• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Provably Secure and Efficient Remote Password Authentication Scheme Using Smart Cards

    2022-08-23 02:22:26FairuzShohaimayandEddieShahrilIsmail
    Computers Materials&Continua 2022年6期

    Fairuz Shohaimay and Eddie Shahril Ismail

    1Department of Mathematical Sciences,Faculty of Science and Technology,Universiti Kebangsaan Malaysia,UKM Bangi,43600,Selangor,Malaysia

    2Department of Mathematics,Faculty of Computer and Mathematical Sciences,Universiti Teknologi MARA Pahang,Raub Campus,Raub,27600,Pahang,Malaysia

    Abstract: Communication technology has advanced dramatically amid the 21st century,increasing the security risk in safeguarding sensitive information.The remote password authentication(RPA)scheme is the simplest cryptosystem that serves as the first line of defence against unauthorised entity attacks.Although the literature contains numerous RPA schemes, to the best of the authors’knowledge, only few schemes based on the integer factorisation problem (IFP) and the discrete logarithm problem (DLP) that provided a provision for session key agreement to ensure proper mutual authentication.Furthermore, none of the previous schemes provided formal security proof using the random oracle model.Therefore,this study proposed an improved RPA scheme with session key establishment between user and server.The design of the proposed RPA scheme is based on the widely established Dolev-Yao adversary model.Moreover, as the main contribution, a novel formal security analysis based on formal definitions of IFP and DLP under the random oracle model was presented.The proposed scheme’s performance was compared to that of other similar competitive schemes in terms of the transmission/computational cost and time complexity.The findings revealed that the proposed scheme required higher memory storage costs in smart cards.Nonetheless,the proposed scheme is more efficient regarding the transmission cost of login and response messages and the total time complexity compared to other scheme of similar security attributes.Overall, the proposed scheme outperformed the other RPA schemes based on IFP and DLP.Finally, the potential application of converting the RPA scheme to a user identification(UI) scheme is considered for future work.Since RPA and UI schemes are similar,the proposed approach can be expanded to develop a provably secure and efficient UI scheme based on IFP and DLP.

    Keywords: Authentication scheme; discrete logarithm; factorisation;password;provable security

    1 Introduction

    In the 21stcentury, anything is possible on the internet by using applications and services, like operational networks, databases, banking services, and e-commerce, that are available to anyone,anywhere.Although users can enjoy access to the services remotely, the convenience offered is not without a cost.The communication between users and service providers often involves sensitive data dan messages being transmitted through insecure public channel.Furthermore,communication technology has progressed rapidly, thereby increasing the security risk security to protect private information.The remote password authentication (RPA) scheme is a cryptosystem that allows authorised users access to securely communicate with the service providers.Therefore,the RPA scheme serves as the first line of defence against dangerous security threats.

    1.1 Related Works

    In 1999,Yang et al.[1]proposed two RPA schemes with smart cards,using timestamp and nonce(random number used once).The schemes adopted the concept of an ID-based signature scheme by Shamir[2]without the need to maintain a password verification table.Furthermore,the schemes enabled users to easily select their passwords and demonstrated resistance to replay and forged login attacks.The schemes’security foundation was grounded on two cryptographic primitives: Integer Factorisation Problem(IFP)and Discrete Logarithm Problem(DLP).Nevertheless,some improved schemes[3–9]have been proposed to overcome the security concerns of Yang et al.[1]scheme while still maintaining the cryptographic primitives of IFP and DLP.

    Fig.1 presents the literature development of RPA schemes based on Yang et al.[1]scheme.The related works are defined as studies that have proposed improvements of RPA schemes and maintained the security foundation of IFP and DLP.These works are selected from the lists of citations and references of the previous studies.As an example, from Fig.1, the enhancement scheme proposed by Shen et al.[4]was designed based on cryptanalysis of Yang et al.[1]scheme.

    Figure 1: Development of RPA schemes based on Yang et al.[1] scheme using two cryptographic primitives(IFP and DLP)

    Shen et al.[4] provided one of the most significant enhancements to scheme by Yang et al.[1], arguing that adversaries could exploit users’sensitive data through fake servers.As a result, the problem was rectified by incorporating mutual authentication between user and server.Nevertheless,the scheme was shown to be vulnerable to existing and novel security attacks, such as replay,secret-key guessing, and forgery attacks [10–13].From there, numerous modifications [10–16] have been proposed.These studies reported their schemes to be more practical and efficient than earlier comparable schemes while maintaining a security basis of similar cryptographic primitives(i.e.,IFP and DLP)during mutual authentication.Notably,Liu et al.[10]developed a novel nonce-based RPA scheme that could prevent forged login without incurring additional computational cost on the smart card.

    Another notable contribution is the improved scheme by Yang et al.[8],which could withstand forgery,password-guessing,smart card loss,and replay attacks.Subsequently,Kim et al.[17]demonstrated that Yang et al.[8] scheme could not withstand previous forgery attacks.Later, Khan [18]demonstrated the vulnerabilities in[8]and presented an enhanced scheme with mutual authentication to address the problem.Nevertheless, other studies [19], [20] have shown that Kim et al.[17] is vulnerable to forgery attacks.As a result,Giri et al.[19]proposed a new scheme to resist the forgery attacks,as well as other types of threats,such as password-guessing,smart card loss,and replay attacks.The most recent related study by Ismail et al.[20]presented a new attack and proposed modifications to address the new threats.

    Awasthi et al.[15] demonstrated that the scheme by Shen et al.[4] is vulnerable to forged login attacks and presented additional security concerns about the scheme by Liu et al.[10].Hence,Awasthi et al.[15]proposed an enhanced scheme for resisting forgery attacks with reduced smart card memory storage cost.Unfortunately, the scheme was shown to be vulnerable to impersonation, insider, and password-guessing attacks by An[21],which also suggested improvements to make the scheme more secure to resist all of the mentioned attacks while supporting mutual authentication.Furthermore,Kumari et al.[16]highlighted that scheme proposed by Awasthi et al.[15]could not resist the claimed attacks.Therefore, they recommended a three-factor scheme authentication improvement with the added security of the user’s fingerprint.

    Kumari et al.[16] proposed the latest RPA scheme construction based on IFP and DLP.The study was the first to introduce a scheme that included a shared session key between the user and the server to eliminate the man-in-the-middle attack, accompanied by the most comprehensive and informal security analysis.The proposed scheme was shown to be resistant to many security attacks, including the smart card loss, replay, impersonation, forgery, offline password-guessing,denial-of-service, insider, and stolen verifier attacks.Nevertheless, the scheme’s computational and communication costs were the highest among all the schemes in Fig.1.

    1.2 Motivation and Contributions

    Security analysis,like that of other cryptosystems,is imperative in developing new RPA schemes.Although numerous RPA schemes based on IFP and DLP have been proposed in the literature,none of them provides security proof under the random oracle model.The security proof requirement has been fulfilled by many schemes constructed based on other cryptographic primitives in the literature,such as IFP [22], Elliptic Curve Discrete Logarithm Problem (ECDLP) [23], and chaotic maps [24].Although the study by Kumari et al.[16]featured many security attributes,no formal security proof of its scheme was presented.Consequently, despite being the most secure among similar works, the proposed scheme had to sacrifice its performance efficiency.Therefore, the purpose of this study is two-fold.First,the aim of this study is to propose an efficient RPA scheme with session key agreement based on two cryptographic primitives(IFP and DLP).Next,the main contribution of this study is to present a formal security analysis based on the formal definitions of IFP and DLP under the random oracle model to prove the security of the proposed scheme.

    1.3 Organisation of the Paper

    The remainder of this paper is organised as follows.Section 2 presents the mathematical and security preliminaries.Section 3 then explains the newly proposed scheme.Section 4 presents the proposed scheme’s formal and informal security analyses.Section 5 provides a comparative study of the previous schemes of[4,15,16],and the present scheme.Section 6 discusses how the RPA scheme could be used to develop a user identification(UI)scheme.Finally,Section 7 presents the conclusion and recommendation.

    2 Preliminaries

    This section provides a brief overview of the mathematical concepts that served as the security foundation in the development of the proposed scheme in this study,including the definitions of IFP[25],DLP[26],and the one-way hash function(e.g.,MD5[27]or SHA-256[28]).The adversary model and security goals were also considered.Tab.1 shows the notations and descriptions used in this paper.

    Table 1: Notations and descriptions

    Table 1:Continued

    2.1 IFP

    Given a 2048-bit integern=p×q,find the primespandqthat are each at least 1024-bit length.Ifpandqare known,it will be easy to computen.Findingpandqgivenn,on the other hand,is a computationally intractable problem.

    2.2 DLP

    Assume thatgis a primitive element of a finite field Fpwith orderp.Consider the equation,

    Giveng,α, andp, calculating the modular exponentiationβ=gαmodpis trivial.However,finding the exponentαgiveng,β,andp,it is computationally infeasible.

    DLP is defined over a multiplicative groupwheren=p×qof orderφ(n)=(p-1)(q-1).Consider the equation,

    If the factorisation of orderφ(n)is known andφ(n)has(small)prime factors,an instance of the DLP incan be reduced to two instances of the DLP inandusing Pohlig et al.[29]algorithm.Nevertheless, it is believed that finding the exponentαis intractable for DLP in the multiplicative groups of finite fields[30].

    2.3 Hash Function

    A cryptographic one-way hash functionh:X= {0, 1}*→Y= {0, 1}lhas the following properties.

    ■The functionhtakes an arbitrary length inputx∈Xand returns a fixedl-bit length message digesty∈Y.

    ■The functionhis one-way;that is,given the inputx,computingh(x)=yis trivial.However,giveny,it is computationally infeasible to find the inverseh-1(y)=x.

    ■The functionhis collision-resistant,which means that finding two inputsx1x2such thath(x1)=h(x2)is computationally infeasible.

    The SHA-256 hash function was adopted for the proposed scheme.Other secure hash algorithms,such as SHA-1,SHA-224,SHA-384,SHA-512,and SHA-512/256[28],can also be implemented.

    2.4 Adversary Model

    For communications over an insecure public channel,the Dolev et al.[31]adversary model was considered.Accordingly,the following assumptions were made.

    ■Assumption A1:An adversaryAcan trap,delete,or alter the transmitted messages.

    ■Assumption A2:An adversaryAcan obtain the stored information in the smart card using power monitoring techniques[32,33].

    ■Assumption A3: An adversaryAcan guess the identity or password using the dictionary attack.However,the adversaryAcannot guess the identity and password simultaneously using any online/offline attacks within polynomial time[34].

    According to this adversary model, the following two cases as per [35] were also taken into account.

    ■Case 1:An adversaryAcan be a non-registered user who tries to perform various attacks against the authentication system.

    ■Case 2:An adversaryAcan be a registered user who tries to obtain the secret parameters of the server by which he/she can mount various attacks against the authentication system.

    2.5 Security Goals

    The following are the security goals of an ideal RPA scheme defined in this study that should be achieved,as listed in[36].

    ■Mutual authentication:Both the server and the user can verify the legitimacy of each other.Furthermore,no illegal users or servers can impersonate a legal user or server.

    ■Session key agreement: A session key should be created at the end of a successful mutual authentication process.Subsequently, the data transmitted between both entities should be encrypted to ensure confidentiality and secrecy.

    ■User anonymity: During data transmission over a public channel, a user’s valid identity should be concealed.Even if adversaryAcan analyse login information or gain access to services, user anonymity protects user’s sensitive data, such as personal details, financial information,and social circles,from unauthorised parties.

    3 Proposed Scheme

    This section presents the proposed RPA scheme based on the security of IFP and DLP and consisted of five phases:(1)initialisation phase,(2)registration phase,(3)login phase,(4)authentication phase, and (5) password change phase.Furthermore, three entities were also considered: KIC, userUi, and serverS.In this scheme, the KIC is a trusted authority responsible for generating global parameters,computing user and server secret information,and providing new users with smart cards.

    3.1 Initialisation Phase

    The KIC sets up the server’s public and secret parameters during the initialisation phase.

    1.Generate two large primesp=2p1+1 andq=2q1+1 of 1024-bit length,wherep1andq1are both primes.

    2.Computen=p×qandφ(n)=(p-1)·(q-1).

    3.Find a prime numbereand integerdsuch thate·d≡1 modφ(n),whereeis the serverS’s public-key anddis the corresponding private key.

    4.Find an integerg,which is a primitive element for both finite prime fields Fpand Fq.

    5.Decide on a secret parameterx∈for serverSand the format for identityIDof a user.

    6.KIC?S:{d,x,ID format}.

    The private keyd,secret parameterx,and format of a user’sIDshould be safely provided to the serverS.KIC is no longer needed once the system is set up,except during the registration phase when new users request to join.The integer pairpandqwill not be used anymore and should be disposed of securely.

    3.2 Registration Phase

    In the registration phase,a new userUiperforms the following steps.

    The KIC then performs the following steps.

    After receiving the smart cardSCi,Uiperforms the following steps.

    Fig.2 depicts an overview of the proposed RPA scheme’s phases.

    3.3 Login Phase

    When a registered userUiwants to access the serverS,the userUiinserts the smart cardSCiinto a remote terminal.The user then enters the identityIDiand passwordpwi.The following steps are taken by the smart cardSCi.

    Figure 2:Overview of the proposed RPA scheme

    3.4 Authentication Phase

    Once the serverSreceives the login message request at the timeTS,it proceeds with the following steps.

    1.Check(TS-TU) <ΔT, whereΔTis the allowed time transmission.If the time difference does not hold,the login request is rejected.

    2.Computew=h(d||x).

    3.ExtractIDiby computingIDi=DIDi⊕w.

    4.Check the validity of the format forIDi.If the format ofIDiis invalid, the login request is rejected.

    Once the userUireceives the response message at the timeTc,the user then performs the following steps.

    Once the session keySKis established,the userUiand serverScan communicate with each other immediately.This step completes the mutual authentication process and eliminates the risk of the man-in-the-middle attack.

    3.5 Password Change Phase

    This phase enables the userUito change or update the password independently without interacting with the KIC or the serverS.When changing the password,the userUiinserts the smart cardSCiinto the terminal and enters the identityIDiand passwordpwi.The following steps are conducted by the smart cardSCi.

    If userUi’s smart cardSCiis lost or stolen,the userUimust re-register with the KIC.Then,the KIC should issue a new smart card for the userUifollowing the steps outlined in the registration phase.

    3.6 Proof of Correctness

    The propositions and proofs of correctness are presented below for the sake of completeness of the proposed scheme.

    Proposition 1.If userUienters the correct identityIDiand passwordpwi,and Steps 1 and 2 of the login phase run well,the local user verification equation in Step 3 of the login phase will always hold.The proof is shown below.

    Proposition 2.If all the login phase steps and Steps 1–5 of the authentication phase run well,and the login message{n,e,DIDi,Xi,Yi,TU}is properly generated,then the user authentication equation in Step 6 of the authentication phase will always hold,as shown below.

    Proposition 3.If all the steps in the authentication phase(Steps 1–10)run well and the response message {Ri,TS} is properly generated, then the server authentication equation in Step 11 of the authentication phase will always be true,as shown below.

    4 Security Analysis of the Proposed Scheme

    This section presents the formal security proof that the proposed scheme is provably secure against an adversaryAfor deriving the private keyd, secret parameterx, identityIDi, passwordpwi, and shared session keySK.The proposed scheme is also shown to provide the desired security attributes.

    4.1 Formal Security Proof

    The formal security analysis of the proposed scheme,which is based on the random oracle model,is explained below.Specifically, the proposed scheme’s formal security proof adopted the approach taken by[22,37–39].To begin,the formal definitions of the collision-resistant cryptographic one-way hash function[39],IFP[22]and DLP[40,41]are given.

    Definition 1.A secure collision-resistant one-way hash function

    is a deterministic algorithm that takes an arbitrary length inputx∈{0,1}*binary string and yields a fixed-lengthl-bit binary string outputh(x)∈{0,1}l.

    An adversaryA’s advantage in finding a collision is given as

    where Pr[E] is the probability of an eventEin a random experiment and(x1,x2)?RAdenotes a randomly selected pair(x1,x2)by the adversaryA.As a result,the adversaryAcan be probabilistic.The adversaryAcomputes the probability in the advantage over the random choices with the execution timet1.If1)≤ε1, for any sufficiently smallε1>0, the one-way functionh(·)is collisionresistant.

    Definition 2.Assume thatGenFis a polynomial time algorithm with input security parameter 1ρa(bǔ)nd outputs(n,p,q),wheren=p×q,andpandqareρ-bit distinct primes.Givenn,the integer factorisation assumption relative toGenFstates that it is computationally infeasible to derive the prime factorspandq,except with a negligible probability inρ.

    For any adversaryAof probabilistic-polynomial time(PPT),its factorisation advantage is given by

    Algorithm 1:EXPDLP G,g (A)1: Select u∈RZn 2: Compute U ←gu mod n 3: Compute u* ←A(U)4: if gu* =U mod n then 5: return 1(Success)6: else 7: return 0(Failure)8: end if

    The DLP advantage of algorithmAwith execution timetis defined as

    If the DLP advantage of any adversaryAin terms of time complexity is small,the DLP is hard inG.Hence,DLP is computationally infeasible if≤εDLP,for any sufficiently smallεDLP >0.

    For this security proof,the adversaryAis assumed to have access to the following three random oracles listed below.

    ■OracleH:This oracle outputs the stringxfrom a hash valuey=h(x).

    ■OracleF:This oracle outputs the private keydof the serverSfrom the valuesnande.

    ■OracleD:This oracle outputs the valuex∈Znfrom the valueh=gxmodn,wheregis the generator inGof ordern.

    The three theorems and proof of formal security analysis are then presented as follows.

    Theorem 1.If the cryptographic one-way hash functionh(·)behaves like a true random oracle,and integer factorisation and discrete logarithm are computationally hard problems,then the proposed RPA scheme is provably secure against an adversary A for deriving the private key d and secret parameter x of server S.

    Proof.Initially, an adversaryAis constructed with the ability to derive private keydand secret parameterxof the serverSby running the algorithm, as shown in Algorithm 2 for the proposed RPA scheme.ByAssumption A2,suppose that the adversaryAcan extract{n,e,g,ji,vi,Si,hi,from the smart card using power monitoring techniques.ByAssumption A1, it is further assumed that the adversaryAintercepts login message{n,e,DIDi,Xi,Yi,TU}and response message{Ri,TS}at the timeTUandTS,respectively.

    Algorithm 2:ALGOracle A,PAS for deriving private key d and secret parameter x of server S Input:n,e,g,ji,vi,Si,hi,DIDi,Xi,Yi,TU Output:0 or 1 1: Compute CIDi =Se i mod n 2: Call OracleH on input CIDi to retrieve identity ID*i and secret parameter x* as(ID*i||x*) ←OracleH(CIDi)3: Compute h(IDi||hpwi)=ji ⊕hi 4: Call OracleH on input h(IDi||hpwi) to retrieve identity ID**i and hpw*i as (ID**i ||hpw*i) ←OracleH(h(IDi||hpwi))5: if ID*i images/BZ_15_1302_2457_1339_2503.pngID**i then 6: return 0(Failure)7: else 8: Compute w=h(IDi||hpwi)⊕vi and w* =DIDi ⊕ID*i 9: Call OracleH on input w to retrieve the private key d* and secret parameter x** as(d*||x**)←OracleH(w)10: Call OracleF on input e and n to retrieve the private key d**as d** ←OracleF(e,n)11: if w=w*and d* =d**then 12: Call OracleD on input hi,g,ID*i,and d* to retrieve the secret parameter x*** as x*** ←OracleD(hi,g,ID*i,d*)13: if x* =x** =x***then 14: if Ye i =CIDi·Xh(IDi||TU)·d·x i mod n then 15: Accept d* and x* as the correct private key and secret parameter of server S,respectively return 1(Success)16: else 17: return 0(Failure)18: end if 19: else 20: return 0(Failure)21: end if 22: else 23: return 0(Failure)24: end if 25: end if

    Algorithm 3:ALG2Oracle A,PAS for deriving identity IDi and password pwi of user Ui Input:n,e,ji,Si,hi, ?bi Output:0 or 1 1: Compute CIDi =Se i mod n 2: Call OracleH on input CIDi to retrieve identity ID*i and secret parameter x* as (ID*i||x*) ←OracleH(CIDi)3: Compute h(IDi||hpwi)=ji ⊕hi 4: Call OracleH on input h(IDi||hpwi) to retrieve identity ID**i and hpw*i as (ID**i ||hpw*i) ←OracleH(h(IDi||hpwi))5: if ID*i images/BZ_15_1302_2457_1339_2503.pngID**i then 6: return 0(Failure)7: else 8: Call OracleH on input hpw*i to retrieve the identity pw*i and b*i as (pw*i||b*i) ←OracleH(hpw*i)9: Compute ?b*i =h(ID*i||pw*i)⊕b*i 10: if ?b*i = ?bi then 11: Accept ID*i and pw*i as the correct identity and password of user Ui,respectively return 1(Success)12: else 13: return 0(Failure)14: end if 15: end if

    Theorem 3.If the cryptographic one-way hash functionh(·)behaves like a true random oracle,then the proposed RPA scheme is provably secure against an adversary A for deriving the shared session key SK between user Ui and server S.

    Algorithm 4:ALG3Oracle A,PAS for deriving session key SK shared between user Ui and server S Input:n,e,ji,vi,Si,hi,DIDi,Xi,Yi,TU,Ri,TS Output:0 or 1 1: Compute CIDi =Se i mod n 2: Call OracleH on input CIDi to retrieve identity ID*i and secret parameter x* as (ID*i||x*) ←OracleH(CIDi)3: Compute h(IDi||hpwi)=ji ⊕hi and w=h(IDi||hpwi)⊕vi 4: Call OracleH on input h(IDi||hpwi) to retrieve identity ID**i and hpw*i as (ID**i ||hpw*i) ←OracleH(h(IDi||hpwi))5: if ID*i images/BZ_15_1302_2457_1339_2503.pngID**i then 6: return 0(Failure)7: else 8: Compute w* =DIDi ⊕ID*i and Z*i =h(ID*i||TS)9: if w=w*and Z*i =Re i mod n then 10: Successfully compute the session key SK = h(ID*i Z*i w*TUTS) shared between user Ui and server S return 1(Success)11: else 12: return 0(Failure)13: end if 14: end if

    4.2 Security Attributes

    This section further analyses the security attributes offered by the proposed RPA scheme.

    4.2.1 No Data Storage in Server S

    The proposed scheme preserves the “no data storage”feature of Kumari et al.[16] scheme.By using the information provided by the login message request,private keyd,and secret parameterx,the serverScan perform all the calculations to authenticate the validity of the userUi.

    4.2.2 Mutual Authentication

    4.2.3 Session Key Agreement

    After completing the mutual authentication process,both the userUiand serverSwill establish a shared session keySK=h(IDiZiwTUTS).Since the adversaryAdoes not knowIDi,Zi,andw,the session keySKcannot be directly computed due to the cryptographic collision-resistant one-way hash function.As a result,the proposed scheme can protect the secrecy of shared session keys.

    4.2.4 User Anonymity

    According toAssumption A2,the adversaryAmay extract information{n,e,g,ji,vi,Si,hi,}from the smart cardSCi.The identityIDiis contained in the parametersji,vi,Si, andhi.Nevertheless,the adversaryAis unable to derive identityIDisince the adversaryAneeds to invert the output of a collision-resistant one-way hash function.This is only possible for an adversary with a negligible probability in polynomial time,as proven in Theorem 2.As a result,the proposed scheme can preserve user anonymity.

    4.2.5 Local Password Verification

    The proposed scheme offers an incorrect input detection feature.Before logging into the serverS,the smart cardSCiverifies the legality of identityIDiand passwordpwi.The verification equationji⊕hi=h(IDi||hpwi)will detect if a userUiinputs the identityIDior passwordpwi,or both incorrectly by mistake.Without knowingIDi,pwi,andbi,the adversaryAis unable to correctly calculateh(IDi||hpwi)and subsequently,the verificationji⊕hi=h(IDi||hpwi)will fail.Therefore,the proposed scheme can block illegal access using local password verification.

    4.2.6 Password Changeability

    The extra“password change”phase in the proposed scheme grants users the convenience to change or update their passwords locally.This phase can be done without interacting with the KIC or the serverS.

    4.2.7 User-Friendliness

    The proposed scheme permits the userUito freely choose the identityIDiand passwordpwi.The userUican easily change or update the passwordpwiwithout communicating with serverSwithin minimal time without having to go through the registration phase.As a result,the proposed scheme is hassle-free and user-friendly.

    5 Performance Comparison and Analysis

    The endorsement of a new RPA scheme should be supported by careful analysis of its performance.For this purpose, the proposed scheme was compared with similar RPA schemes [4,15,16].These schemes are chosen according to the security attributes offered,which are mutual authentication and no data storage in the server.Furthermore,since the aim of this study is to propose an efficient RPA scheme,it is considerable to compare its performance to the most recent scheme by Kumari et al.[16]that is found in the literature.The security attributes and efficiency of all schemes considered are investigated in this section.

    Tab.2 compares all schemes based on the security attributes discussed in Section 4.According to Tab.2,the proposed scheme and the scheme by Kumari et al.[16]outperformed the schemes by Shen et al.[4] and Awasthi et al.[15].All of the security attributes of [16] were retained in the proposed scheme,including no storage of data in serverS,mutual authentication,session key agreement,user anonymity, local password verification, password changeability, and user-friendliness.Furthermore,unlike the other schemes, the proposed scheme includes a formal security analysis.As a result, the proposed RPA scheme outperformed other considered schemes in terms of security attributes.

    Table 2: Comparison of schemes based on security attributes

    Table 2:Continued

    The assessment assumptions for the efficiency analysis were based on[17,29].Assuming that each value of {IDi,pwi,bi,ri} is 160-bit long, the output message digests of secure one-way hash function(SHA-256 [28]) {CIDi,DIDi,SK,w,hpwi,vi,ji,} are 256-bit long, and the timestamps {TU,TS,Tc}are 32-bit long.The modular operation of modnis 2048-bit long, and the modular exponentiation is regarded as the most expensive operation.Hence, the values {n,e,d,Si,hi,Xi,Yi,Ri} are 2048-bit and{x,g}are 1024-bit.The exclusive OR(⊕)operation involves very few computations and hence is negligible.The time complexity with the exponential operation(Te),modular multiplication operation(Tm),hashing operation(Th),and exclusive OR operation(⊕)can be roughly expressed asTe?Tm≈Th >⊕.For ease of time complexity comparison between schemes,the approximation of execution time complexity ofTeandThin terms ofTmis assumed asTe≈240TmandTh≈Tm[42].Tab.3 shows the transmission/computational cost and time complexity for all considered schemes.

    Table 3: Comparison of schemes based on transmission/computation cost and time complexity

    In the proposed scheme,the parameters{n,e,g,ji,vi,Si,hi,}are stored within the smart cardSCi.The memory storage required for the smart card isC1=(4 ×2048)+(1024)+(3 ×256)= 9984-bit, which is the highest among other schemes, particularly 352-bit more than Shen et al.[4].The transmission costC2is the memory space of the login message, {n,e,DIDi,Xi,Yi,TU} and response message, {Ri,TS} that are exchanged during the login and authentication phases.For the proposed scheme,itsC2=(5×2048)+(256)+(2×32)=10560-bit,which is the lowest among other schemes,particularly 928-bit less than Awasthi et al.[15].The computational costC3is the total time complexity of operations executed during the registration phase,C3=2Te+2Tm+5Th.The computational cost of smart cardSCiand serverSareC4=3Te+4Tm+6ThandC5=3Te+3Tm+5Th,respectively(exhibit the time spent during the authentication phase and session key agreement).

    Based on Tab.3, the total computational costs (C3+C4+C5) of the schemes of Shen et al.[4]and Awasthi et al.[15]are both 8Te+5Tm+6Th≈1931Tm.While,the total computational costs for schemes of Kumari et al.[16]and the proposed scheme are 10Te+5Tm+18Th≈2433Tmand 8Te+9Tm+16Th≈1945Tm,respectively.Compared with the schemes by Shen et al.[4]and Awasthi et al.[15],the proposed scheme is less efficient with 14Tmhigher computational cost.In Fig.3,the bar chart presents the efficiency of the proposed scheme over other considered schemes.It is clear that the proposed scheme is more efficient than Kumari et al.[16].The total computational cost of Kumari et al.[16]has been significantly reduced by 20%in the proposed scheme.

    Figure 3:Comparison of schemes based on total computational cost(C3+C4+C5)

    As provided in Tab.2, both the proposed scheme and Kumari et al.[16] require extra steps for session key agreement,which explains the higher computational cost when compared to the schemes by Shen et al.[4]and Awasthi et al.[15]in Tab.3.It is worth noting that,as shown in Tab.3,the proposed scheme requires larger smart card memory storage,particularly 3480-bit more than Kumari et al.[16].However,this is justified because the proposed RPA scheme significantly reduced the transmission cost by 1024-bit as compared to Kumari et al.[16].Additionally,the total computational cost improved to 1945Tm,which is 488Tmless than Kumari et al.[16].Based on the security attributes,communication cost, and time complexity, it can be concluded that the proposed scheme outperformed all other schemes considered.

    6 Application

    This section discusses the proposed approach’s potential applicability in developing a UI scheme.The UI scheme can be considered a simpler algorithm used to distinguish unique users prior to the authentication process.Most RPA schemes require two or more factors(e.g.,password,smart card,and fingerprint),whereas UI schemes just need the user’s identity.Figs.4a and 4b show the flowcharts for the RPA and UI schemes,respectively.At a glance,the phases in the RPA and UI schemes appear similar,except that the UI scheme does not require a login phase.Some parameters can be removed while retaining the cryptographic primitives of IFP and DLP, depending on the security goals and purposes.Therefore, it would be interesting to investigate the prospect of converting the proposed RPA scheme into an improved UI scheme with provable security.

    Figure 4:Process flowchart for RPA and UI schemes(a)RPA scheme(b)UI scheme

    7 Conclusion

    The aim of this study is to primarily propose an efficient RPA scheme that offers session key establishment between user and server.The widely established Dolev-Yao adversary model was considered in the development of the proposed scheme,which attained the desired security attributes of Kumari et al., such as no data storage in serverS, user anonymity, local password verification,password changeability, and user-friendliness.Furthermore, as the main contribution, a formal security proof of the proposed scheme was presented based on the random oracle model using formal definitions of IFP and DLP.Although the proposed scheme required higher smart card memory than other similar schemes by Shen et al., Awasthi et al.and Kumari et al., this was acceptable owing to its much-reduced transmission/computation cost and time complexity than Kumari et al.’s scheme.The performance analysis proved that the proposed RPA scheme is noticeably better than Kumari et al.,given that it can provide the same security attributes.Future work will investigate the use of two cryptographic primitives(IFP and DLP)in the development of UI schemes.Since the phases in RPA and UI schemes are similar,it would be interesting to examine the potential application,particularly in terms of security and performance.Expectantly, this should aid in the design of an efficient and provably secure UI scheme.

    Acknowledgement:Authors are grateful for the support from Universiti Teknologi MARA(UiTM)and Universiti Kebangsaan Malaysia (UKM) for providing the facilities and resources, and UiTM/KPT-SLAB scholarship from the Ministry of Higher Education Malaysia (MOHE).In addition,the authors would like to thank anonymous reviewers for their comments and suggestions to improve this manuscript.

    Funding Statement:This research is funded by UKM under Grant No.GUP-2020-029.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久精品影院6| 一区二区三区四区激情视频 | 一本精品99久久精品77| 欧美乱色亚洲激情| 身体一侧抽搐| 国内揄拍国产精品人妻在线| 亚洲av第一区精品v没综合| 欧美成狂野欧美在线观看| 久久久国产成人精品二区| 夜夜躁狠狠躁天天躁| 久久久久久久久久成人| 91午夜精品亚洲一区二区三区 | 亚洲黑人精品在线| 国产淫片久久久久久久久 | 97人妻精品一区二区三区麻豆| 九九久久精品国产亚洲av麻豆| 丰满乱子伦码专区| 精品一区二区三区视频在线| 久久久精品大字幕| 在线a可以看的网站| 日韩欧美精品v在线| 99在线人妻在线中文字幕| 观看美女的网站| 一进一出抽搐动态| 丁香六月欧美| 1000部很黄的大片| 亚洲自偷自拍三级| 免费看美女性在线毛片视频| 99精品久久久久人妻精品| 日韩 亚洲 欧美在线| 天堂影院成人在线观看| 内射极品少妇av片p| 久久国产精品影院| 男女下面进入的视频免费午夜| 国产精品爽爽va在线观看网站| 禁无遮挡网站| 观看免费一级毛片| 成人美女网站在线观看视频| 男人狂女人下面高潮的视频| 成人毛片a级毛片在线播放| 免费看光身美女| 天堂av国产一区二区熟女人妻| 亚洲成av人片在线播放无| 国产激情偷乱视频一区二区| 99精品在免费线老司机午夜| 亚洲人成伊人成综合网2020| 一级黄片播放器| 国产单亲对白刺激| xxxwww97欧美| 夜夜夜夜夜久久久久| 成人亚洲精品av一区二区| 国产又黄又爽又无遮挡在线| 中文字幕久久专区| 国产精品乱码一区二三区的特点| 国产高潮美女av| 日韩免费av在线播放| 亚洲专区中文字幕在线| 国产成+人综合+亚洲专区| 日日摸夜夜添夜夜添小说| 国产大屁股一区二区在线视频| 尤物成人国产欧美一区二区三区| 国内久久婷婷六月综合欲色啪| 日韩欧美在线二视频| 日本三级黄在线观看| 又黄又爽又刺激的免费视频.| 又黄又爽又刺激的免费视频.| 亚洲在线自拍视频| 91九色精品人成在线观看| 婷婷亚洲欧美| 在线天堂最新版资源| 色哟哟哟哟哟哟| ponron亚洲| 最新中文字幕久久久久| 亚洲美女视频黄频| 亚洲成av人片免费观看| 在线观看av片永久免费下载| 真人做人爱边吃奶动态| 老司机深夜福利视频在线观看| av福利片在线观看| 日韩中文字幕欧美一区二区| 12—13女人毛片做爰片一| 午夜免费成人在线视频| 久久精品夜夜夜夜夜久久蜜豆| 亚洲自偷自拍三级| 少妇裸体淫交视频免费看高清| 男女视频在线观看网站免费| 禁无遮挡网站| x7x7x7水蜜桃| 丰满人妻熟妇乱又伦精品不卡| 国产精品野战在线观看| 一个人看视频在线观看www免费| 免费av不卡在线播放| 俄罗斯特黄特色一大片| 日本免费a在线| 精品免费久久久久久久清纯| 国产成人影院久久av| 成年免费大片在线观看| 午夜精品一区二区三区免费看| 天堂av国产一区二区熟女人妻| 国产乱人伦免费视频| 午夜福利高清视频| 午夜a级毛片| 欧美一区二区国产精品久久精品| 夜夜爽天天搞| 午夜激情福利司机影院| 色综合欧美亚洲国产小说| 中文字幕av在线有码专区| 国产精品亚洲一级av第二区| 亚洲精品在线观看二区| 热99在线观看视频| 成人特级av手机在线观看| a级毛片免费高清观看在线播放| 午夜亚洲福利在线播放| 亚洲欧美日韩卡通动漫| 一区二区三区免费毛片| 午夜老司机福利剧场| 性色avwww在线观看| 成年人黄色毛片网站| 国产真实乱freesex| 美女高潮的动态| 国产色爽女视频免费观看| 国产伦在线观看视频一区| 日本成人三级电影网站| 日本免费一区二区三区高清不卡| 少妇丰满av| 精品乱码久久久久久99久播| 国产一区二区激情短视频| 久久亚洲真实| 18禁黄网站禁片午夜丰满| 国产精品久久电影中文字幕| 欧美日本视频| 最近中文字幕高清免费大全6 | 精品久久久久久久久亚洲 | 内地一区二区视频在线| 亚洲电影在线观看av| 日本精品一区二区三区蜜桃| 99热6这里只有精品| 亚洲精品乱码久久久v下载方式| 久久久国产成人免费| av国产免费在线观看| 亚洲真实伦在线观看| 久久精品国产亚洲av香蕉五月| 亚洲狠狠婷婷综合久久图片| 成人无遮挡网站| 美女高潮的动态| 国产欧美日韩精品一区二区| 激情在线观看视频在线高清| 久久久久久九九精品二区国产| 男人舔女人下体高潮全视频| 国产精品日韩av在线免费观看| 午夜福利在线观看吧| 日本黄色片子视频| 成人欧美大片| www日本黄色视频网| 久久6这里有精品| 亚洲久久久久久中文字幕| 一个人看的www免费观看视频| 少妇被粗大猛烈的视频| 美女cb高潮喷水在线观看| 国产在线精品亚洲第一网站| 大型黄色视频在线免费观看| 国产精品精品国产色婷婷| 国产69精品久久久久777片| 亚洲国产精品合色在线| 色吧在线观看| 99热6这里只有精品| 国产免费男女视频| 在线a可以看的网站| av福利片在线观看| 两个人视频免费观看高清| 亚洲精品日韩av片在线观看| 亚洲18禁久久av| av在线天堂中文字幕| 欧美xxxx黑人xx丫x性爽| 国产亚洲欧美98| 日韩大尺度精品在线看网址| av天堂中文字幕网| 国产野战对白在线观看| 一个人观看的视频www高清免费观看| 黄色丝袜av网址大全| 亚洲一区二区三区色噜噜| 哪里可以看免费的av片| 无人区码免费观看不卡| 免费av不卡在线播放| 天堂动漫精品| 性欧美人与动物交配| 国产精品国产高清国产av| 国产精品一及| 欧美黄色淫秽网站| 精品国产亚洲在线| 欧美一区二区亚洲| 午夜久久久久精精品| av在线蜜桃| 淫秽高清视频在线观看| 成人亚洲精品av一区二区| 国产视频一区二区在线看| 亚洲av成人av| 夜夜夜夜夜久久久久| 国语自产精品视频在线第100页| 欧美黄色片欧美黄色片| 成年免费大片在线观看| 国语自产精品视频在线第100页| 国产精品一区二区三区四区久久| 精品午夜福利视频在线观看一区| 国产精品综合久久久久久久免费| 国产伦人伦偷精品视频| 国产成人a区在线观看| 亚洲专区中文字幕在线| 毛片一级片免费看久久久久 | 亚洲av熟女| 欧美另类亚洲清纯唯美| 熟女电影av网| 最近视频中文字幕2019在线8| 成年人黄色毛片网站| 国产大屁股一区二区在线视频| 日本黄色视频三级网站网址| 国产精品免费一区二区三区在线| 热99re8久久精品国产| 国产免费男女视频| 91麻豆精品激情在线观看国产| 日韩有码中文字幕| 亚洲色图av天堂| www.999成人在线观看| 国内精品久久久久久久电影| 看十八女毛片水多多多| 国产一区二区激情短视频| 老司机午夜福利在线观看视频| 免费av不卡在线播放| 国产成人福利小说| 欧美国产日韩亚洲一区| 国产av在哪里看| 日本 欧美在线| 看免费av毛片| 男人舔女人下体高潮全视频| bbb黄色大片| 熟妇人妻久久中文字幕3abv| 国产精品久久久久久精品电影| 99在线视频只有这里精品首页| 色5月婷婷丁香| 亚洲av.av天堂| 久久久国产成人免费| 欧美绝顶高潮抽搐喷水| 精品久久国产蜜桃| 久久久久精品国产欧美久久久| 欧美+亚洲+日韩+国产| 色播亚洲综合网| 成人美女网站在线观看视频| 日韩欧美精品v在线| 一本久久中文字幕| 久久精品国产亚洲av涩爱 | 午夜日韩欧美国产| 久久精品国产清高在天天线| 国产成人欧美在线观看| 动漫黄色视频在线观看| 国产高清有码在线观看视频| 99热精品在线国产| 亚洲综合色惰| 性欧美人与动物交配| 亚洲 欧美 日韩 在线 免费| 69av精品久久久久久| 久久久久久久亚洲中文字幕 | 欧美成人性av电影在线观看| 久久久久久久亚洲中文字幕 | 高清在线国产一区| 亚洲精品一区av在线观看| 日韩欧美精品免费久久 | 老鸭窝网址在线观看| 看片在线看免费视频| 国产主播在线观看一区二区| 日本黄色片子视频| 成人高潮视频无遮挡免费网站| 亚洲av二区三区四区| 精品欧美国产一区二区三| 亚洲男人的天堂狠狠| 亚洲午夜理论影院| 欧美+亚洲+日韩+国产| 国产三级黄色录像| 欧美日韩福利视频一区二区| 亚洲在线观看片| 亚洲中文字幕一区二区三区有码在线看| 国产成年人精品一区二区| 午夜福利在线观看吧| 亚洲天堂国产精品一区在线| av福利片在线观看| 国产三级在线视频| 欧美精品国产亚洲| 亚洲成人久久爱视频| 午夜视频国产福利| 国产乱人视频| 亚洲国产欧美人成| 国产精品永久免费网站| 午夜免费成人在线视频| 别揉我奶头~嗯~啊~动态视频| 免费看光身美女| 国产精品三级大全| 中文字幕人妻熟人妻熟丝袜美| 国产精品影院久久| 桃红色精品国产亚洲av| 搡老熟女国产l中国老女人| 老司机午夜福利在线观看视频| 亚洲av成人av| 18禁裸乳无遮挡免费网站照片| 欧美国产日韩亚洲一区| 1000部很黄的大片| 一本久久中文字幕| 一个人看的www免费观看视频| 舔av片在线| 一本精品99久久精品77| 久久精品久久久久久噜噜老黄 | 美女 人体艺术 gogo| 一级黄色大片毛片| 日韩av在线大香蕉| 日韩国内少妇激情av| 美女高潮喷水抽搐中文字幕| 欧美高清性xxxxhd video| 此物有八面人人有两片| 真人一进一出gif抽搐免费| 亚洲国产精品合色在线| 超碰av人人做人人爽久久| 亚洲av成人精品一区久久| 国产不卡一卡二| 国内精品久久久久久久电影| 一进一出抽搐gif免费好疼| 亚洲精华国产精华精| 成人永久免费在线观看视频| or卡值多少钱| 亚洲av中文字字幕乱码综合| 天堂√8在线中文| 直男gayav资源| 亚洲美女黄片视频| 51国产日韩欧美| 99国产精品一区二区三区| 一区福利在线观看| 丝袜美腿在线中文| 精品人妻熟女av久视频| 国产激情偷乱视频一区二区| 91久久精品电影网| 国产不卡一卡二| 久久6这里有精品| 亚洲不卡免费看| 麻豆成人av在线观看| 色吧在线观看| 18禁裸乳无遮挡免费网站照片| 又黄又爽又刺激的免费视频.| 全区人妻精品视频| 亚洲av免费在线观看| 成人性生交大片免费视频hd| av专区在线播放| 97碰自拍视频| 最近中文字幕高清免费大全6 | 国产精品久久久久久人妻精品电影| 亚洲欧美精品综合久久99| 伦理电影大哥的女人| 久久久久久久久久黄片| 热99re8久久精品国产| 91九色精品人成在线观看| 亚洲国产精品999在线| 狠狠狠狠99中文字幕| 久久伊人香网站| 日本与韩国留学比较| 精品熟女少妇八av免费久了| 亚洲国产高清在线一区二区三| 国产精品久久久久久人妻精品电影| 国产伦一二天堂av在线观看| 久久精品综合一区二区三区| 窝窝影院91人妻| 88av欧美| 99热这里只有是精品50| 国产欧美日韩一区二区三| 欧美另类亚洲清纯唯美| 3wmmmm亚洲av在线观看| 91狼人影院| 琪琪午夜伦伦电影理论片6080| 亚洲在线自拍视频| 日本精品一区二区三区蜜桃| 天堂影院成人在线观看| 国产欧美日韩一区二区三| 欧美极品一区二区三区四区| 3wmmmm亚洲av在线观看| 亚洲欧美日韩高清专用| 亚洲一区二区三区不卡视频| 国产不卡一卡二| 欧美成人性av电影在线观看| 99热这里只有精品一区| 三级国产精品欧美在线观看| 国产成人福利小说| 麻豆国产av国片精品| 国产伦在线观看视频一区| 18禁黄网站禁片免费观看直播| 一本一本综合久久| 免费看光身美女| 国产私拍福利视频在线观看| 国产淫片久久久久久久久 | 亚洲中文日韩欧美视频| 一级a爱片免费观看的视频| 午夜福利在线观看吧| 少妇的逼水好多| 少妇人妻一区二区三区视频| 99国产综合亚洲精品| av黄色大香蕉| 波多野结衣高清无吗| 老鸭窝网址在线观看| 日日夜夜操网爽| 3wmmmm亚洲av在线观看| 99riav亚洲国产免费| 天堂网av新在线| 久久国产乱子免费精品| 男插女下体视频免费在线播放| 午夜免费男女啪啪视频观看 | 亚洲在线自拍视频| 午夜影院日韩av| 一边摸一边抽搐一进一小说| 国产伦在线观看视频一区| 99在线人妻在线中文字幕| 国产精品久久电影中文字幕| 精品人妻偷拍中文字幕| 51国产日韩欧美| 动漫黄色视频在线观看| 免费大片18禁| 人妻丰满熟妇av一区二区三区| 欧美日本亚洲视频在线播放| 国模一区二区三区四区视频| 99热精品在线国产| 日韩中字成人| 在线观看午夜福利视频| 日日摸夜夜添夜夜添小说| 色噜噜av男人的天堂激情| 可以在线观看的亚洲视频| 变态另类丝袜制服| 99在线视频只有这里精品首页| 精品不卡国产一区二区三区| 宅男免费午夜| 精品99又大又爽又粗少妇毛片 | 欧美日本亚洲视频在线播放| 成年人黄色毛片网站| 国产白丝娇喘喷水9色精品| 国内毛片毛片毛片毛片毛片| 99热这里只有是精品50| eeuss影院久久| 国产亚洲精品久久久com| 国产伦一二天堂av在线观看| 亚洲国产欧洲综合997久久,| 精品日产1卡2卡| 人妻丰满熟妇av一区二区三区| 精品国内亚洲2022精品成人| 日韩欧美 国产精品| 69人妻影院| 九色国产91popny在线| 久久精品91蜜桃| 岛国在线免费视频观看| 淫妇啪啪啪对白视频| 国产不卡一卡二| 国内精品久久久久久久电影| 夜夜看夜夜爽夜夜摸| 国产黄a三级三级三级人| bbb黄色大片| 日韩中文字幕欧美一区二区| 女生性感内裤真人,穿戴方法视频| 国产69精品久久久久777片| 动漫黄色视频在线观看| 久久久久久大精品| 亚洲第一电影网av| 午夜福利在线在线| 色视频www国产| 嫩草影院精品99| 在线看三级毛片| 国产一区二区三区视频了| 欧美精品国产亚洲| 亚洲第一电影网av| 午夜影院日韩av| 亚洲国产色片| 韩国av一区二区三区四区| 天堂√8在线中文| 内地一区二区视频在线| 夜夜夜夜夜久久久久| 欧美高清性xxxxhd video| 亚洲av不卡在线观看| 日本黄大片高清| 老鸭窝网址在线观看| 国产精品国产高清国产av| 极品教师在线免费播放| 免费观看精品视频网站| 亚洲乱码一区二区免费版| 免费在线观看亚洲国产| 亚洲av五月六月丁香网| 国产精品爽爽va在线观看网站| av在线老鸭窝| 免费电影在线观看免费观看| 亚洲人成网站在线播| 91av网一区二区| 国产日本99.免费观看| 日本黄色视频三级网站网址| 免费人成视频x8x8入口观看| 国产毛片a区久久久久| 免费大片18禁| 在线播放国产精品三级| 亚洲美女黄片视频| 国产真实乱freesex| 亚洲 欧美 日韩 在线 免费| 一级毛片久久久久久久久女| 国产在线男女| 长腿黑丝高跟| 国产aⅴ精品一区二区三区波| 男女做爰动态图高潮gif福利片| 成人亚洲精品av一区二区| 丁香欧美五月| 午夜久久久久精精品| 精品久久久久久久久亚洲 | 成人无遮挡网站| 搞女人的毛片| 亚洲无线在线观看| 高潮久久久久久久久久久不卡| 久久99热这里只有精品18| 亚洲av电影不卡..在线观看| 日韩欧美精品v在线| 99热6这里只有精品| 又粗又爽又猛毛片免费看| 麻豆成人午夜福利视频| 成年女人看的毛片在线观看| 最后的刺客免费高清国语| 黄色一级大片看看| 免费大片18禁| 国产精品人妻久久久久久| 九九热线精品视视频播放| 日本一本二区三区精品| www.色视频.com| 免费黄网站久久成人精品 | 国产亚洲欧美98| 亚洲av成人不卡在线观看播放网| 国产成人影院久久av| av天堂中文字幕网| 99久久无色码亚洲精品果冻| 亚洲午夜理论影院| 国产三级黄色录像| 午夜精品一区二区三区免费看| 亚洲美女视频黄频| 国产精品伦人一区二区| 国产精品久久久久久亚洲av鲁大| 亚洲五月婷婷丁香| 成人高潮视频无遮挡免费网站| 久久久久久大精品| 99久久精品一区二区三区| 美女高潮喷水抽搐中文字幕| 精品日产1卡2卡| 亚洲国产精品999在线| 国产亚洲欧美98| 99国产极品粉嫩在线观看| 亚洲欧美激情综合另类| 99久久久亚洲精品蜜臀av| 真人一进一出gif抽搐免费| 中文亚洲av片在线观看爽| 精品久久久久久久久av| 亚洲欧美日韩高清在线视频| 我的女老师完整版在线观看| 免费黄网站久久成人精品 | 欧美丝袜亚洲另类 | 日本成人三级电影网站| 国模一区二区三区四区视频| 又紧又爽又黄一区二区| 老鸭窝网址在线观看| 亚洲av五月六月丁香网| 91久久精品国产一区二区成人| 成人精品一区二区免费| 熟妇人妻久久中文字幕3abv| 日本精品一区二区三区蜜桃| 午夜福利成人在线免费观看| av在线观看视频网站免费| 亚洲欧美激情综合另类| 国产爱豆传媒在线观看| 午夜精品在线福利| 亚洲在线自拍视频| 日本黄色视频三级网站网址| 国产精品久久视频播放| 一个人看视频在线观看www免费| 综合色av麻豆| 国产亚洲精品综合一区在线观看| 乱人视频在线观看| 亚洲无线观看免费| 久久精品影院6| 淫妇啪啪啪对白视频| 日韩欧美三级三区| 淫妇啪啪啪对白视频| 日韩欧美三级三区| 亚洲人成网站高清观看| 波多野结衣高清作品| 成熟少妇高潮喷水视频| 婷婷色综合大香蕉| 欧美3d第一页| 国产精品综合久久久久久久免费| 能在线免费观看的黄片| 老熟妇仑乱视频hdxx| 午夜精品久久久久久毛片777| 91字幕亚洲| 亚洲人成伊人成综合网2020| 亚洲成人久久性| 欧美在线一区亚洲| 一本综合久久免费| 久久久精品欧美日韩精品| 看黄色毛片网站| 五月玫瑰六月丁香| 中文字幕人妻熟人妻熟丝袜美| 我的女老师完整版在线观看| 国产在线精品亚洲第一网站| 97超视频在线观看视频| 精品久久久久久久久久久久久| 男女做爰动态图高潮gif福利片| 亚洲第一欧美日韩一区二区三区| 免费看a级黄色片| 午夜福利视频1000在线观看| 九九在线视频观看精品| 俺也久久电影网| 国内精品美女久久久久久| 成人av在线播放网站| 我的老师免费观看完整版| 97热精品久久久久久|