• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Proxy Blind Signcryption Scheme for IoT

    2022-03-14 09:21:54AamerKhanInsafUllahFahadAlgarniMuhammadNaeemIrfanUddinandMuhammadAsgharKhan
    Computers Materials&Continua 2022年3期

    Aamer Khan,Insaf Ullah,Fahad Algarni,Muhammad Naeem,M.Irfan Uddin and Muhammad Asghar Khan

    1Department of Information Technology,Abbottabad University of Science and Technology,Abbotabad,Pakistan

    2Hamdard Institute of Engineering and Technology,Islamabad,44000,Pakistan

    3College of Computing and Information Technology,University of Bisha,Bisha,Saudi Arabia

    4Institute of Computing,Kohat University of Science and Technology,Kohat,Pakistan

    Abstract: Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture,ecological data management, and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However, due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication, unforgeability of warrants and/or plaintext, confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets.

    Keywords: Proxy signcryption; multi-digital-documents proxy blind signcryption; hyperelliptic curve; IoT

    1 Introduction

    In recent years, there has been extensive research on IoT technologies, which covers various applications such as healthcare (HC), Industry 4.0, agriculture, and ecological data management,to name a few.The IoT comprises certain devices that have the capability of sending, receiving,and storing data, in addition to being about to communicate through the Internet.Once these devices are connected to the Internet, communication can take place for single documents as well as multi-digital messages.Thus, blindness and untraceable security services are required.Chaum was the first author to coin the term blind signature for the protection of digital information privacy.The blind signature mechanism enables resistance to forgery, indisputability and anonymity [1,2].Blindness and untraceability are the core properties which must be fulfilled by any blind signature scheme [1-4].In addition, the blindness property allows the transmission of signed messages between the user and the signer in an interactive signature protocol.In this instance, untraceability ensures that the signer cannot link back any message-signature pairs even if the signature is revealed to the public.A blind signature scheme based on the integer factorization problem (IFP), which was initially proposed by Chaum [2], relies on the solidity of the Rivest, Shamir, and Adleman (RSA) cryptosystem assumptions.The security of this scheme is based on the appropriate selection of the underlying hash function.There have been several investigations on various schemes that examined the efficiency, security of improved blind signature techniques [3-11].ECC-based blind signatures have been introduced in several variations;these schemes are extremely beneficial for applied applications between security and performance[12-19].Lin et al.[20] proposed a new scheme, named the proxy blind signature, which combines proxy and blind signatures.The proxy signer is permitted with features to create blind signatures on behalf of the original signer, similar to the traditional digital signature procedure with some unique differences.Several studies have revealed considerable types of variations for this scheme to improve the desired unforgeability, untraceability, non-repudiation and efficiency [21-29].

    Gamage et al.[30] provided a new approach called proxy signcryption by merging a proxy signature and encryption in a single logical step.Their approach was more secure and proficient due to the incorporation of the discrete logarithm problem (DLP).However, this approach suffered from several issues such as forward secrecy and public verifiability.Moreover, Zhang et al.[31] introduced a new proxy signcryption scheme which incorporates public verifiability and forward secrecy.Their scheme suffered from higher computational and communication costs which was later addressed by Li et al.[32].Wang et al.[33] addressed security constraints such as forward secrecy and public verifiability with an approach called an efficient identity-based proxy-signcryption.Duan et al.[34] introduced another proxy-signcryption scheme, named secure under ROM (Random Oracle Model), which is a secure delegation-by-warrant ID- based proxy signcryption scheme.However, this scheme was challenged and negatively affected by extra computations and limited communication bandwidth.A more recent and improved proxy-signcryption scheme was provided by Elkamchouchi et al.[35-37].The authors asserted that their techniques are publicly verifiable while achieving confidentiality, higher security levels, and authenticity using an unsecured channel.

    Partial delegation rights were also provided in their technique by using bilinear pairings on elliptic curves.Their techniques suffered from a misuse of authority in the case of partial delegation.A new provable and secure proxy-signcryption scheme was designed by Lin et al.[38]by utilizing bilinear pairing.Despite the advantages of these techniques, another main drawback is their inability to ensure the warrant unforgeability requirement for security.Elkamchouchi et al.[39] introduced a proxy-signcryption based on the notion of warrants.The scheme introduced by the authors was based on elliptic curve cryptography to ensure efficiency and security,however it suffers from extra power consumption.Yanfeng et al.proposed proxy identity-based signcryption based on the elliptic curve discrete logarithm problem (ECDLP) [40].Another proxysigncryption scheme using DLP and ECDLP was introduced by Elkamchouchi et al.[41].Despite their claim that the proposed scheme incurs less communication and computational costs, a major issue is that it is not sufficiently provable.More recently, a new provable and secure proxy-signcryption scheme was introduced by Lo et al.[42] based on bilinear pairing.The study addressed performance and secrecy in an effective approach in terms of unforgeability and indistinguishability.Ming et al.[43] developed a provable and secure proxy-signcryption scheme based on a standard model to improve the security service area.This approach was relatively narrow,being primarily focused on heavy computations of bilinear pairing and it also suffered from additional communication and machine control costs.

    In our previous work [44], we proposed a lightweight proxy-signcryption scheme using hyperelliptic curve cryptography.This scheme ensures all security service areas that are commonly needed for proxy-signcryption in resource constrained environments due to its needs of low computational and communication costs.Our scheme was affected by utilizing additional major operations over the hyperelliptic curve.A novel proxy-signcryption scheme and its elliptic curve variant were recently proposed by Abdelfatah [45].The author claimed that the developed technique was more secure and efficient, however, the study fails to provide security requirements such as non-repudiation, warrants, message, and message non-repudiation.The technique also incurred higher computational and communication costs.In addition, the above proxy-signcryption scheme only provides a delegation of rights with authenticity and confidentiality.Therefore, the scheme suffers in cases where the applications require anonymity.

    Sadat et al.[46] proposed another proxy blind signcryption technique to provide the anonymity property together with a delegation of rights.It combines the property of proxy signcryption with blind signcryption [47-50].More recently, Su et al.[51] proposed a new proxy blind signcryption for multiple digital documents based on elliptic curve cryptography.The scheme allows the sender to simultaneously produce a proxy blind signcryption of multi-digital documents.To the best of our knowledge, all the proxy blind signature and proxy blind signcryption approaches available in the literature are affected by higher computational cost due to RSA,bi-linear pairing and EC.A major reason for these issues is due to the fact that underlying frameworks have larger key sizes, such as 1024 bits for RSA and bilinear pairing, and 160 bits for EC.

    In this paper, we propose a new provable secure proxy blind signcryption scheme for multidigital messages based on hyperelliptic curves which provides a similar level of security with less communication and computational costs.The rest of the paper is organized as follows: Section 2 discusses the pre-requisites to understanding the formalization of our scheme, which is followed by discussions of our methodology in Section 3.Sections 4 and 5 cover the results and discussions.Finally, the conclusion is presented in Section 6.

    2 Preliminaries of Formalisms

    In 1988, Koblitz introduced the generality of the elliptic curve to the advanced genus of the curve called the hyperelliptic curve cryptosystem, which performs a significant operation in comparison to the elliptic curve cryptosystem.Let g=genus (curve) over Fq (set of finite fields of order q), g.log2q ≈2160=group order (field) Fq for the genus one and there will be a need for a future field Fq for the order of the curve i.e., for genus two |Fq| ≈280are 80 bits long, for genus three 54-bits long operands [52].

    Let F0= final field of hyper ellipticcurve cryptosystem and= algebraic closure of a field,the genus (curve) g>1 over F0represents sol-set (x, y) ∈F0*F0.The following equation of the hyper ellipticcurve is:

    where h(x)∈F0[x] is poly-nominal of degree g and f(x) ∈F0[x] is monic-polynomial of degree 2(g)+1, no solution set of (x,y) ∈F0*F0which satisfy Eq.(1).The partial derivative of 2y+h(x)=0 and h/(x)-f/(x)=0.The Elliptic Curve is the particular case of hyper ellipticcurve at g = 1.

    In contrast, the group arrangement of the hyperelliptic curve has the Jacobian (J) of a curve C.A piece element of the J is a correspondent class of divisors.A divisor is the formal sum of finite points for the curveρi∈C.

    wheremi0, and each element of the J can be denoted by an exceptional divisor.

    The reduced divisor is:

    Eq.(3) contains one opposite point, i.e.,

    and opposed point forρ(x,y) ∈Cisρ(x,-y,-h(x))∈C

    Polynomial expressions can be used to characterize the divisor [53].The operative process of calculation for the whole value of C in Abelian group having a DLP.

    The group operations of addition and doubling of divisors is called a scalar multiplication divisor (SMD).The operations changed elliptic curve point multiplication into divisors of the Jacobian of a hyper ellipticcurve [53-55].

    3 Proposed Model in a Nutshell

    Our scheme consists of five participants:

    ? Original user: The original signer delegates the signing capabilities to a proxy signcrypter.

    ? Proxy signcrypter: The proxy signcrypter verifies the delegation and blinds a message for signing and then delivers it to the anonymous signer.

    ? Anonymous signer: The signer generates a blind signature on a blind message and then sends it back to the proxy signcrypter.The proxy signcrypter combines the blind signature with an encrypted message and hands it over to the receiver.

    ? Receiver/Un-signcrypter: At the end, the receivers verify the blind signcrypted message and then decrypt it.

    ? The authentication server: This acts as a certificate authority which publishes all the public parameters and generates the certificates for each user.

    Fig.1 illustrates the flow of our proposed scheme.

    Figure 1: Flow of our proposed scheme

    The communication in the above scheme is completed in the following steps (the sequence of these steps is demonstrated in Fig.1): Key Generation: The pre-requisite of our model (not shown in Fig.1) is the generation of keys (public and private) by each participant of our scheme in the following manner:

    All participants (Alice, Proxy, signer, Bob) first generate their keys (private, public) from the givenσsecurity parameter with size 80 bits as follows:

    Alice: randomly takes a numberXafrom {0,1,2,...,n-1} which is the private key and calculates the public keyYa:Ya=XaD

    Proxy: randomly chooses integerXpfrom set {0,1,2,...,n-1}which is the private key and calculates the public keyYp:Yp=XpD

    Signer: randomly chooses integerXsfrom set {0,1,2,...,n-1}which is the private key and calculates the public keyYs:Ys=XsD

    Bob: randomly chooses integerXbfrom set {0,1,2,...,n-1} which is the private key and calculates the public keyYb:Yb=XbD

    I.Delegation: In this step, Alice signs a warrant message and sends it to the proxy as follows:

    II.Proxy key verification phase: The proxy signcrypter first checks the validity of the warrant message, i.e., whether it was initiated by Alice or not.Only those messages which are generated by Alice are accepted.

    Compute =T.D+h(U,mw).Ya

    III.Proxy blind signcryption

    i Signer

    (a) Signer selects a random number dE{0,1,2,...n-1}

    (b) ComputeV=d.Dmod n

    (c) SendVto the proxy

    ii Proxy

    Suppose the proxy assumes that he wants to send a vector of messagesmjEM, blindly, over a public network to Bob while maintaining their privacy.

    iii Signer

    iv Proxy

    IV Bob/blind Unsigncryption

    After receiving(Cj,r,S,Z), Bob verifies the multi-documents’signcrypted text and accepts them if they are valid, otherwise he rejects them.

    4 Security Analysis

    In this section, we divide the security of our scheme into two parts, the first part showing the correctness of the scheme and the second part showing the security services e.g., warrant authentication, unforgeability of warrants, confidentiality, integrity, and blindness, respectively.We consider a popular Dolev-Yao (DY) threat model and suppose the adversary is able to dismiss the warrant authentication, forge the warrant signature, read the exchanged messages, destroy the blindness, modify the message contents, and generate a forged signature.

    4.1 Correctness

    Theorem 1:In this theorem, we prove how a blind unsigncrypter generates the secret key for it to decrypt a cipher text.The unsigncrypter performs the following process.

    Theorem 2:In Theorem 2, we prove how the proxy signcrypter validates whether the warrant message is from the sender or not.The proxy signcrypter performs the following process.

    4.2 Warrant Authentications

    The security attribute of the warrant authentication is another contribution of our approach.If the sender delegates their signing rights by sending a warrant messagemwto the proxy, the original user first generates the digital signaturemwusingT=(L-Xa.h(U,mw)).When an attacker wants to break the authenticity, it must have the secret numberLfromA=L.Dand the private key of the original userXafromYa=XaDby computing two elliptic curve discrete logarithm problems, which is difficult for an attacker to solve.Thus, our designed scheme ensures the strong authenticity of a warrant.

    4.3 Unforgeability of Warrant

    Our scheme also meets the property of warrant unforgeability.When an attacker generates a forged signatureT /for a warrantmw, the attacker first computesLfrom Eq.(3) and the private key of the original userXafromYa=XaD, which is equal to solving two elliptic curve discrete logarithm problems.Thus, finding two unknown variables from the same equation is not feasible for an attacker.

    4.4 Confidentiality

    In our scheme, the encrypted multi-documents are sent to the legitimate recipient (Bob) using the secret shared keyK.If an intruder wants to access the original contents of an encrypted multi-document, they need to get the secret shared keyK, first which involves the following steps.

    Step 1: An intruder can easily get the secret shared key if they can solve Eq.(1).Therefore,the intruder must first get the blind random numberOwhich is private to the proxy signer.Hence,it is difficult for an intruder to solve=(O.Ybmodn)which is the equivalent of solving a difficult problem such as the hyperelliptic curve discrete logarithm problem.

    Step 2: Similar to step 1, an intruder can get the secret key fromG=Xb.S.However, the intruder needs Bob’s private keyXbfromYb=XbD.This is very difficult and finding Bob’s private key from theYb=XbDis the equivalent of solving a difficult problem such as the hyperelliptic curve discrete logarithm problem.

    4.5 Integrity

    4.6 Unforgeability

    In our designed scheme, before sending the multi-document cipher text to the recipients/Bob,the signer computes a blind digital signature on the multi-documents cipher text as(Xs+Ω.d).This signature includes two private parameters, the private keyXsof the signer and the private randomly generated number d.Thus, finding the private key of the signer fromYs=XsDand a private number fromV=d.Dmod nis the equivalent of calculating two hyperelliptic curve discrete logarithm problems which is infeasible for intruders.

    4.7 Blindness

    Our scheme enables the proxy signer to select three blind numbersO,P, andQ∈{0,1,2,...n-1} to blind a multi-document.The signer does not know about the blind number because it is private to the proxy signer and the original contents of a multi-document cannot be derived.Hence, our designed scheme provides the security property of blindness.

    5 Computational Efficiency

    This section elaborates on the computational cost of the proposed multi-document proxy blind signcryption scheme and the existing proxy blind signature [28,29] and signcryption schemes [46,47].We compare our strategy with the state-of-the-art approaches by computing the time taken for proxy delegations, proxy blind signcryption and proxy blind unsigncryption.As shown in Tab.1, we usePMfor elliptic curve point multiplication andHMfor hyperelliptic curve divisor multiplications.Tab.1 demonstrates the key operations of the existing and proposed proxy blind signcryption schemes.

    Table 1: Comparisons in terms of major operations

    The computations of addition, subtraction, division and hash are ignored due to their fewer needs of computations and lower execution periods.For a more detailed illustration of the difference between the proposed and existing schemes, observations can be obtained from Ullah et al.[55], and “test the runtime of basic cryptographic operations” respectively

    According to Ullah et al.[55], 1PMand 1HMconsume 0.97 and 0.48 milliseconds, respectively.Tab.2 and Fig.2 compare our scheme with the existing ones proposed in [28,29,46,47], with respect to milliseconds for a single message.

    Table 2: Comparisons in terms of milliseconds

    Figure 2: Comparisons in terms of milliseconds

    If the number of digital messages increases, then the computational cost will increase.Tab.3 and Fig.3 compare our scheme with the previous schemes for a varying number of messages.Our results show that our scheme is more computationally efficient even for a larger number of messages.

    Table 3: Comparison in terms of milliseconds for a varying number of messages

    Figure 3: Comparison in terms of milliseconds for a varying number of messages

    Further, we use the general formula[56] to reduce the computational cost for a single message as shown in Tab.4 and Fig.3.

    Table 4: Reduction of cost of the proposed proxy blind signcryption approach

    6 Conclusions

    In this paper, we have developed a lightweight and secure proxy blind signcryption scheme for multi-digital messages based on a hyperelliptic curve.Our scheme consists of five participants, e.g.,the authenticated server, original user, proxy signcrypter, the anonymous signer and receiver/unsigncrypter.The authenticated server performs the role of a certificate authority which publishes all public parameters and issues certificates to each user.The original signer simply delegates the signing capabilities to the proxy signcrypter.The proxy signcrypter verifies the delegation and blinds a message for signing, then delivers it to the anonymous signer.The signer only generates a blind signature on a blind message and then back sends it back to the proxy signcrypter.Finally, the proxy signcrypter combines the blind signature with the encrypted message and then hands it over to the receiver.In the final step, the receiver verifies the blind signcrypted message and then decrypts it.Further, the developed scheme provides all the security services of proxy and blind signcryption e.g., warrant authentication, unforgeability of warrants and/or plaintext,confidentiality, integrity, and blindness.Compared to the existing schemes, our scheme reduces the computational costs by about 33.28% to 64.07% in terms of milliseconds.Additionally, due to the lower parameters and the standard size of the hyperelliptic curve, our scheme is attractive to limited-resource devices such as those used in IoT environments.

    Future studies are required to shed light on the development of such a scheme with different functionalities.These functionalities will be combined into a single scheme, such as encryption only, signature only, and signcryption, so that they can be utilized whenever they are required.It is also important to consider developing more efficient techniques that focus on lowering computational and communication costs.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    长腿黑丝高跟| 婷婷精品国产亚洲av| 亚洲精华国产精华精| 男人舔女人下体高潮全视频| 白带黄色成豆腐渣| 国产国语露脸激情在线看| 国产不卡一卡二| 国产成+人综合+亚洲专区| 亚洲avbb在线观看| 亚洲av电影在线进入| 91字幕亚洲| 非洲黑人性xxxx精品又粗又长| 免费电影在线观看免费观看| 国产亚洲精品av在线| 最近在线观看免费完整版| 欧美午夜高清在线| 在线十欧美十亚洲十日本专区| 国产精品久久久av美女十八| 亚洲人成电影免费在线| 无遮挡黄片免费观看| 免费观看精品视频网站| 亚洲国产欧美一区二区综合| 好男人电影高清在线观看| 窝窝影院91人妻| x7x7x7水蜜桃| 美女午夜性视频免费| 久久草成人影院| 中文字幕人成人乱码亚洲影| 两个人看的免费小视频| 91在线观看av| 欧美另类亚洲清纯唯美| а√天堂www在线а√下载| 精品国产亚洲在线| 午夜成年电影在线免费观看| 国产色视频综合| 亚洲国产欧洲综合997久久, | 黄色成人免费大全| 很黄的视频免费| 长腿黑丝高跟| 国产99白浆流出| 老司机午夜福利在线观看视频| 国产一区在线观看成人免费| 亚洲国产欧美网| 国产色视频综合| 美女高潮喷水抽搐中文字幕| 免费观看人在逋| 国产精品国产高清国产av| 免费在线观看黄色视频的| 亚洲欧美日韩无卡精品| 成人欧美大片| 日韩大码丰满熟妇| 国产精品香港三级国产av潘金莲| 91在线观看av| 在线观看午夜福利视频| 美女午夜性视频免费| 欧美乱色亚洲激情| 一区二区三区精品91| 美女高潮喷水抽搐中文字幕| 久久精品91蜜桃| 中文在线观看免费www的网站 | 亚洲熟妇中文字幕五十中出| 亚洲熟女毛片儿| 日日爽夜夜爽网站| 1024手机看黄色片| 国产黄色小视频在线观看| 久久国产精品男人的天堂亚洲| 白带黄色成豆腐渣| 精品久久久久久久久久免费视频| 在线观看日韩欧美| 女性生殖器流出的白浆| 可以免费在线观看a视频的电影网站| 中文字幕另类日韩欧美亚洲嫩草| 99re在线观看精品视频| 久久精品国产亚洲av高清一级| 精品电影一区二区在线| 国产激情久久老熟女| 亚洲av第一区精品v没综合| 男女做爰动态图高潮gif福利片| 亚洲五月色婷婷综合| 在线av久久热| 亚洲av第一区精品v没综合| 国产精品免费视频内射| 午夜免费激情av| 亚洲男人天堂网一区| 国产v大片淫在线免费观看| av在线播放免费不卡| 男男h啪啪无遮挡| 老司机午夜十八禁免费视频| 欧美性猛交╳xxx乱大交人| 亚洲全国av大片| 色综合婷婷激情| aaaaa片日本免费| 国产精品爽爽va在线观看网站 | 黄色 视频免费看| 真人做人爱边吃奶动态| 亚洲欧美激情综合另类| 日韩欧美三级三区| 成人av一区二区三区在线看| 亚洲国产日韩欧美精品在线观看 | 欧美黑人精品巨大| 一区二区三区激情视频| 人妻久久中文字幕网| 琪琪午夜伦伦电影理论片6080| 一进一出抽搐gif免费好疼| 日韩大码丰满熟妇| 国产不卡一卡二| 亚洲五月色婷婷综合| 精品国产国语对白av| 97超级碰碰碰精品色视频在线观看| 久久精品影院6| 亚洲一区二区三区色噜噜| 91老司机精品| 国产av一区二区精品久久| 国产亚洲av高清不卡| 中文字幕av电影在线播放| 男人舔女人下体高潮全视频| 久热爱精品视频在线9| 国产国语露脸激情在线看| 国产蜜桃级精品一区二区三区| 久久婷婷成人综合色麻豆| 丁香六月欧美| 老司机午夜福利在线观看视频| 久久性视频一级片| 国产精品一区二区三区四区久久 | 日韩 欧美 亚洲 中文字幕| 国产精品一区二区精品视频观看| 日本三级黄在线观看| 一进一出抽搐动态| 又大又爽又粗| 91成年电影在线观看| 91麻豆精品激情在线观看国产| 神马国产精品三级电影在线观看 | 亚洲成人国产一区在线观看| 久久久国产欧美日韩av| 亚洲成a人片在线一区二区| 欧美激情极品国产一区二区三区| 国产亚洲精品第一综合不卡| 欧美成人午夜精品| 怎么达到女性高潮| 最新在线观看一区二区三区| 午夜福利在线观看吧| 久久中文看片网| 一区二区三区精品91| 日韩欧美三级三区| 中文亚洲av片在线观看爽| 亚洲中文日韩欧美视频| 国产极品粉嫩免费观看在线| 日韩视频一区二区在线观看| 91麻豆精品激情在线观看国产| 91在线观看av| 成年女人毛片免费观看观看9| 老汉色av国产亚洲站长工具| 欧美av亚洲av综合av国产av| 亚洲国产高清在线一区二区三 | 99热只有精品国产| 精品电影一区二区在线| 午夜两性在线视频| 免费一级毛片在线播放高清视频| 国内精品久久久久久久电影| 大香蕉久久成人网| 日韩av在线大香蕉| 在线永久观看黄色视频| 午夜福利18| 一进一出抽搐gif免费好疼| 午夜激情av网站| 成人精品一区二区免费| 在线国产一区二区在线| 中文字幕高清在线视频| 日本在线视频免费播放| 亚洲avbb在线观看| 国产亚洲欧美精品永久| 99久久国产精品久久久| 1024手机看黄色片| 99热只有精品国产| 变态另类成人亚洲欧美熟女| 国内精品久久久久精免费| 很黄的视频免费| 午夜精品在线福利| 午夜福利免费观看在线| 国产免费av片在线观看野外av| 午夜福利高清视频| 久久精品91蜜桃| 婷婷精品国产亚洲av| 韩国av一区二区三区四区| 久久热在线av| 很黄的视频免费| 欧美日韩中文字幕国产精品一区二区三区| 村上凉子中文字幕在线| 男人舔奶头视频| 美女国产高潮福利片在线看| 亚洲精品在线观看二区| 999久久久国产精品视频| 午夜福利高清视频| 两人在一起打扑克的视频| 久久久久久久精品吃奶| 亚洲av电影在线进入| www.999成人在线观看| 日韩 欧美 亚洲 中文字幕| 欧美日本亚洲视频在线播放| 性色av乱码一区二区三区2| 国产不卡一卡二| 天天躁夜夜躁狠狠躁躁| 欧美精品亚洲一区二区| 美国免费a级毛片| 精品国内亚洲2022精品成人| 国产人伦9x9x在线观看| 国产麻豆成人av免费视频| 香蕉国产在线看| 两个人视频免费观看高清| 亚洲狠狠婷婷综合久久图片| 欧美日韩中文字幕国产精品一区二区三区| 国产免费av片在线观看野外av| 国产在线观看jvid| 国产av在哪里看| 国产爱豆传媒在线观看 | 亚洲精品av麻豆狂野| 色尼玛亚洲综合影院| 精品欧美一区二区三区在线| 精品午夜福利视频在线观看一区| 中文字幕精品亚洲无线码一区 | 日本三级黄在线观看| 色综合欧美亚洲国产小说| or卡值多少钱| 男女午夜视频在线观看| 久久人人精品亚洲av| 色哟哟哟哟哟哟| 韩国精品一区二区三区| 亚洲国产毛片av蜜桃av| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲av熟女| 露出奶头的视频| 国产三级在线视频| 午夜免费成人在线视频| 欧美日本视频| 精品卡一卡二卡四卡免费| 久久久久国产一级毛片高清牌| 热99re8久久精品国产| 午夜精品久久久久久毛片777| av福利片在线| 欧美色视频一区免费| 十八禁人妻一区二区| 亚洲五月婷婷丁香| 国产精华一区二区三区| 亚洲五月婷婷丁香| 这个男人来自地球电影免费观看| 亚洲欧美激情综合另类| 亚洲五月婷婷丁香| 成年人黄色毛片网站| 99久久精品国产亚洲精品| 老司机靠b影院| 成人欧美大片| 亚洲第一电影网av| 91大片在线观看| 国产又黄又爽又无遮挡在线| 天堂影院成人在线观看| 国产又黄又爽又无遮挡在线| 一本精品99久久精品77| 国产又黄又爽又无遮挡在线| 亚洲天堂国产精品一区在线| 99久久综合精品五月天人人| 精品不卡国产一区二区三区| 国产亚洲精品久久久久久毛片| 欧美三级亚洲精品| 老汉色∧v一级毛片| 深夜精品福利| 国产三级在线视频| 91成人精品电影| 免费看a级黄色片| 神马国产精品三级电影在线观看 | 777久久人妻少妇嫩草av网站| 国产精品免费视频内射| 12—13女人毛片做爰片一| 色哟哟哟哟哟哟| 国产高清视频在线播放一区| 老熟妇仑乱视频hdxx| 国产男靠女视频免费网站| 精品乱码久久久久久99久播| 亚洲精品一区av在线观看| 亚洲专区中文字幕在线| 变态另类丝袜制服| 久久香蕉国产精品| 男女之事视频高清在线观看| 日日干狠狠操夜夜爽| 中亚洲国语对白在线视频| 在线看三级毛片| 成年免费大片在线观看| 久久伊人香网站| 亚洲人成网站高清观看| 精品卡一卡二卡四卡免费| 欧美不卡视频在线免费观看 | 欧美日本视频| 欧美激情久久久久久爽电影| 欧美三级亚洲精品| 国产野战对白在线观看| 宅男免费午夜| 91成年电影在线观看| 亚洲欧美一区二区三区黑人| 一本久久中文字幕| 国产精品美女特级片免费视频播放器 | 最近在线观看免费完整版| 两人在一起打扑克的视频| 成人18禁在线播放| 日日摸夜夜添夜夜添小说| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲精品国产精品久久久不卡| 国产在线精品亚洲第一网站| 亚洲人成网站高清观看| 国产成人精品久久二区二区免费| 午夜激情av网站| 欧美+亚洲+日韩+国产| 亚洲国产毛片av蜜桃av| 日本五十路高清| 非洲黑人性xxxx精品又粗又长| 免费看日本二区| 亚洲人成网站高清观看| av电影中文网址| 欧美三级亚洲精品| 亚洲国产毛片av蜜桃av| 久热这里只有精品99| 亚洲中文av在线| 中亚洲国语对白在线视频| 精品一区二区三区四区五区乱码| 精品久久久久久久久久久久久 | 亚洲色图av天堂| 午夜福利高清视频| 亚洲成人国产一区在线观看| 少妇裸体淫交视频免费看高清 | 久久99热这里只有精品18| 淫秽高清视频在线观看| 黄片大片在线免费观看| 亚洲一区高清亚洲精品| 亚洲精品av麻豆狂野| 国产精品98久久久久久宅男小说| 最好的美女福利视频网| 国产精品,欧美在线| 国产黄色小视频在线观看| 青草久久国产| 免费看日本二区| 色老头精品视频在线观看| 日本五十路高清| 香蕉av资源在线| 日本a在线网址| 日本一区二区免费在线视频| 级片在线观看| 少妇熟女aⅴ在线视频| 午夜福利高清视频| av在线播放免费不卡| 美女高潮到喷水免费观看| 大型av网站在线播放| 青草久久国产| 亚洲欧美精品综合久久99| 精品第一国产精品| 国产伦一二天堂av在线观看| 亚洲精品中文字幕在线视频| av中文乱码字幕在线| 国产蜜桃级精品一区二区三区| 国产精品精品国产色婷婷| 午夜免费激情av| 一级毛片女人18水好多| 久久这里只有精品19| 99在线视频只有这里精品首页| x7x7x7水蜜桃| 久久久久精品国产欧美久久久| 国产免费男女视频| 亚洲成人免费电影在线观看| 国内揄拍国产精品人妻在线 | a级毛片a级免费在线| 精品欧美一区二区三区在线| 9191精品国产免费久久| 悠悠久久av| 国产午夜精品久久久久久| 99精品久久久久人妻精品| 级片在线观看| 亚洲国产日韩欧美精品在线观看 | 老司机午夜十八禁免费视频| 成人亚洲精品av一区二区| 精品高清国产在线一区| 欧美成人午夜精品| 一区福利在线观看| 亚洲国产精品成人综合色| 久久精品国产99精品国产亚洲性色| 国产亚洲精品一区二区www| 日本免费一区二区三区高清不卡| 美女大奶头视频| videosex国产| 国产成人av教育| 亚洲国产欧美网| av天堂在线播放| 女性生殖器流出的白浆| 99精品久久久久人妻精品| 免费观看精品视频网站| 国产一级毛片七仙女欲春2 | 97超级碰碰碰精品色视频在线观看| 成人精品一区二区免费| 麻豆久久精品国产亚洲av| 欧美日韩中文字幕国产精品一区二区三区| 香蕉国产在线看| 久久久久久久久免费视频了| 一二三四在线观看免费中文在| 97人妻精品一区二区三区麻豆 | 久久久久九九精品影院| 在线看三级毛片| 丰满人妻熟妇乱又伦精品不卡| 久久国产精品人妻蜜桃| 成年版毛片免费区| 女同久久另类99精品国产91| av欧美777| 在线观看午夜福利视频| 99久久综合精品五月天人人| 中文字幕高清在线视频| 神马国产精品三级电影在线观看 | 男人舔女人下体高潮全视频| 91老司机精品| 人人澡人人妻人| 少妇 在线观看| 成人三级黄色视频| av有码第一页| 最近在线观看免费完整版| 亚洲aⅴ乱码一区二区在线播放 | 亚洲全国av大片| 视频区欧美日本亚洲| 久久这里只有精品19| 欧美日本视频| 搡老岳熟女国产| 黄频高清免费视频| 久久草成人影院| 看黄色毛片网站| 久热爱精品视频在线9| 18禁观看日本| 在线天堂中文资源库| 国产欧美日韩一区二区精品| 亚洲国产精品久久男人天堂| 国产精品一区二区精品视频观看| 国产成人系列免费观看| 亚洲性夜色夜夜综合| 久久天躁狠狠躁夜夜2o2o| 成年免费大片在线观看| 国产激情欧美一区二区| 亚洲成人免费电影在线观看| 成人国产一区最新在线观看| 国产免费av片在线观看野外av| 午夜亚洲福利在线播放| 99久久精品国产亚洲精品| 美女扒开内裤让男人捅视频| www.精华液| 亚洲五月天丁香| 丰满人妻熟妇乱又伦精品不卡| 黑人操中国人逼视频| 日本在线视频免费播放| 国产成+人综合+亚洲专区| 久久精品91蜜桃| 国产私拍福利视频在线观看| 一个人免费在线观看的高清视频| 欧美乱码精品一区二区三区| 757午夜福利合集在线观看| 久久99热这里只有精品18| 亚洲aⅴ乱码一区二区在线播放 | 熟女电影av网| 欧美黄色片欧美黄色片| 亚洲五月天丁香| 精品日产1卡2卡| 成人国产综合亚洲| 日韩欧美 国产精品| 19禁男女啪啪无遮挡网站| 欧美在线一区亚洲| 国产又黄又爽又无遮挡在线| 50天的宝宝边吃奶边哭怎么回事| 老司机靠b影院| 久久精品影院6| 欧美在线一区亚洲| 欧美另类亚洲清纯唯美| 女人爽到高潮嗷嗷叫在线视频| 好男人电影高清在线观看| 日本精品一区二区三区蜜桃| 日韩高清综合在线| 狂野欧美激情性xxxx| 亚洲一区中文字幕在线| 中文字幕人成人乱码亚洲影| 1024视频免费在线观看| 色尼玛亚洲综合影院| 国产精品亚洲一级av第二区| 香蕉av资源在线| 国产亚洲精品一区二区www| 日韩中文字幕欧美一区二区| 久久久久久国产a免费观看| 在线av久久热| 夜夜看夜夜爽夜夜摸| 国产黄a三级三级三级人| 十分钟在线观看高清视频www| 岛国在线观看网站| 久久精品国产清高在天天线| 别揉我奶头~嗯~啊~动态视频| 国产熟女xx| 美女午夜性视频免费| 一夜夜www| 中文字幕久久专区| 日韩欧美一区二区三区在线观看| 成年免费大片在线观看| 国产乱人伦免费视频| 亚洲av成人av| 久久草成人影院| 免费在线观看影片大全网站| 国产亚洲精品久久久久5区| 两个人看的免费小视频| 亚洲全国av大片| 大型av网站在线播放| 久久午夜综合久久蜜桃| 亚洲真实伦在线观看| 一个人免费在线观看的高清视频| 国产精品 国内视频| 久久午夜综合久久蜜桃| 国产不卡一卡二| 夜夜夜夜夜久久久久| 身体一侧抽搐| 一本久久中文字幕| 18美女黄网站色大片免费观看| 国产成人av教育| 一边摸一边做爽爽视频免费| 嫩草影院精品99| 精品国内亚洲2022精品成人| 日韩欧美三级三区| 天堂影院成人在线观看| 国产高清激情床上av| 久99久视频精品免费| 欧美日韩黄片免| 在线观看午夜福利视频| 激情在线观看视频在线高清| 日本a在线网址| 脱女人内裤的视频| 国产精品久久久久久亚洲av鲁大| 国产精品久久视频播放| 搡老熟女国产l中国老女人| 欧美午夜高清在线| 人人妻人人澡人人看| 国产精品一区二区精品视频观看| 美女免费视频网站| 久久性视频一级片| 亚洲色图av天堂| 免费高清视频大片| 在线看三级毛片| 在线视频色国产色| 老司机午夜福利在线观看视频| 丝袜在线中文字幕| a级毛片在线看网站| 国产黄片美女视频| 久久久久久久精品吃奶| 成年版毛片免费区| 最近最新免费中文字幕在线| 黄色成人免费大全| 欧美黑人巨大hd| 亚洲欧美精品综合一区二区三区| 日本 欧美在线| 成人永久免费在线观看视频| 精品免费久久久久久久清纯| 校园春色视频在线观看| 日本五十路高清| 国产成人影院久久av| 亚洲av熟女| 久久精品亚洲精品国产色婷小说| 国产精品爽爽va在线观看网站 | 久久香蕉精品热| 美女高潮到喷水免费观看| 国产成人欧美在线观看| 老司机深夜福利视频在线观看| 欧美乱妇无乱码| 国产高清有码在线观看视频 | 成人手机av| av超薄肉色丝袜交足视频| 99久久99久久久精品蜜桃| 国产一区在线观看成人免费| 中文字幕精品亚洲无线码一区 | 在线十欧美十亚洲十日本专区| 日韩欧美一区二区三区在线观看| 国产成人av教育| 动漫黄色视频在线观看| 波多野结衣巨乳人妻| 日韩高清综合在线| 50天的宝宝边吃奶边哭怎么回事| 亚洲av美国av| 久久久久精品国产欧美久久久| 999久久久精品免费观看国产| av欧美777| 草草在线视频免费看| 午夜福利在线观看吧| 精品久久久久久成人av| 日韩欧美国产在线观看| 亚洲精品一区av在线观看| 又紧又爽又黄一区二区| 久热这里只有精品99| 免费看十八禁软件| 国产伦一二天堂av在线观看| 久久性视频一级片| 99久久精品国产亚洲精品| tocl精华| 少妇的丰满在线观看| 在线观看日韩欧美| 高潮久久久久久久久久久不卡| 久热爱精品视频在线9| 美女免费视频网站| 女性生殖器流出的白浆| 亚洲欧美一区二区三区黑人| 亚洲国产欧美一区二区综合| 很黄的视频免费| 午夜免费鲁丝| 亚洲国产日韩欧美精品在线观看 | 国产亚洲av嫩草精品影院| 男人的好看免费观看在线视频 | 精品电影一区二区在线| 一夜夜www| 国产1区2区3区精品| 亚洲熟妇中文字幕五十中出| 男女视频在线观看网站免费 | 50天的宝宝边吃奶边哭怎么回事| 精品国产美女av久久久久小说| 精品熟女少妇八av免费久了|