• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

    2022-07-02 07:43:24YananChenTingYaoHaipingRenandZehaoGan
    關(guān)鍵詞:鄭麥周麥品種

    Yanan Chen,Ting Yao,Haiping Ren and Zehao Gan

    1School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu,610054,China

    2Basic Course Teaching Department,Jiangxi University of Science and Technology,Nanchang,330013,China

    3Institute of Electronic and Information Engineering,University of Electronic Science and Technology of China,Dongguan,523808,China

    4Network and Data Security Key Laboratory of Sichuan Province,Unversity of Electronic Science and Technology of China,Chengdu,610054,China

    ABSTRACT The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature needs to be converted into a re-signature that can be verified by the new organization.Proxy re-signature(PRS)can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data.Unfortunately,the existing PRS schemes cannot realize forward and backward security.Therefore,this paper proposes the first PRS scheme that can provide key-insulated property,which can guarantee both the forward and backward security of the key.Although the leakage of the private key occurs at a certain moment,the forward and backward key will not

    KEYWORDS Proxy re-signature;key insulation;electronic medical record (EHR);random oracle model

    1 Introduction

    With the improvement of living standards,the healthcare field has attracted more awareness and is playing an increasingly crucial role [1,2].At the same time,with the aging of the population,the demand for online healthcare treatment is rising.Therefore,the data that the hospital needs to manage is enormous,resulting in a mass of health data that needs to be stored and maintained.The introduction of electronic medical records (EHRs) can solve this problem well,that is,storing and using patient medical records including personal information through the integration of the Internet of Things (IoT),deep learning,blockchain,and other technologies[3–6].Compared with the conventional method of using paper to preserve health records,it is more advantageous and convenient to analyze the condition and manage the data in EHR sharing system.Nevertheless,putting health records on the Internet in electronic form will inevitably cause security problems.For the confidentiality of information in the IoT environment,there are already various effective methods to encrypt and protect them [7–11],but it is not enough to have only encryption means,and the authenticity of the message needs to be determined.Any unauthorized changes in data will affect the diagnosis and timely treatment of the disease,thus the integrity of the data must be guaranteed.Generally,digital signatures are used to ensure whether the data has been tampered with or not [12–15].However,when a patient needs to be referred for treatment,for example,a physician in the hospital needs to give the patient’s EHR to the researcher in the institution for further study.In this case,the signature generated by the hospital demands to be converted into the signature under the institution.Traditionally,the institution is required to verify the legality of the signature first and then recompute its own signature.To make matters worse,there are plenty of data to be processed in the EHR sharing system,which is difficult for the institution with limited resources or inconvenient situations.Therefore,the task of converting signatures can be entrusted to the semi-trusted proxy—an insurance company.The technology of proxy re-signature (PRS) can implement the transform requirement,while the proxy can not completely replace the hospital or institution and create any other signatures belonging to them without receiving the authorization and delegation.Through the interaction with the delegator,the signature belonging to the delegatee can be converted into the delegator by proxy.What’s more,the conversion process can be completed without the private key of the delegatee,that is,the delegatee does not need actual interactive participation.Accordingly,the concept of PRS can be applied to transfer electronic medical records for management scenarios in EHRs.

    However,in a complex environment,the problem of key exposure arises.Once the user is compromised,the attacker can completely pretend to be the user and do whatever he wants,which is definitely fatal.In 2009,Yang et al.[16] combined the two primitives of PRS and forwardsecure threshold signature to construct the first forward-secure threshold proxy re-signature scheme.The re-signature key will be updated in different time periods,thus if the re-signature key is leaked in a certain period,it will not alter the previous re-signature key.However,the user’s private key does not change,so Sunitha et al.[17] constructed a multi-use PRS scheme with forward security in the e-banking application.Their private key and re-signing key will be updated after a period of time,but their time slice is limited and needs to be set in advance.Although forward-secure schemes have been proposed by some researchers,forward security can only guarantee the security of the key before the leakage,but not after the leakage.Therefore,a key-insulated method in PRS is proposed,which can guarantee both forward and backward security.In addition,while updating the user key,it can also refresh the re-signature key of the proxy,which ensures the security of both user’s signature and re-signature.In general,in order to construct a promising PRS scheme to ensure the unforgeability and non-repudiation in the environment of the EHR,the following properties are generally desired.

    1) Unidirectional: When converting the signature,the proxy can only convert in the specified direction.Without authorization,the proxy cannot obtain the reverse conversion key through calculation.

    2) Single-use: The Resign algorithm can determine whether the input signature is original or converted.For schemes with single-use property,re-signature cannot be used as the input of this algorithm.

    3) Transparent: Nobody could judge the existence of the proxy,and the form of the resignature generated by the proxy is indistinguishable from the signature generated by the user.

    4) Non-interactive: In the whole delegating process,there is no need for the delegatee to actually participate,so as to realize the non-interactivity between the delegatee and the delegator.

    5) ID-based: The user directly views the public parameter of identity information (ID) as his public key,so there is no need for certificate authority (CA) to specifically produce a certificate to bind the public key with the user.

    6) Forward-Secure: The keys generated before the leakage occurred are not correlated with the leaked key,and their security will not be affected.

    7) Backward-Secure: Conversely,if after key exposure,the key generated later is still secure,it is called backward security.

    1.1 Related Work

    The primitive proxy re-signature was first proposed by Blaze et al.[18],but it did not give a specific formal definition so that it did not attract people’s attention for a period of time.Until 2005,Ateniese et al.gave a formal definition and security model for PRS [19].The delegator can authorize the proxy to generate a re-signature key,and then the proxy can utilize this key to convert the designated signature from the delegatee to delegator.Shao et al.[20] eliminated the random model,constructed a PRS scheme under the standard model.Moreover,the PRS scheme in the identity-based cryptosystem was proposed for the first time.Then,Libert et al.[21]solved the open problem left by [19] and proposed the first multi-use unidirectional PRS scheme.The signature can be re-signed by multiple users in sequence,and the direction of conversion is nonreversing.Due to the semi-trusted nature of the proxy,Yang et al.[22] formally proposed the threshold proxy re-signature scheme.Multiple proxies are utilized to jointly perform the resignature process,only when the number of proxies reaches the threshold.In 2011,Shao et al.[23]first combined the unidirectional PRS scheme with the identity-based cryptosystem.In the random oracle,the unforgeability of the signature can be proved based on the extended Computational Diffie-Hellman assumption.In order to save the Computational cost of the verification algorithm,Wang et al.[24] proposed a PRS scheme with server-assisted verification.In this scheme,the proxy can be used to verify the validity of the signature besides resigning,so that the user does not need to undertake the heavy burden of calculation.Then,Patonico et al.[25] put forward an efficient proxy re-signcryption scheme using the arithmetic operation in the elliptic curve,so as to realize the safe ownership transfer in the cloud.Under the attention of quantum computers,in order to resist this kind of attack,some researchers [26,27] turned their direction to construct PRS schemes from the perspective of lattices.Recently,more and more scenarios need to take advantage of the demand for re-signing.The PRS scheme is used in authentication [28–32],auditing [33–37],secure automated valet parking [38] and data sharing [39].

    1.2 Contribution

    In this paper,we propose the first unidirectional identity-based proxy re-signature scheme with key insulation (KI-IDPRS),which can satisfy all the properties mentioned above.First,an IDbased scheme reduces the overhead of managing public key certificates by taking the user ID as the public key.In addition,considering identity information is fixed for the user,KI-IDPRS can update the private key without changing the public key to achieve the key-insulated property.The proxy can be authorized by the delegator to convert the signature from delegatee into delegator,but not vice versa.What’s more,the secure status of the key at current moment will not affect the keys at other moments,thus realizing key insulation.Although the proxy is semi-trusted,even if both the user and the proxy are compromised at one certain moment,the security is not broken at other times.Security of this scheme can be reduced to extended Computational Diffie-Hellman(eCDH) assumption in the random oracle model.Finally,it can be concluded that our scheme is feasible and has nice properties from the theoretical analysis including experimental results.

    1.3 Organization

    The following parts of the paper will discuss our proposed scheme as follows: the second part introduces related basic knowledge including system model,the formal definition and security model of the proposed scheme.The third part constructs the first unidirectional identity-based PRS scheme with key insulation and proves the unforgeable security of the proposed scheme.The fourth part puts together other relevant schemes with our scheme from the three dimensions of properties,computing cost and communication overhead,then compares them through experiments.

    2 Preliminaries

    2.1 Bilinear Map

    Given two cyclic groups G,GTof prime orderpandgbe generator of G.A map that meets the following requirements can form a bilinear pairinge:G×G→GT.

    1) Bilinearity: ?x,y∈Z*p,e(gx,gy)=e(g,g)xy.

    2) Non-degeneracy:e(g,g)/=1.

    3) Computability:e(gx,gy)can be computed.

    2.2 eCDH Assumption

    In the case of known a tuple<g,ga,gb>∈G,compute the value of a pair(A,Aab),fora,b∈Z*p,A∈G.

    2.3 System Model

    The proposed scheme requires six entities to complete together: Private key generator (PKG),helper A,helper B,user A in hospital (delegatee),user B in the institution (delegator),and an insurance company (proxy).The system model is depicted in Fig.1,and the description of the notations involved in the model is introduced in Table 1.

    Table 1:The list of symbolic representations

    Figure 1:System model

    PKG: PKG is a trusted authority used to generate secret keys.When a user is supposed to extract its secret key,the identity information will be given to the PKG.The corresponding initial key and helper key will be generated by PKG,and they will be returned to the user and helper,respectively.

    Helper A/B: The helper is an auxiliary device with absolute physical security but limited computing power,which is used to store the helper key.It only needs to interact with the user at the beginning of each time period,generate the update key and send it to the user to help the user update the temporary private key,but does not participate in any other cryptographic operations.

    User A in hospital: The hospital can act as the delegatee to receive the delegation from the institution,and he sends the signature that needs to be re-signed to the insurance company.

    User B in institution: The institution is viewed as the delegator to re-sign user A’s signature into his own signature through the insurance company,rather than directly signing the message.

    Insurance company: The insurance company is used to implement the re-signature process through the re-signature key.After receiving the signature of user A and the re-signing key entrusted by user B,he converts the specified signature from A to B.

    2.4 Syntax of the KI-IDPRS

    A KI-IDPRS scheme consists of eight different algorithms,which are as follows:

    1)Setup:This is a system establishment algorithm executed by key generation center (KGC).Security parameter 1kis given to KGC and the master public keympkis returned back for public use,the master secret keymskis returned for PKG.

    2)Extract:This is an initial private key extraction algorithm executed by PKG.The master secret keymskand a user’s identityIDare the input of PKG.Then,PKG outputs the initial private keySKID,0stored by the user and the helper keyHKIDstored by the helper for the identityID.

    3)HUpdate:This is an update key generation algorithm executed by the helper.The helper keyHKIDfor the identityIDand the time periodj,iare as the input of the helper.Then,the helper outputs the update keyHKUID,j→iused to update time period j to i.

    4)UUpdate:This is a temporary private key update algorithm executed by the user.The private keySKID,jin the old time periodjfor the identityIDand the update keyHKUID,j→iare as the input of the user.Then,the user outputs the private keySKID,iin the new time periodifor the identityID.

    5)RKGen:This is a re-signature key generation algorithm executed by the delegator.The delegatee’s identityIDAand the delegator’s private keySKIDB,iin the time periodiare as the input of the delegator.Then,the delegator outputs the re-signature keyRKA→B,ito the proxy,which is used to implement signature conversion from identityIDAtoIDBunder the same messagemin the time periodi.

    6)Sign:This is a signature generation algorithm executed by the user/delegatee.The private keySKIDA,iin the time periodifor the identityIDA,messagemand the signature’s levelLare as the input of the delegatee.Then,the delegatee outputs signature,i)at levelLin the time periodi,whereL=1,2.

    7)ReSign:This is a re-signature conversion algorithm executed by the proxy.The original signature,i)at level 1,messagem,the delegatee’s identityIDAand the re-signature keyRKA→B,iare as the input of the proxy.Then,the proxy outputs the signature,i)at level 2 for identityIDBin the time periodi,if,i)can pass theVerifyalgorithm.

    8)Verify:This is a verification algorithm.The alleged signature,i)at levelL,messagemand the identityIDare as the input.Then,1 can be returned if the signature is valid.

    2.5 Security Model of the KI-IDPRS

    To assess the security of the key-insulated proxy re-signature in a formal manner,the following interactive game between the challengerCand the adversaryAis defined by incorporating the security model for the key insulated signature [40] and the one for the proxy re-signature [23].

    Setup: Cperforms the algorithm Setup to generate the master public keympkand the master secret keymsk,and then returnsmpktoAwhile keepsmsksecret.

    Query:Before the adversaryAattempts to forge a signature,the challengerCpermits him to adaptively make a number of different queries.

    O(Extract):Cperforms the algorithm Extract to produce the userID′sinitial secret keySKID,0forA’s request(ID).

    O(UUpdate):Cperforms the algorithm UUpdate to produce the userID′stemporary secret keySKID,iin time periodiforA’s request(ID,i).

    O(RKGen):Cperforms the algorithm RKGen to produce the re-signature keyRKA→B,iin time periodiforA’s request(IDA,IDB,i).

    O(Sign):Cperforms the algorithm Sign to produce the signature(σ,L,i)in time periodiforA’s request(ID,L,i,m).

    O(ReSign):Cperforms the algorithm ReSign to produce the re-signature(σ′,L+1,i)in time periodiforA’s request(σ,L,i,m,IDA,IDB).

    Forgery Output:Suppose(ID*,m*,σ*,L*,i*)isA’s counterfeit result after queries.If the adversary meets the following restrictions at the same time,and can still generate a valid signature that makes the equation Verify(σ,i,m,ID)=1 hold,then the adversary is considered to be the winner in this game.

    1)Acan’t queryID*inO(Extract)

    2)Acan’t query(ID*,i*)inO(UUpdate)

    3)Acan’t queryID*inO(RKGen)

    4)Acan’t query(ID*,m*,i*,L*)inO(Sign)

    5)Acan’t query(σ*IDj,i*,m*,IDj,ID*)inO(ReSign)

    3 Our Proposed KI-IDPRS Scheme

    3.1 Construction

    By combining identity-based key-insulated signature [41] in the unidirectional IDPRS [23],the concrete construction of the unidirectional identity-based PRS scheme with insulated key has been given as follows:

    · Setup(1k)→(mpk,msk): After giving the security parameter 1k,the following operations are performed by KGC to generate the public keympkand the master secret keymsk.

    1) Choose two finite cyclic groups G,GTwith prime orderand choose a generatorgof G.

    2) Pick bilinear pairinge:G×G→GT;

    3) Generate the master key:Z*pand computeX=gx;

    4) Define three hash functions:H1(·),H2(·):{0,1}*→Z*p,H3(·):{0,1}*→G;

    5) Generate the public key(mpk=(g,p,G,GT,e,X,H1,H2),msk=x).

    · Extract(ID,msk)→(HKID,SKID,0): After inputting the master secret keymskand a user’s identityID,PKG firstiy randomly chooses one elementHKID R←-Z*pas the helper key.Then,it computes the initial secret keymodp,and setsIn fact,for a user,hiscan be obtained by other users,onlyis kept private.Because it is obvious to find that the user’s signature hasas one of the components,andis not updated in our proposed scheme.

    · HUpdate(HKID,ID,i,j)→HKUID,j→i: On receiving the helper keyHKIDforIDand the time periodj,i,the helper outputs the update keyHKUID,j→iby computingHKUID,j→i=HKID·(H2(ID‖i)-H2(ID‖j)).

    · UUpdate(SKID,j,HKUID,j→i,ID,i,j)→SKID,i: After receiving the private keySKID,jin the old time periodjand the update keyHKUID,j→i,the user updates the private keySKID,ias follows:

    · RKGen(IDA,SKIDB,i)→RKA→B,i: After the delegator receives the identityIDAof the delegatee,the delegator calculatesRKA→B,ithrough its private keySKIDB,ias follows and then gives it to the proxy.

    · Sign(ID,m,SKID,i)→After receiving the message,the delegatee signs the messagemwithIDAand the private keySKIDA,i.First-level signatureand secondlevel signatureare computed as follows,and then the first-level signatureis given to the proxy to generate the re-signature of the delegator.

    · ReSign,RKA→B,i)→: After receiving the delegatee’s first-level signatureand the re-signature keyRKA→B,i,the proxy first ensures the legality of the signatureby examining whether the equationcan be satisfied.If not,an error is output.Otherwise,the proxy calculates the second-level signatureof the delegator as follows:

    · Verify(σ,i,m,ID)→1/⊥: After entering the signatureσ[1]/σ[2],messagem,and identityID,the algorithm checks the validity of the first-level signature through equation=e(σ(1),g),and the validity of the second-level signature through equation

    3.2 Security Analysis

    In the random oracle model,our proposal is existentially unforgeable under the eCDH assumption in G.

    共7個(gè)參試品種,分別是輪選166、泉麥29、鄭麥1860、周麥18、農(nóng)大2011、珍麥3號(hào)、泰禾麥2號(hào),對(duì)照為周麥18。

    Proof: Assume that there is an adversaryAcan break the existential unforgeability of our proposal with non-negligible probabilityε,then we can build another algorithmBto solve the eCDH problem.The input of eCDH problem is(g,ga,gb),and the goal of security proof is to get(A,Aab),where A could be any element in G.

    Setup: The challengerCinitializes the system according to the following steps:

    1) SetX=ga;

    2) Sendmpk=(g,p,G,GT,e,X,H1,H2,H3)toA,where the values ofH1,H2andH3can be obtained through the followingO(H1),O(H2)andO(H3)queries,respectively.

    Query:

    ·O(H1)→(R||ID,h1)∈

    1)Ainputs(R||ID)to query the value ofH1(R||ID);

    2) If there is the item(R||ID)in the,Creturns the correspondingh1toA;

    3) If not,Crandomly chooses one elementh1from Z*pas output and adds it to the.

    ·O(H2)→(ID||i,h2)∈

    1)Ainputs(ID||i)to query the value ofH2(ID||i);

    2) If there is the item(ID||i)in theHlist2,Creturns the correspondingh2toA;

    3) If not,Crandomly chooses one elementh2from Z*pas output and adds it to the.

    ·O(H3)→(m,α,(gb)α)∈

    1)Ainputsmto query the value ofH3(m);

    2) Ifmcan be found in,Creturns the correspondingh3=(gb)αtoA;

    3) If not,Arandomly chooses one elementαfrom Z*pand computes(gb)αas output,then adds it to the.

    ·O(Extract)→(ID,SKID,0)

    1)AinputsIDto query the corresponding initial secret keySKID,0;

    2)Crandomly choosesand computes

    4) If not,Caddsto theand returnsas the initial secret key toA.

    ·O(UUpdate)→(ID,i,SKID,i)

    1)AinputsIDand the time periodito query the temporary secret keySKID,0in the time periodi;

    2)Crandomly choosesand computes

    4) If not,Caddsto theand returnsas the temporary secret key for time perioditoA.

    ·O(RKGen),O(Sign),O(ReSign)

    1)Aobtains the corresponding private key viaO(Extract)andO(UUpdate);

    2)Ccomputes the required query value via the corresponding private key and returns it toA;

    Forgery Output:

    According to the forking lemma [42],for level 1,Acan counterfeit two valid signaturesh1andh′1are two different random responses fromO(H1)on inputthenBcan compute:

    Similarly,for level 2,Acan counterfeit two valid signaturesThen,Bcan compute:

    4 Comparison

    Comparison between our KI-IDPRS scheme and state-of-the-art [21,30,43] will be comprehensively discussed from the perspective of properties,computation cost,and communication overhead.The schemes involved in the comparison are the first PRS scheme featured with the multi-use and unidirectional translation [21],the PRS scheme with key-leakage resistance [43]and the up-to-dated PRS scheme [30].Then,the simulated implementation of these schemes is conducted through the experimental platform.

    4.1 Simulated Implementation

    To make the following theoretical analysis more convincing,these schemes are simulated on a specific experimental platform.The computer’s operating system is 64-bits Windows 10,the processor is Intel Core i7-7700 @ 3.60 GHz,and the memory is 8GB.Based on VC++6.0,cryptography operations are implemented with the Pairing-Based Cryptography (PBC) library [44],where parameter is the standard parametera.paramand |G|=128 bytes,=20 bytes.In addition,the unit time of critical operations is separately measured and listed in Table 2.

    Table 2:The time costs of cryptographic operations

    4.2 Properties

    We list the properties of the proposed scheme and the relevant work [21,30,43] in Table 3,wheremeans that the property is supported,“×” means that the feature is not supported.According to the comparison results,it is obvious that all the desired properties can be satisfied in our protocol.Although the scheme [21] owns several desired properties of PRS,this scheme is built in the public key infrastructure and is difficult to be deployed in practical in view of the burden brought by the public-key certificates.In scheme [43],the identity-based cryptographic system is applied to simplify certificate management.Besides,the schemes [30,43] have forward security to prevent the key leakage from affecting the previous key.However,they ignore the security of the private key after key exposure.Only our scheme could provide the key insulated property and thus achieve forward and backward security simultaneously.Although schemes [43]and [30] realize forward security,they divide the time into a presetting limited time period for updating private keys.In contrast to the works in [30,43],the proposed scheme provides unlimited periods.

    Table 3:The properties comparison in different schemes

    4.3 Communication Overhead

    The communication overhead of these schemes is discussed in Table 4,Figs.2 and 3,where|G|andrepresent the length of an element in group G and group Z*p,respectively.In the experiment,we take |G|=128 bytes and=20 bytes.Scheme [21],[30] and our signature length are both 2|G|,and scheme [43] is the longest.In addition,the length of the re-signature is the same.In terms of the re-signature key,our size is one more |G|than scheme [21] and one |G|less than schemes [43] and [30].In general,the length of signature and re-signature in KI-IDPRS is less than or equal to other schemes.Therefore,the proposed scheme does not occupy more communication overhead compared with other schemes.

    Table 4:The comparison of computation costs

    Figure 2:Comparison of signature/re-signature size

    4.4 Computation Cost

    From the data in Table 2,it is clear that the hash function,scalar multiplication,and modular multiplication take relatively little time.Therefore,exponential and pairing operations are mainly considered in the theoretical analysis of these schemes.TEis used to represent the time required to perform an exponential operation in group G,andTPrepresents the runtime of a bilinear pairing.In the signature phase,results in Table 5,Figs.4–6 can illustrate that our scheme is less than or equal to other schemes in terms of computational overhead.In the process of re-signing,the scheme [21] requires six exponential operations,which is more than our scheme.However,the schemes [43] and [30] only require two and three exponential operations,respectively.Our KI-PRS scheme requires five,which is acceptable,because our scheme can support both forward and backward security.When checking the validity of the first-level signature,it only takes more time than the scheme [30],whereTP≈2TE.When performing the verification of second-level signature,our scheme requires four exponential operations and two pairing operations (that is,approximately equal to fiveTP),which is no more than other schemes.In short,compared with other schemes,KI-IDPRS may not cost more time than some schemes,but this is acceptable for the acquisition of functional and safety enhancements.

    Table 5:The comparison of computation costs

    Figure 3:Comparison of re-signature key/private key size

    Figure 4:Comparison of sign phase time

    Figure 5:Comparison of verify phase time

    Figure 6:Comparison of ReSign phase time

    5 Conclusion

    This paper proposes the first KI-IDPRS scheme,which is conducive to timely dealing with the occurrence of key leakage in the EHR sharing system.Then,the formal definition and the security model of KI-IDPRS are given.On this basis,a concrete KI-IDPRS scheme is constructed and proved to have unforgeable security under the eCDH assumption in the random oracle model.What’s more,the presented KI-IDPRS scheme can support both forward and backward security,updating private key within unlimited periods.Accordingly,key leakage will not cause a catastrophic threat to the EHR sharing system.Finally,from theoretical analysis and experiment evaluation,related schemes are compared from three dimensions in properties,communication and computation costs.The presented KI-IDPRS is the only scheme with all the promising properties.

    Funding Statement: This work is partially supported by the Network and Data Security Key Laboratory of Sichuan Province under the Grant No.NDS2021-2,in part by Science and Technology Project of Educational Commission of Jiangxi Province under the Grant No.GJJ190464,and in part by National Natural Science Foundation of China under the Grant No.71661012.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    猜你喜歡
    鄭麥周麥品種
    小麥新品種周麥32號(hào)的遺傳構(gòu)成解析
    優(yōu)質(zhì)高產(chǎn)小麥新品種—鄭麥816
    小麥品種周麥16的遺傳構(gòu)成分析
    種子(2020年9期)2020-10-22 13:22:48
    河南省強(qiáng)筋中強(qiáng)筋及弱筋小麥品種清單
    糧食加工(2020年4期)2020-02-28 04:57:16
    汝州市2018年度12個(gè)優(yōu)質(zhì)小麥品種比較試驗(yàn)報(bào)告
    5個(gè)周麥品種的產(chǎn)量構(gòu)成及其籽粒灌漿特性研究
    品種選育彩版
    河南省發(fā)布強(qiáng)筋中強(qiáng)筋及弱筋小麥品種清單
    種什么品種好?
    種什么品種好?
    一级黄色大片毛片| 非洲黑人性xxxx精品又粗又长| 26uuu在线亚洲综合色| 日本一本二区三区精品| 卡戴珊不雅视频在线播放| 97人妻精品一区二区三区麻豆| 日韩在线高清观看一区二区三区| 国产黄色视频一区二区在线观看 | 久久久色成人| 亚洲国产欧美在线一区| 日本-黄色视频高清免费观看| 伦理电影大哥的女人| 国产精品一区二区三区四区免费观看| 国内精品一区二区在线观看| 国产精品1区2区在线观看.| 国产精品一区二区性色av| 国产精品综合久久久久久久免费| 波多野结衣高清无吗| 成人国产麻豆网| 99在线人妻在线中文字幕| 国产精品女同一区二区软件| 五月玫瑰六月丁香| a级毛片免费高清观看在线播放| 岛国在线免费视频观看| 欧美成人一区二区免费高清观看| 午夜福利视频1000在线观看| 亚洲国产色片| 建设人人有责人人尽责人人享有的 | 国产一级毛片七仙女欲春2| 91久久精品电影网| 亚洲av中文av极速乱| 亚洲欧美精品专区久久| 亚洲精品成人久久久久久| 高清日韩中文字幕在线| 最近最新中文字幕免费大全7| 97超视频在线观看视频| 丰满乱子伦码专区| 欧美性猛交╳xxx乱大交人| 免费观看人在逋| 亚洲va在线va天堂va国产| 老司机影院成人| 亚洲成人久久爱视频| 一级av片app| 十八禁国产超污无遮挡网站| 国产精品电影一区二区三区| 国产又色又爽无遮挡免| 国产精品1区2区在线观看.| 欧美三级亚洲精品| 亚洲精品乱码久久久久久按摩| 久久久亚洲精品成人影院| 日韩欧美 国产精品| 亚洲精品aⅴ在线观看| 国内少妇人妻偷人精品xxx网站| 成人毛片60女人毛片免费| 男女啪啪激烈高潮av片| 亚洲av中文av极速乱| 亚洲精品亚洲一区二区| av播播在线观看一区| 免费播放大片免费观看视频在线观看 | 汤姆久久久久久久影院中文字幕 | 亚洲人成网站在线播| 亚洲国产精品久久男人天堂| 高清在线视频一区二区三区 | av黄色大香蕉| 国产精品久久视频播放| 午夜福利在线观看吧| 免费观看的影片在线观看| 免费观看的影片在线观看| 久99久视频精品免费| 久久人人爽人人片av| 中文字幕精品亚洲无线码一区| 国产69精品久久久久777片| 九九爱精品视频在线观看| 可以在线观看毛片的网站| 亚洲在久久综合| 99久久九九国产精品国产免费| 精品熟女少妇av免费看| 国产精品综合久久久久久久免费| 国产精品无大码| 久久久久久伊人网av| 亚洲av免费在线观看| 久久久久久国产a免费观看| 听说在线观看完整版免费高清| 免费观看人在逋| 一个人免费在线观看电影| 18禁在线无遮挡免费观看视频| 99久国产av精品国产电影| 国产乱来视频区| 婷婷色av中文字幕| 久久久久久久久久久丰满| av专区在线播放| 日日摸夜夜添夜夜添av毛片| 18禁裸乳无遮挡免费网站照片| 午夜精品在线福利| 一边摸一边抽搐一进一小说| 亚洲综合精品二区| 国产麻豆成人av免费视频| 女人被狂操c到高潮| 99久久成人亚洲精品观看| 免费观看精品视频网站| av在线亚洲专区| 伊人久久精品亚洲午夜| 国产精品久久久久久久电影| 国产精品一区二区性色av| 国产精品国产三级专区第一集| 国产精品久久久久久精品电影| 亚洲自偷自拍三级| 校园人妻丝袜中文字幕| 我的老师免费观看完整版| 国产精品国产高清国产av| 黄色欧美视频在线观看| 国产一区有黄有色的免费视频 | 久久精品久久久久久噜噜老黄 | 国产又黄又爽又无遮挡在线| 老师上课跳d突然被开到最大视频| 国产色婷婷99| av在线亚洲专区| 亚洲经典国产精华液单| 国产午夜福利久久久久久| 国产亚洲5aaaaa淫片| 亚洲av成人精品一二三区| 亚洲av免费在线观看| 亚洲国产精品sss在线观看| 波野结衣二区三区在线| 看片在线看免费视频| 建设人人有责人人尽责人人享有的 | 亚洲aⅴ乱码一区二区在线播放| 亚洲自偷自拍三级| 亚洲自拍偷在线| 国内精品美女久久久久久| 熟妇人妻久久中文字幕3abv| 最近最新中文字幕大全电影3| 欧美丝袜亚洲另类| 色综合站精品国产| 亚洲18禁久久av| 婷婷六月久久综合丁香| 免费av毛片视频| 99九九线精品视频在线观看视频| 午夜老司机福利剧场| 久热久热在线精品观看| 国产激情偷乱视频一区二区| 国产伦在线观看视频一区| 欧美日韩综合久久久久久| 午夜福利在线观看免费完整高清在| 亚洲精品久久久久久婷婷小说 | 国产老妇伦熟女老妇高清| 男人狂女人下面高潮的视频| 波多野结衣巨乳人妻| 亚洲成人av在线免费| 黄片无遮挡物在线观看| 亚洲国产欧美人成| 一边摸一边抽搐一进一小说| 国产精品伦人一区二区| 免费一级毛片在线播放高清视频| 日日摸夜夜添夜夜添av毛片| 午夜福利高清视频| 亚洲av成人精品一二三区| 狠狠狠狠99中文字幕| 2021少妇久久久久久久久久久| 蜜桃久久精品国产亚洲av| 色5月婷婷丁香| 欧美日韩一区二区视频在线观看视频在线 | 欧美日韩精品成人综合77777| 我要看日韩黄色一级片| 好男人视频免费观看在线| 麻豆av噜噜一区二区三区| 青春草视频在线免费观看| 大香蕉久久网| 国产午夜精品久久久久久一区二区三区| 听说在线观看完整版免费高清| 国产中年淑女户外野战色| 欧美潮喷喷水| 欧美日韩一区二区视频在线观看视频在线 | 亚洲自偷自拍三级| 99久久无色码亚洲精品果冻| 在线免费观看不下载黄p国产| 乱码一卡2卡4卡精品| 两性午夜刺激爽爽歪歪视频在线观看| 永久免费av网站大全| 国产私拍福利视频在线观看| 一区二区三区四区激情视频| 青春草国产在线视频| 国产成人午夜福利电影在线观看| 天堂中文最新版在线下载 | 一级毛片电影观看 | 美女xxoo啪啪120秒动态图| 国产精华一区二区三区| 成人综合一区亚洲| 国产av码专区亚洲av| www日本黄色视频网| 青春草亚洲视频在线观看| 免费在线观看成人毛片| 又黄又爽又刺激的免费视频.| 欧美潮喷喷水| 1000部很黄的大片| 国产一区二区在线av高清观看| 在现免费观看毛片| 别揉我奶头 嗯啊视频| 久久久久久久久久久免费av| 免费播放大片免费观看视频在线观看 | 国产精品女同一区二区软件| 最近的中文字幕免费完整| 日韩欧美国产在线观看| 久久久久久久久久久免费av| ponron亚洲| 寂寞人妻少妇视频99o| 熟女电影av网| 七月丁香在线播放| 国产成人a∨麻豆精品| 九九爱精品视频在线观看| 亚洲国产精品合色在线| 国产极品天堂在线| 一级毛片电影观看 | 99热6这里只有精品| 亚洲av中文字字幕乱码综合| 身体一侧抽搐| 免费不卡的大黄色大毛片视频在线观看 | 26uuu在线亚洲综合色| 国产高清有码在线观看视频| 男人狂女人下面高潮的视频| 亚洲精华国产精华液的使用体验| 亚洲精品亚洲一区二区| 色综合站精品国产| 老司机影院成人| 成人美女网站在线观看视频| 国产精品一区二区在线观看99 | 国产成人a区在线观看| 人体艺术视频欧美日本| 婷婷六月久久综合丁香| 色播亚洲综合网| 蜜桃久久精品国产亚洲av| 欧美不卡视频在线免费观看| 亚洲精品成人久久久久久| 一级二级三级毛片免费看| 免费在线观看成人毛片| 午夜免费男女啪啪视频观看| 日本五十路高清| 亚洲最大成人av| 久久99热6这里只有精品| 国产成人午夜福利电影在线观看| 日韩av不卡免费在线播放| 精品久久国产蜜桃| 国产精品美女特级片免费视频播放器| 青春草视频在线免费观看| av在线蜜桃| 精品久久国产蜜桃| 最近的中文字幕免费完整| 国产欧美日韩精品一区二区| 亚洲第一区二区三区不卡| 亚洲av福利一区| 国产精品久久久久久精品电影小说 | 尤物成人国产欧美一区二区三区| 小说图片视频综合网站| 我的女老师完整版在线观看| 最后的刺客免费高清国语| 黄色欧美视频在线观看| 在线观看av片永久免费下载| 亚洲18禁久久av| 水蜜桃什么品种好| 欧美高清成人免费视频www| 神马国产精品三级电影在线观看| 男女边吃奶边做爰视频| 国产中年淑女户外野战色| 尾随美女入室| 欧美日韩在线观看h| 99九九线精品视频在线观看视频| 国产精品一二三区在线看| 色5月婷婷丁香| 成人三级黄色视频| av视频在线观看入口| 精品久久久久久久久久久久久| 插逼视频在线观看| 亚洲18禁久久av| 国产精品久久久久久精品电影小说 | 国产精品一二三区在线看| 国产成人一区二区在线| 中文欧美无线码| 亚洲欧美日韩卡通动漫| av线在线观看网站| 亚洲国产精品合色在线| eeuss影院久久| 91精品伊人久久大香线蕉| 久久久a久久爽久久v久久| 亚洲av日韩在线播放| 国产黄a三级三级三级人| 三级毛片av免费| 欧美日韩国产亚洲二区| 婷婷色综合大香蕉| 亚洲综合精品二区| 国产探花在线观看一区二区| 亚洲精品亚洲一区二区| 综合色丁香网| 老司机福利观看| 三级经典国产精品| 99热网站在线观看| 国产精品久久视频播放| av在线老鸭窝| 日韩欧美 国产精品| 舔av片在线| 亚洲欧美精品综合久久99| 国产白丝娇喘喷水9色精品| 亚洲欧美成人综合另类久久久 | 国产精品国产高清国产av| 亚洲精品久久久久久婷婷小说 | 国产亚洲一区二区精品| 看免费成人av毛片| 亚洲怡红院男人天堂| 欧美xxxx黑人xx丫x性爽| 在线播放国产精品三级| 亚洲成人av在线免费| 久久精品综合一区二区三区| 晚上一个人看的免费电影| 精品一区二区三区人妻视频| 舔av片在线| 天堂影院成人在线观看| 三级国产精品欧美在线观看| 国产高清国产精品国产三级 | 国产免费又黄又爽又色| 午夜日本视频在线| 狠狠狠狠99中文字幕| 又黄又爽又刺激的免费视频.| 日韩一本色道免费dvd| 日本免费a在线| 亚洲国产精品国产精品| 三级国产精品欧美在线观看| 深爱激情五月婷婷| 国产精品永久免费网站| 麻豆久久精品国产亚洲av| 在线观看美女被高潮喷水网站| 亚洲图色成人| 亚洲中文字幕一区二区三区有码在线看| 国产视频首页在线观看| 亚洲不卡免费看| 国产精品综合久久久久久久免费| 久久综合国产亚洲精品| 国产大屁股一区二区在线视频| 神马国产精品三级电影在线观看| 国产免费视频播放在线视频 | 18+在线观看网站| 亚洲欧洲国产日韩| 岛国在线免费视频观看| 国产在线一区二区三区精 | 91av网一区二区| 亚洲高清免费不卡视频| 欧美潮喷喷水| 神马国产精品三级电影在线观看| 亚洲国产精品成人综合色| av线在线观看网站| 男人舔奶头视频| 性色avwww在线观看| 99久久精品一区二区三区| 美女大奶头视频| 最后的刺客免费高清国语| 中文字幕av在线有码专区| 少妇人妻一区二区三区视频| 天天躁日日操中文字幕| 久久精品熟女亚洲av麻豆精品 | 黄色日韩在线| 久久人人爽人人爽人人片va| 欧美丝袜亚洲另类| 色网站视频免费| 日本猛色少妇xxxxx猛交久久| 如何舔出高潮| 永久网站在线| 国产黄色小视频在线观看| 天堂影院成人在线观看| 亚洲精品日韩在线中文字幕| 亚洲aⅴ乱码一区二区在线播放| 丝袜喷水一区| 午夜日本视频在线| 天天躁日日操中文字幕| 国产精品野战在线观看| 成人国产麻豆网| 精品无人区乱码1区二区| 亚洲经典国产精华液单| АⅤ资源中文在线天堂| 久久草成人影院| 麻豆久久精品国产亚洲av| 青青草视频在线视频观看| 中文在线观看免费www的网站| 亚洲av中文av极速乱| 一二三四中文在线观看免费高清| 精品久久久噜噜| 哪个播放器可以免费观看大片| 99久国产av精品国产电影| 搞女人的毛片| 欧美精品国产亚洲| 欧美丝袜亚洲另类| 国产高清不卡午夜福利| 国产亚洲最大av| 亚洲国产精品久久男人天堂| 午夜日本视频在线| 99国产精品一区二区蜜桃av| 亚洲丝袜综合中文字幕| 热99在线观看视频| 国产精品一区www在线观看| 国产精品1区2区在线观看.| 欧美性猛交黑人性爽| 尤物成人国产欧美一区二区三区| 波多野结衣高清无吗| 久久久久九九精品影院| 国产又色又爽无遮挡免| 免费av毛片视频| 成人二区视频| 国产精品综合久久久久久久免费| 99久久无色码亚洲精品果冻| 免费一级毛片在线播放高清视频| 亚洲国产精品专区欧美| 国产美女午夜福利| 亚洲中文字幕日韩| 免费大片18禁| 精品国内亚洲2022精品成人| 久久这里只有精品中国| 久久精品久久久久久久性| 身体一侧抽搐| av卡一久久| 搞女人的毛片| 国产一区二区亚洲精品在线观看| 午夜久久久久精精品| 国产三级中文精品| 国产精品熟女久久久久浪| 看免费成人av毛片| 亚洲精品456在线播放app| 国产伦在线观看视频一区| 亚洲av福利一区| 高清毛片免费看| 国产一区二区三区av在线| 99在线视频只有这里精品首页| 国产精品.久久久| 亚洲av电影在线观看一区二区三区 | 亚洲精品亚洲一区二区| 免费观看的影片在线观看| 国产精品乱码一区二三区的特点| 国产亚洲午夜精品一区二区久久 | 高清毛片免费看| 你懂的网址亚洲精品在线观看 | 成人欧美大片| 看非洲黑人一级黄片| 国产中年淑女户外野战色| 大话2 男鬼变身卡| 午夜福利在线观看吧| 日本熟妇午夜| 成人漫画全彩无遮挡| 久久这里有精品视频免费| 色吧在线观看| 国产精品伦人一区二区| 国产亚洲5aaaaa淫片| 最近2019中文字幕mv第一页| 亚洲中文字幕一区二区三区有码在线看| 日韩av在线大香蕉| 91狼人影院| 国产亚洲最大av| a级一级毛片免费在线观看| 日日撸夜夜添| 欧美另类亚洲清纯唯美| 亚洲精品,欧美精品| 中文乱码字字幕精品一区二区三区 | 久久久久久久亚洲中文字幕| 26uuu在线亚洲综合色| 啦啦啦啦在线视频资源| 神马国产精品三级电影在线观看| 在线免费十八禁| 国内精品美女久久久久久| 大香蕉97超碰在线| 成年女人看的毛片在线观看| 男女视频在线观看网站免费| 国产伦一二天堂av在线观看| 成人特级av手机在线观看| 青春草视频在线免费观看| 久久久久久久久久黄片| 99热这里只有精品一区| 91aial.com中文字幕在线观看| 秋霞在线观看毛片| 国产精品综合久久久久久久免费| 亚洲精品国产av成人精品| h日本视频在线播放| 亚洲欧美日韩卡通动漫| av在线亚洲专区| 综合色av麻豆| 天堂av国产一区二区熟女人妻| 亚洲精品色激情综合| 高清在线视频一区二区三区 | 国产精品久久久久久av不卡| 国产成人一区二区在线| 亚洲精品国产成人久久av| 中文字幕久久专区| 久久久久久久久久黄片| 日本三级黄在线观看| 热99在线观看视频| 晚上一个人看的免费电影| 深夜a级毛片| 蜜桃亚洲精品一区二区三区| 黄片无遮挡物在线观看| 久久人人爽人人片av| 国产三级中文精品| 国产麻豆成人av免费视频| 男女啪啪激烈高潮av片| 乱系列少妇在线播放| 午夜福利网站1000一区二区三区| 国产亚洲av嫩草精品影院| 亚洲国产高清在线一区二区三| 一区二区三区乱码不卡18| .国产精品久久| 午夜福利在线观看吧| 三级男女做爰猛烈吃奶摸视频| 99久久无色码亚洲精品果冻| 精品酒店卫生间| 亚洲国产精品成人综合色| 岛国毛片在线播放| 亚洲自偷自拍三级| 国产精品麻豆人妻色哟哟久久 | 高清av免费在线| 在线播放国产精品三级| 国产爱豆传媒在线观看| 男女视频在线观看网站免费| 成人高潮视频无遮挡免费网站| 激情 狠狠 欧美| 日韩欧美在线乱码| 一级毛片电影观看 | 国产在线男女| 亚洲精品国产成人久久av| 免费黄网站久久成人精品| 久久久久久九九精品二区国产| 中文乱码字字幕精品一区二区三区 | 欧美一级a爱片免费观看看| 久久久久久久久大av| 国产又黄又爽又无遮挡在线| 日韩大片免费观看网站 | 成年版毛片免费区| 日本av手机在线免费观看| 高清视频免费观看一区二区 | 日日摸夜夜添夜夜爱| 99久久九九国产精品国产免费| 男女视频在线观看网站免费| 三级经典国产精品| 91精品伊人久久大香线蕉| 黄色日韩在线| 亚洲精品国产av成人精品| 精品熟女少妇av免费看| 亚洲最大成人手机在线| 夜夜看夜夜爽夜夜摸| 国产亚洲精品久久久com| 国产女主播在线喷水免费视频网站 | 国产亚洲最大av| 亚洲欧美成人精品一区二区| 听说在线观看完整版免费高清| av在线亚洲专区| 国产精品精品国产色婷婷| 内射极品少妇av片p| 亚洲av熟女| 国产精品一区二区在线观看99 | 嫩草影院精品99| 欧美+日韩+精品| 国产高清有码在线观看视频| 成年版毛片免费区| 能在线免费看毛片的网站| 日本黄色视频三级网站网址| 99久久精品国产国产毛片| 91久久精品电影网| 免费黄色在线免费观看| 亚洲成人精品中文字幕电影| 99久国产av精品| 精品一区二区免费观看| 国产综合懂色| 国产成人91sexporn| 观看免费一级毛片| 国产精品一区二区三区四区久久| 国产伦精品一区二区三区四那| 激情 狠狠 欧美| 美女被艹到高潮喷水动态| 亚洲国产精品成人久久小说| 熟女电影av网| 亚洲av免费高清在线观看| 国内少妇人妻偷人精品xxx网站| 熟女人妻精品中文字幕| 波多野结衣高清无吗| 国产单亲对白刺激| 亚洲av成人精品一二三区| 久久精品国产鲁丝片午夜精品| 日韩欧美三级三区| 99热精品在线国产| 淫秽高清视频在线观看| 内射极品少妇av片p| 六月丁香七月| 天堂中文最新版在线下载 | 国产精品永久免费网站| 亚洲av免费在线观看| 啦啦啦韩国在线观看视频| 久久久久久国产a免费观看| 内射极品少妇av片p| 免费搜索国产男女视频| 天堂中文最新版在线下载 | 国产精品国产高清国产av| 成人无遮挡网站| 国内精品美女久久久久久| 国产美女午夜福利| 久久国产乱子免费精品| 欧美另类亚洲清纯唯美| 亚洲一级一片aⅴ在线观看| 成人欧美大片| 免费观看人在逋| 夫妻性生交免费视频一级片| 午夜福利视频1000在线观看| 日韩一本色道免费dvd| 免费看av在线观看网站| 久久这里只有精品中国| 亚洲在线自拍视频| 成年女人永久免费观看视频| 不卡视频在线观看欧美| 日韩高清综合在线| 日本免费一区二区三区高清不卡| 麻豆av噜噜一区二区三区| 久久精品夜夜夜夜夜久久蜜豆| 99久久人妻综合| 又粗又硬又长又爽又黄的视频|