区视频在线| 亚洲内射少妇av| 久久精品国产亚洲av涩爱| 最后的刺客免费高清国语| ponron亚洲| 国产一级毛片在线| 黑人高潮一二区| 欧美日本视频| 日韩欧美精品免费久久| 22中文网久久字幕| 狠狠精品人妻久久久久久综合| 国产欧美另类精品又又久久亚洲欧美| 久久久久免费精品人妻一区二区| 午夜老司机福利剧场| 精品人妻偷拍中文字幕| 精品久久久久久成人av| 国产av不卡久久| 久久精品国产亚洲av涩爱| 最近手机中文字幕大全| 人人妻人人澡欧美一区二区| 精品人妻一区二区三区麻豆| 精品一区在线观看国产| 国产精品一区二区在线观看99 | 国产精品1区2区在线观看.| 在线免费十八禁| 精华霜和精华液先用哪个| 亚洲av成人精品一区久久| 偷拍熟女少妇极品色| 欧美日韩综合久久久久久| 国产精品美女特级片免费视频播放器| 精华霜和精华液先用哪个| 成人美女网站在线观看视频| 天美传媒精品一区二区| 亚洲欧美一区二区三区黑人 | 免费av毛片视频| 赤兔流量卡办理| 91精品伊人久久大香线蕉| 男的添女的下面高潮视频| 国产精品久久久久久久久免| 中文精品一卡2卡3卡4更新| 久久精品国产亚洲av涩爱| 大香蕉97超碰在线| 亚洲精品日韩av片在线观看| 黄色欧美视频在线观看| 国产高清有码在线观看视频| 1000部很黄的大片| 中文字幕亚洲精品专区| 午夜激情久久久久久久| 伊人久久精品亚洲午夜| 中文乱码字字幕精品一区二区三区 | 国产片特级美女逼逼视频| 亚洲成人中文字幕在线播放| 大又大粗又爽又黄少妇毛片口| 一夜夜www| av在线蜜桃| 午夜福利成人在线免费观看| 国产精品三级大全| 国产精品.久久久| 国产美女午夜福利| 成人国产麻豆网| 午夜免费观看性视频| 国产精品久久久久久av不卡| 男人舔奶头视频| 日日啪夜夜爽| 深爱激情五月婷婷| av.在线天堂| 啦啦啦啦在线视频资源| 精品午夜福利在线看| 日韩,欧美,国产一区二区三区| 精品一区二区三区视频在线| 最新中文字幕久久久久| 看黄色毛片网站| 日韩欧美精品免费久久| 亚洲自拍偷在线| 国产免费又黄又爽又色| 丝袜美腿在线中文| 日韩精品青青久久久久久| 日韩欧美国产在线观看| 欧美性感艳星| 天堂中文最新版在线下载 | 亚洲在线自拍视频| 久久精品久久精品一区二区三区| 纵有疾风起免费观看全集完整版 | 国产午夜精品久久久久久一区二区三区| 免费黄频网站在线观看国产| 国产黄片视频在线免费观看| 国产爱豆传媒在线观看| 亚洲精品一区蜜桃| 免费看美女性在线毛片视频| 国产免费一级a男人的天堂| 99热这里只有精品一区| av一本久久久久| 插逼视频在线观看| 国产单亲对白刺激| 精品久久久久久久久av| av天堂中文字幕网| 日本黄色片子视频| 国产国拍精品亚洲av在线观看| 免费无遮挡裸体视频| 99热6这里只有精品| 亚洲精品乱久久久久久| 亚洲最大成人中文| 三级毛片av免费| 亚洲一级一片aⅴ在线观看| 十八禁网站网址无遮挡 | 久久国产乱子免费精品| 99热这里只有是精品50| 成人午夜高清在线视频| 亚洲av中文av极速乱| 国产 一区 欧美 日韩| 最近中文字幕高清免费大全6| 22中文网久久字幕| 老师上课跳d突然被开到最大视频| 国产黄色小视频在线观看| 中文天堂在线官网| 高清在线视频一区二区三区| 日韩成人av中文字幕在线观看| 午夜福利高清视频| 老师上课跳d突然被开到最大视频| 日本爱情动作片www.在线观看| 午夜福利高清视频| 在线观看人妻少妇| 亚洲欧美日韩卡通动漫| 午夜日本视频在线| 免费少妇av软件| 卡戴珊不雅视频在线播放| 免费高清在线观看视频在线观看| 国产高清三级在线| 91精品伊人久久大香线蕉|