• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Constructing Collective Signature Schemes Using Problem of Finding Roots Modulo

    2022-08-24 12:56:02TuanNguyenKimDuyHoNgocandNikolayMoldovyan
    Computers Materials&Continua 2022年7期

    Tuan Nguyen Kim, Duy Ho Ngocand Nikolay A.Moldovyan

    1School of Computer Science, Duy Tan University, Da Nang, Vietnam

    2Department of Information Technology, Ha Noi, Vietnam

    3ITMO University, St.Petersburg, Russia

    Abstract: Digital signature schemes are often built based on the difficulty of the discrete logarithm problems, of the problem of factor analysis, of the problem of finding the roots modulo of large primes or a combination of the difficult problems mentioned above.In this paper, we use the new difficult problem, which is to find the wthroot in the finite ground field GF(p) to build representative collective signature schemes, but the chosen modulo p has a special structure distinct p = Nt0t1t2+ 1, where N is an even number and t0, t1, t2 are prime numbers of equal magnitude, about 80 bits.The characteristics of the proposed scheme are: i) The private key of each signer consists of 2 components (K1, K2), randomly selected, but the public key has only one component (Y) calculated by the formula; w1= t0t1 andw2= t0t2;andii)The generated signature consists of a set of 3 components(e, S1, S2).We use the technique of hiding the signer’s public key Y, which is the coefficient λ generated by the group nanager, in the process of forming the group signature and representative collective signature to enhance the privacy of all members of the signing collective.

    Keywords: Computing roots; finding roots modulo; collective signature; signing collective; signing group

    1 Introduction

    Digital signatures [1] play an important role in authentication systems in today’s cyberspace.Other network security services such as ensuring the integrity of information transmitted on the network,preventing the disclaimer of responsibility of a communication partner, etc also need the support of digital signatures [2].It can be said that digital signatures contribute to making cyberspace safer and more reliable.Therefore, digital signatures and digital signature schemes are increasingly interested in research by cryptographic scientists.

    Digital signatures is not only used to authenticate a single signer, but it can also support authentication for a collective, or a group, consisting of many different members.These people work together to create a single signature that represents an entire signing group or a group of signatures.Currently, there are many forms of digital signatures and digital signature schemes, in order to meet many different authentication models, which have been researched, published and applied in practice such as: Single digital signatures, group digital signatures [3-6], collective digital signatures [7-9], blind digital signatures [10,11], blind collective digital signatures [12], representative collective signatures[13].The types of signatures generated by a set of signers are often referred to as multi-signatures[14,15].

    The group signature is a signature representing a signing group, the signature formation is controlled by the group manager, the group manager’s public key is used to verify the validity of the group signature of the signing group.The collective signature is a signature that represents a signing collective, signature formation is done by all members of the collective, the public key is used to check the validity of the collective signature is formed the public key of all members who participated in creating the signature.A collective signature on document M is considered valid when it is formed by the participation of all members of that signing collective.Representative collective signatures is a new formof collective signature, we rely on the advantages of the group signature scheme and the collective signature scheme to develop the representative collective signature scheme.

    Arepresentative collective signature [8,9] is formed froma signing collective consisting of: i)Many groups of members, called signing groups, each group is represented by a group manager; and ii) A number of single individuals, known as individual signers, who do not belong to any group, but are functionally equivalent to the group leaders in this collective.Thus, a single representative collective signature can authenticate allmembers of amulti-level functional collective who are the creators of this representative collective signature.There are three difficult problems commonly used to build digital signature schemes, which are: i) The problem of parsing a composite number into prime factors [16]; ii) Discrete logarithm problem on prime finite field [17]; and iii) Discrete logarithm problem on Elliptic curves [18,19].

    The problem of finding modulo roots in finite fields is a new difficult problem, introduced by Nikolay A.Moldovyan in [17].According to the author, the problem of finding thekthprime modulo root (with a prime modulo being a large primep, has the special structurep=Nk2+1, |p|≥1024, N being an even number and k is prime, |k|≥160) is a hard problem, the estimated difficulty isO.Digital signature schemes built on this difficult problem can achieve security level 280, however, the time cost of signature generation and signature checking is an issue that needs to be considered for improvement.According to Nikolay A.Moldovyan, this time cost limitation can be overcome if the difficult problem of finding prime modulo roots is considered in a finite field, with p having the following structurep=Nt0t1t2+ 1, where N is an even number;t0,t1,t2are prime numbers of the same magnitude as 80 bits.

    The key pair of the signer in the case ofp=NK2+ 1 is (x,y), the private keyxis chosen at random, the public keyyis calculated by the formulay=xkmod p.But in casep=Nt0t1t2+1 is (K1,K2) andY).That is, the private key consists of two componentsK1andK2, the public key is still one component Y.This is the difference of the signature schemes described in this paper.

    In this paper, we use the difficult problem of finding roots modulo in a finite ground field, with a prime modulopwith the structurep=Nt0t1t2+1 and a single signature scheme described by Nikolay A.Moldovyan in [20] to build the collective signature scheme and the group signature scheme.From these two basic schemes, we propose and build two types of representative collective signature scheme,proposed by us: i) The collective signature scheme for many signing groups (the RCS.01-3 scheme);and ii) The collective signature scheme for many signing groups and many individual signers (the RCS.02-3 scheme).These schemes fully inherit the security advantages of the newly created difficult problem and the attack resistance of the basic signature scheme built by Nikolay A.Moldovyan.

    2 Constructing the Related Basis Digital Signature Schemes

    In this part, we use the problem of finding roots modulo in the finite ground field, with modulo p with the structurep=Nt0t1t2+ 1 [20], to build a collective digital signature scheme and a group digital signature scheme.These are the two basic signature schemes that we use to build the proposed collective digital signature schemes.

    2.1 The Collective Signature Scheme Based on Problem of Finding Roots Modulo (The CDS-2 Scheme)

    Assume there is a collective ofmmembers who sign the document M.The private keys and public keys of each signer in this signing collective are (K1i,K2i),K1i<p,K2i<p, andYi=Kw11iKw22i, withw1=t0t1,w2=t0t2,t0≈t1≈t2≈80 bits andi= 1, 2,...,m.Note that the signer’s private key is a tuple of two components.

    The collective public key used in the verification of the collective signature is calculated by the formulaY=∏mi=1Yimod p.FHis a pre-specified one-way secure hash function.

    The process of checking the validity of a collective signature is the same as that of an individual signature [20].The following are the procedures of the scheme:

    ?The procedure for generating the collective digital signature on the document M

    Includes the following stages:

    1.Each i-thsigner performs the following steps:

    - Generate pairs of random numbersT1iandT2i(act as a pseudo-secret key)

    - Calculate the value ofRiaccording to the formula:

    - SendRito all other signers in the signing collective

    2.A certain signer, or all, in the signing collective does:

    - Calculate the valueRaccording to the formula:

    R acts as the general random component of the signing collective with the contribution of the random componentsRiof each member of this collective.

    - Calculate the valueeaccording to the formula:

    - Sendeto all other signers in the signing collective

    eis the first element of the collective signature.

    3.Each i-th signer goes on to:- Calculate their share signature componentS1iandS2iaccording to the formulas:

    - SendS1iandS2ito all other signers in the signing collective

    4.A certain signer, or all, in the signing collective does the final job: Calculate the second componentS1and the third componentS2of the collective signature according to the formulas:

    So the triple value (e,S1,S2) is the collective signature of the signing collective consisting ofmsigners on document M.

    ?The procedure for verification the collective digital signature on the document M

    To check the validity of the signature received with the document M, the verifier performs the following steps:

    1.Calculate the value of the collective public keyYaccording to the formula:

    2.Calculate the value ofR′according to the formula:

    3.Calculate the value ofe′according to the formula:

    4.Comparee′withe.Ife′=e: The received signature is valid; Otherwise, it is invalid and will be rejected.

    ?Proof of the correctness of the CDS-2 scheme:

    To prove the correctness of this scheme, we need to prove the existence of the test expressione′=ein the signature checking procedure.

    Conspicuously, the test expressione′=ealways exists.

    Indeed:

    Thus, the test expressione′=ealways exists: This proves that the correctness of the signature check procedure, or the correctness of the CDS-2 scheme, is always guaranteed.

    2.2 The Group Signature Scheme Based on Problem of Finding Roots Modulo (The GDS-2 Scheme)

    Assume there is a group ofmmembers who sign the document M.The private keys and the public key of each signer in this signing group are (K1i,K2i),K1i<p,K2i<p, and, withw1=t0t1,w2=t0t2,t0≈t1≈t2≈80 bits andi= 1, 2,...,m.The private keys and the public key of the group manager (GM) are<p,w1=t0t1,w2=t0t2and.

    The group public key used in the verification of the group signature is calculated by the formulamod p.FHis a pre-specified one-way secure hash function.

    The process of checking the validity of a group signature is the same as that of an individual signature [20].The following are the procedures of the scheme:

    ?The procedure for generating the group digital signature on the document M

    Includes the following steps:

    1.The GM does the following:

    - Calculate the hash value of the document M using the formula:

    - Calculate mask coefficients λifor each signer in the group sign according to the formula:

    - Send λito each corresponding signeri

    - Calculate the first component of the group signature

    2.Each i-thsigner in the signing group does:

    - Randomly generate pairs of numbersT1iandT2iand then calculateRiaccording to the formula:

    - Send theRivalue to the group manager

    3.The GM continues to make:

    - Generates a random value pairandand calculate the valuesR′,Randeaccording to the formulas:

    where δ is a prime number of length |δ| = 160 bits.

    -eis the second component of the group signature.

    - Send the value ofeto all signers in the signing group

    4.Each signericontinues to do the following:

    - Calculate the shared signature component ofS1i,S2iaccording to the formula:

    - Send the valueS1i,S2ito other signers in the signing group

    5.The GM does the final work:

    - Check the correctness of the shared signatureS1i,S2iof all signers in the signing group using the formula:

    - If all pairs of numbersS1i,S2iare satisfied: Calculate the signature component of a personal share according to the following formulas:

    - Calculate the third componentS1and the fourthS2of the group signature according to the following formulas:

    So the set of values (U,e,S1,S2) is the group signature of the signing group on the document M.

    ?The procedure for verification the group digital signature on the document M

    To check the validity of the signature received with the document M, the verifier performs the following steps:

    1.Calculate the value of the group public keyYaccording to the formula:

    2.Calculate the value ofR*according to the formula:

    3.Calculate the value ofe*according to the formula:

    4.Compare the value ofe*withe.Ife*=e:The received signature is valid;Otherwise, the received signature is invalid, it is rejected.

    ?Proof of the correctness of the GDS-2 scheme:

    To prove the correctness of this scheme, we only need to prove the existence of the check expressione*=ein the signature check procedure.

    Conspicuously, the test expressione*=ealways exists.

    We have:

    So the expressione*=ealways exists: This proves that the correctness of the signature check procedure, or the correctness of the GDS-2 scheme, is always guaranteed.

    3 Constructing the Proposed Collective Digital Signature Schemes Based on Problem of Finding Roots Modulo in the Finite Ground Field

    In this section, we use the collective digital signature scheme and the group signature scheme described in Section 2 as the basis schemes to build two types of the proposed collective signature scheme:i)The collective digital signature scheme for many signing groups; and ii) The collective digital signature scheme for many signing groups and many individual signers.

    3.1 Constructing the Collective Digital Signature Scheme for Signing Groups (The RCS.01-3 Scheme)

    This section uses the two schemes just described above as the basis to build a representative collective signature scheme, the first type: The collective signature for many (g) signing groups.

    This scheme allows the creation of a collective signature on the document M which represents a signing collective withgsigning groups, each of which consists ofmmembers, which is controlled by the group manager (GM).The signature formation process is run by the group managers.

    The input parameters, public keys, and private keys are selected, calculated as the base schemes above.The following are the procedures of the scheme:

    ?The procedure for generating the collective digital signature for g signing groups on the document M

    1.Each GM in the signing collective does the following:

    - Calculate mask coefficients λjifor the signers in the j-thsigning group according to the formula:

    (λjiis the mask coefficient of the i-thsigner in the j-thsigning group)

    - Calculate the value of the componentUjof the j-thsigning group according to the formula:

    Ujiis considered as the shared value of the j-thsigning group in the first component of the collective signature for the signing groups.

    - Calculate the random componentRjusing the formula:

    - SendUjandRjvalues to all other GMs in the signing collective

    2.A certain GM in the singing collective, or all, computes the values of theU,Randecomponents of the collective signature according to the following formulas:

    and

    where δ is a large prime |δ| = 160 bits.

    Uandeare the first and second components of the collective signature.

    3.Each GM in the signing collective continues to do:

    - Calculate the shared signatureS1j,S2jof the j-thsigning group according to the formula:

    withSjiis the shared signature of the i-thindividual in the j-thgroup.

    - SendS1j,S2jto other GMs in the signing collective

    4.A certain GM in the signing collective, or all, does the following:

    - Check the correctness of the shared signatureS1i,S2iof all signing groups in the signing collective using the formula:

    - If allS1i,S2iare satisfied: Calculate the third and fourth componentsS1i,S2iof the collective signature according to the formulas:

    So set of values (U,e,S1,S2) is the collective signature ofgsigning groups on the documentM.

    ?The procedure for verification the collective digital signature for g signing groups on the document M

    To check the validity of the signature received with the document M, the verifier performs the following steps:

    1.Calculate the collective public key of the signing collectiveYcolaccording to the formula:

    2.Calculate the value of the random componentR*according to the formula:

    3.Calculate the value ofe*according to the formula:

    4.Comparee*withe.Ife*=e: The received signature is valid; Otherwise, the received signature is invalid, it is rejected.

    ?Proof of the correctness of the RCS.01-3 scheme:

    The precision of this representative collective signature scheme is shown through: i) The existence of a shared signature verification formulaSjishared by the signing team leadersRj; and ii) Existence of the test expressione*=ein the signature check procedure.Specifically as follows:

    a) Prove the correctness of the shared signature check formula:

    It is easy to see that the formula for checking shared signatureSjishared by team leaders signingRjalways exists.Indeed:

    b) Proof of correctness of the signature check procedure:

    Conspicuously, the signature check expressione*=ealways exists.

    We have:

    Because ofR*=Rsoe*=FH(M||R*||U) =FH(M||R||U) =e.

    So the expressione*=ealways exists: This proves that the correctness of the signature check procedure is always guaranteed.

    From (a) and (b): The correctness of the RCS.01-3 scheme is guaranteed.

    3.2 Constructing the Collective Digital Signature Scheme for Signing Groups and Individual Signers(The RCS.02-3 Scheme)

    This section uses the two schemes just described above as a basis to build a representative collective signature scheme, the second type: The collective signatures for many (g) signing groups andmany (m) individual signers.

    This scheme allows the creation of a collective signature on document M that represents a signing collective with m individual signers and g signing groups, each of which consists of m members which is controlled by the group manager (GM).The signature formation process is run by the group managers and individual signers.

    The input parameters, public keys, and private keys are selected, calculated as the base schemes above.The following are the procedures of the scheme:

    ?The procedure for generating the collective digital signature for g signing groups and m individual signers on the document M

    Includes the following steps:

    1a.Each GM in the signing collective does the following:

    - Generate mask coefficient λjifor the signers in the j-thsigning group according to the formula (23).

    (λjiis the mask coefficient of the i-thsigner in the j-thsigning group)

    - Calculate the value of the componentUjof the j-thsign group according to the formula:

    Ujis the shared member of the j-thsigning group to form the first part of the collective signature.

    - Calculate the random parameterRjof the j-thsigned group according to the formula:

    Rjis a shared member of the j-thsigning group to generate a random parameter of the collective signature..

    - SendUjandRjvalues to all other managers and individual signers in the signing collective.

    1b.Each individual who signs the j-thperforms the following tasks:

    - Choose 2 random numbersT1jandT2jand calculate the random valueRjaccording to the formula:

    - Send the valueRjto all signers GMs and other individual signers in the signing collective.

    2.A GM or a certain individual signing in the collective calculates the values ofU,Randeaccording to the following formulas:

    where δ is a large prime (|δ| = 160bits);Uj= 1 whenj=g+ 1,g+ 2, ...,g+m).

    Uandeare the first and second components of the group signature.

    3a.Each GM in the signing collective continues to do:

    - Calculate the shared componentS1j,S2jof groupjaccording to the formula:

    withS1ji,S2jiis the shared component of the i-thsigner in the j-thgroup.

    - SendS1j,S2jfor GMs and other individual signers in the signing collective.

    3b.Each individual signer in the signing collective continues to do:

    (the j-th;j=g+ 1,g+ 2, ...,g+m)

    - Calculate the share componentS1j,S2jaccording to the formula:

    - SendS1j,S2jto other GMs and individual signers in the signing collective.

    4.A GM or an individual in the signing collective doing:

    - Check the validity of eachS1j,S2jaccording to the formulas:

    withj= 1, 2, ...,g

    and

    withj=g+ 1,g+ 2, ...,g+m

    - If all are satisfied: The third component of the group signature will be calculated according to the formulas:

    So the set of values (U, e, S1,S2) is the representative collective signature of a collective consisting ofgsigning groups andmindividual signers on the document M.This type of signature is also known as collective signature shared by multiple groups and signed by many individuals.It represents this collective signing.

    ?The procedure for generating the collective digital signature for g signing groups and m individual signers on the document M

    To check the validity of the signature received with the document M, the verifier performs the following steps:

    1.Calculate the collective public key of the signing collective according to the formula:

    2.Calculate the value of the random parameterR*according to the formula:

    3.Calculatee*using to the formula:

    4.Comparee*withe.Ife*=e: The signature received is valid; Otherwise, the received signature is invalid, it is rejected.

    ?Proof of the correctness of the RCS.02-3 scheme:

    The precision of this representative collective signature scheme is shown through: i) The existence of a formula to check the shared signature Sjof each signing group; ii) The existence of the signature test formula shared Sjby each individual signerRand iii) The existence of the test expressione*=e.Specifically as follows:

    a) The correctness of the formula to check the shared signature of each group leader:

    It is easy to see that the formula for checking shared signatureSjishared by team leaders signingRjalways exists.Indeed:

    b) The correctness of the formula to check the shared signature per signer:

    It is easy to see that the formula for checking the shared signatureSishared by theRsigning team leaders always exists.Indeed:

    c) The correctness of the representative collective signature check procedure:

    Conspicuously, the signature check expressione*=ealways exists.

    We see:

    and calculate:

    So the expressione*=ealways exists.This proves that the correctness of the signature check procedure, or the correctness of the RCS.02-3 scheme, is always guaranteed.

    4 Security Analysis and Performance Evaluation

    4.1 Security Advantages of the Proposed Collective Signature Schemes

    The group signature scheme we described in Section 2.2 has the following security advantages:

    ?As the scheme is based on the properties of the prime modulo root problem in a finite field, it inherits the safety level of this difficult problem.The attack resistance of the GDS-2 scheme is completely similar to the basic scheme described by Nikolay A.Moldovyan in [20].To circumvent this scheme, the attacker must find the prime modulo roots to simultaneously determine the two secret valuesK1andK2.

    ?The public key of all signers, including the group manager, is“masked”by the mask parameter λ.The attacker will not be able to determine who in the signing group participated in the signing to form the group signature.

    ?The U component of the group signature contains information about all members of a signing group who took part in forming the group signature for this signing group.Consequently, when there is a dispute about the group signature, the group leader will be able to identify the signer easily later and resist the“disclaimer”.

    ?There is no need to exchange or share security values, private keys, or secret keys between members of a signing group or between members of a signing group with the manager.Therefore, the Internet environment is sufficient to implement this scheme.In addition, the scheme is also easy to deploy on top of existing PKI (Public Key Infrastructure) systems [21].

    ?As shown in the 5th step of the signature generation procedure, a group manager only proceeds when he or she believes or has verified that all signatures participating in creating the collective signature are valid.The operation generates the final component(S1,S2)of the group signature,by adding the shared signature of the group leader to the product of the shared signatures of all members.This makes it very hard to simulate member signings, or members signing each other’s signatures and also shows the representativeness as well as high responsibility of the team manager.

    The representative collective signature schemes built in this paper use the CDS-2 collective signature scheme and the GDS-2 group signature scheme as the basic scheme, so it also has the advantages of security and resistance to attacks like these schemes.

    4.2 Performance of the Proposed Collective Signature Schemes

    We evaluate the computational performance of the proposed representative collective signature schemes by calculating the time cost that the scheme takes for the signature generation process(Signature generation procedure) and the need for the signature verification process (Signature verification procedure).The time costs of representative collective signature schemes proposed in this paper are shown in Tab.1.

    Table 1: Time cost of the proposed collective signature scheme: RCS.01-3 and RCS.02-3

    Notations:Th: Time cost of a hash operation inZp;Ts: Time cost of a scalar multiplication inZp;Tinv: Time cost of a inverse operation inZp;Te: Time cost of an exponent operation inZp;Tm:Time cost of a modular multiplication inZp.

    According to [22]: Th≈Tm, Ts≈29Tm, Tinv≈240Tm, Te≈240Tm,Tsqrt≈290Tm.

    Information from Tab.1 shows that the time cost for signature generation and signature checking of a proposed representative signature scheme is not much larger when compared to the new collective digital signature schemes in [8].

    5 Disscusion

    ?The representative collective signature is a new form of collective digital signature, it was proposed by us in 2019 and has been built on many difficult problems and/or different digital signature standards.The research results of this paper show that the proposed scheme can be built on a customized form of a new difficult problem, the problem of finding roots modulo in a finite ground field, with a two-component private key.This proves that the availability of a representative collective signature scheme is very high.

    ?The signature generation procedure in the proposed representative collective signature scheme shows that it has all the security advantages of the collective signature generation procedure and the group signature generation procedure.This is one of the advantages of the representative collective signature schemes proposed by us.

    ?The basic requirement for multi-signature schemes is to record the information of everyone who participated in creating the signature of the group or the collective.This information is needed for the identification of the signer and against the signer’s“disclaimer of responsibility”in the future.The group signature schemes and the representative collective signature schemes built here have met this requirement, the signer information is contained in the first component of the signature, the U component.The algorithm to identify the signer from the information contained in the U has been described in [6].

    ?The use of the U-component of the representative collective signature is necessary, but this increases the signature size.This is considered a limitation of the proposed scheme.We have proposed and built a two-component representative collective signature scheme, but we can only implement the scheme based on discrete logarithm problems.We are working to build this improved scheme based on the problem of finding roots modulo large primes.

    6 Conclusion

    Thus, in this paper, we build a collective signature scheme and a group signature scheme using the single digital signature protocol described in [20] via a two-component private key (K1,K2).Based on their computational difficulty, all three schemes are formed in order to find the modulo root of a large prime, with a prime modulop=Nt0t1t2+ 1, in a finite ground field.

    The two signature schemes described above can then be used as the basis for building two different types of collective signature schemes: i) The collective digital signature scheme for many signing groups; and ii) The collective digital signature scheme for many signing groups and many individual signers.These two schemes fully inherit the attack resistance of the single signature scheme in [20] and the difficulty of finding the modulo root in a finite prime field, so the security of the scheme is always guaranteed.For all schemes built in this study, if the chosen modulo is 1024 bits, their security level will be 80 bits.

    In this paper, we analyze and evaluate the proposed schemes based on their security benefits and computational performance.In the future, the design of a collective signature scheme will be based on the computational difficulty of finding roots modulo on the elliptic curve.

    Funding Statement:We received funding for this research from Duy Tan University,Danang,Vietnam.https://duytan.edu.vn/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    丁香六月天网| 久久人人爽av亚洲精品天堂| 久久99热这里只频精品6学生| 国产高清国产精品国产三级| 91老司机精品| 久久午夜综合久久蜜桃| 日本av手机在线免费观看| 亚洲精品国产色婷婷电影| 成人漫画全彩无遮挡| 久久精品久久精品一区二区三区| 中文字幕高清在线视频| 久久精品国产综合久久久| 嫩草影院入口| 午夜福利影视在线免费观看| √禁漫天堂资源中文www| av网站在线播放免费| 国产精品三级大全| 欧美中文综合在线视频| 久久午夜综合久久蜜桃| 天堂8中文在线网| 天美传媒精品一区二区| 中文字幕高清在线视频| 人妻人人澡人人爽人人| 国产精品一区二区精品视频观看| 男人爽女人下面视频在线观看| 侵犯人妻中文字幕一二三四区| 亚洲欧美日韩另类电影网站| 超碰97精品在线观看| 日韩制服丝袜自拍偷拍| 亚洲国产毛片av蜜桃av| 国产午夜精品一二区理论片| 久久鲁丝午夜福利片| 国产精品av久久久久免费| 天天躁夜夜躁狠狠久久av| 99香蕉大伊视频| 精品久久蜜臀av无| 成人影院久久| 精品少妇久久久久久888优播| 热re99久久国产66热| 久久久久网色| 免费看av在线观看网站| av线在线观看网站| 欧美黑人精品巨大| 不卡视频在线观看欧美| 久久精品人人爽人人爽视色| 满18在线观看网站| 亚洲精品自拍成人| 国产国语露脸激情在线看| 亚洲成国产人片在线观看| 欧美精品av麻豆av| 91老司机精品| 老司机深夜福利视频在线观看 | 在线天堂中文资源库| 一级毛片黄色毛片免费观看视频| 国产女主播在线喷水免费视频网站| 伊人亚洲综合成人网| 视频在线观看一区二区三区| 成人国产麻豆网| 亚洲熟女精品中文字幕| 七月丁香在线播放| 一本色道久久久久久精品综合| 国产高清国产精品国产三级| 大片免费播放器 马上看| 午夜激情av网站| 飞空精品影院首页| 十八禁高潮呻吟视频| 美女中出高潮动态图| 欧美人与善性xxx| 久久久久久久久久久免费av| 伊人亚洲综合成人网| 久久精品久久久久久噜噜老黄| 狂野欧美激情性xxxx| 成人18禁高潮啪啪吃奶动态图| 美女福利国产在线| 在线 av 中文字幕| 美女视频免费永久观看网站| 国产日韩欧美亚洲二区| kizo精华| 欧美日韩一区二区视频在线观看视频在线| 亚洲av国产av综合av卡| 精品一区二区免费观看| www.熟女人妻精品国产| 亚洲国产欧美网| 777久久人妻少妇嫩草av网站| 女人被躁到高潮嗷嗷叫费观| 日韩 欧美 亚洲 中文字幕| 老汉色av国产亚洲站长工具| 国产伦人伦偷精品视频| 日韩一本色道免费dvd| 精品久久久久久电影网| 国产成人91sexporn| 国产片内射在线| 欧美乱码精品一区二区三区| 男人爽女人下面视频在线观看| 亚洲美女搞黄在线观看| 成人午夜精彩视频在线观看| 亚洲成色77777| 中文欧美无线码| 中文字幕色久视频| 久久久久久久久免费视频了| 我要看黄色一级片免费的| 亚洲熟女毛片儿| 国产免费又黄又爽又色| 欧美最新免费一区二区三区| 中文欧美无线码| 一边亲一边摸免费视频| 丝袜美足系列| 国产无遮挡羞羞视频在线观看| 亚洲第一av免费看| av有码第一页| 婷婷色麻豆天堂久久| 777米奇影视久久| 国产成人免费无遮挡视频| 一级黄片播放器| 巨乳人妻的诱惑在线观看| 九草在线视频观看| 亚洲av国产av综合av卡| 亚洲精品乱久久久久久| 啦啦啦视频在线资源免费观看| 国产黄色视频一区二区在线观看| 亚洲精品一区蜜桃| 国产探花极品一区二区| 美女大奶头黄色视频| 精品一区二区三区四区五区乱码 | 久久性视频一级片| 最新在线观看一区二区三区 | 国产精品欧美亚洲77777| 亚洲婷婷狠狠爱综合网| 老汉色∧v一级毛片| 午夜福利一区二区在线看| 国产有黄有色有爽视频| 日本一区二区免费在线视频| 中文字幕最新亚洲高清| 五月天丁香电影| 97在线人人人人妻| 19禁男女啪啪无遮挡网站| 大香蕉久久成人网| 久久久国产一区二区| 无限看片的www在线观看| 久久久久久久国产电影| 久久久欧美国产精品| 亚洲精品aⅴ在线观看| 99热网站在线观看| 国产1区2区3区精品| 另类精品久久| 午夜免费男女啪啪视频观看| 亚洲国产欧美一区二区综合| 一级毛片 在线播放| 毛片一级片免费看久久久久| 建设人人有责人人尽责人人享有的| 国产xxxxx性猛交| 99国产综合亚洲精品| 操出白浆在线播放| 天堂8中文在线网| 国产亚洲av高清不卡| 国产xxxxx性猛交| 一级毛片黄色毛片免费观看视频| 成人国产麻豆网| 日日摸夜夜添夜夜爱| 国产一级毛片在线| 国产不卡av网站在线观看| 亚洲一码二码三码区别大吗| 少妇人妻久久综合中文| 一二三四中文在线观看免费高清| 日韩中文字幕欧美一区二区 | 美女高潮到喷水免费观看| 香蕉国产在线看| 欧美另类一区| 下体分泌物呈黄色| 欧美精品高潮呻吟av久久| 美女脱内裤让男人舔精品视频| 最黄视频免费看| 精品少妇久久久久久888优播| 丰满饥渴人妻一区二区三| 国产又爽黄色视频| 欧美日韩亚洲综合一区二区三区_| 在线观看免费午夜福利视频| 青青草视频在线视频观看| 黄网站色视频无遮挡免费观看| 国产又色又爽无遮挡免| a级毛片在线看网站| 日本猛色少妇xxxxx猛交久久| 免费日韩欧美在线观看| 亚洲国产毛片av蜜桃av| 国产av码专区亚洲av| 亚洲免费av在线视频| 午夜91福利影院| 97在线人人人人妻| 最近中文字幕2019免费版| 亚洲av成人精品一二三区| 高清不卡的av网站| 如何舔出高潮| 亚洲成av片中文字幕在线观看| 亚洲精品,欧美精品| 免费av中文字幕在线| 国产成人a∨麻豆精品| 国产乱来视频区| 精品国产一区二区三区四区第35| 亚洲第一区二区三区不卡| 日日撸夜夜添| 卡戴珊不雅视频在线播放| 高清欧美精品videossex| 在线观看人妻少妇| 精品少妇黑人巨大在线播放| 亚洲精品久久久久久婷婷小说| 欧美精品av麻豆av| 777久久人妻少妇嫩草av网站| 日本欧美视频一区| 国产熟女欧美一区二区| av福利片在线| 亚洲,一卡二卡三卡| 热re99久久精品国产66热6| 午夜福利,免费看| 啦啦啦 在线观看视频| 亚洲精品aⅴ在线观看| 精品一区二区三区四区五区乱码 | 久久人妻熟女aⅴ| 十分钟在线观看高清视频www| 精品少妇内射三级| 亚洲精品一区蜜桃| 国产在线免费精品| 欧美日韩视频精品一区| www.精华液| 亚洲一区中文字幕在线| 日韩一区二区视频免费看| 欧美激情极品国产一区二区三区| 最黄视频免费看| 久久久久久久久免费视频了| 老汉色∧v一级毛片| 国产在线视频一区二区| 制服诱惑二区| 久久久久久久精品精品| 久久久久精品性色| 夜夜骑夜夜射夜夜干| 丝瓜视频免费看黄片| 黑丝袜美女国产一区| 女人精品久久久久毛片| 午夜91福利影院| 搡老岳熟女国产| 悠悠久久av| 精品视频人人做人人爽| 亚洲第一区二区三区不卡| 亚洲精品乱久久久久久| 老司机深夜福利视频在线观看 | 久久综合国产亚洲精品| 成年人午夜在线观看视频| 国产色婷婷99| 母亲3免费完整高清在线观看| 亚洲一级一片aⅴ在线观看| 中文乱码字字幕精品一区二区三区| 国产成人系列免费观看| 国产免费福利视频在线观看| 国产成人免费观看mmmm| 午夜91福利影院| 一个人免费看片子| 亚洲七黄色美女视频| 国产一区亚洲一区在线观看| 日本欧美国产在线视频| 国产色婷婷99| 天堂中文最新版在线下载| 91老司机精品| av在线app专区| 中文字幕人妻丝袜制服| 国产一区二区 视频在线| 婷婷成人精品国产| 亚洲第一青青草原| 别揉我奶头~嗯~啊~动态视频 | 欧美av亚洲av综合av国产av | 欧美日韩国产mv在线观看视频| 日本91视频免费播放| 欧美日韩一区二区视频在线观看视频在线| 亚洲精品国产一区二区精华液| 大片电影免费在线观看免费| 中文字幕av电影在线播放| 亚洲精品国产av成人精品| 欧美在线黄色| 亚洲七黄色美女视频| 国产片内射在线| 99热全是精品| 国产毛片在线视频| 制服诱惑二区| 精品国产国语对白av| 日韩 欧美 亚洲 中文字幕| 亚洲一区二区三区欧美精品| 欧美国产精品一级二级三级| 日韩一区二区三区影片| 久久鲁丝午夜福利片| 99热网站在线观看| 亚洲一区中文字幕在线| 欧美激情 高清一区二区三区| 国产精品秋霞免费鲁丝片| 高清欧美精品videossex| 午夜福利一区二区在线看| 日韩av在线免费看完整版不卡| 最近中文字幕高清免费大全6| 国产在线一区二区三区精| 在线看a的网站| 国产一区二区 视频在线| 成年av动漫网址| 亚洲第一区二区三区不卡| 男女国产视频网站| 国产精品久久久久久久久免| 人体艺术视频欧美日本| 国产精品 欧美亚洲| 免费黄色在线免费观看| 欧美黑人精品巨大| 精品国产乱码久久久久久小说| 中文精品一卡2卡3卡4更新| 久久国产精品大桥未久av| 美女午夜性视频免费| 9热在线视频观看99| 欧美变态另类bdsm刘玥| 一区在线观看完整版| 一级毛片我不卡| avwww免费| 1024视频免费在线观看| 国产av国产精品国产| 十八禁高潮呻吟视频| 伊人亚洲综合成人网| av在线播放精品| 国产日韩欧美亚洲二区| 亚洲精品自拍成人| 久久99热这里只频精品6学生| 国产亚洲一区二区精品| 国产精品蜜桃在线观看| 黄色一级大片看看| 亚洲国产av影院在线观看| 777米奇影视久久| 亚洲国产最新在线播放| 国产精品久久久人人做人人爽| 国产 一区精品| 啦啦啦视频在线资源免费观看| 国产精品久久久久久精品电影小说| 免费不卡黄色视频| 波多野结衣一区麻豆| 欧美人与性动交α欧美软件| 999久久久国产精品视频| 精品国产超薄肉色丝袜足j| 伦理电影大哥的女人| 亚洲一码二码三码区别大吗| 国产高清国产精品国产三级| 丰满饥渴人妻一区二区三| 国产av码专区亚洲av| 亚洲精品国产区一区二| 美女福利国产在线| 女人高潮潮喷娇喘18禁视频| 久久99一区二区三区| 日本爱情动作片www.在线观看| 少妇精品久久久久久久| 亚洲人成电影观看| 亚洲成人手机| 老司机在亚洲福利影院| 啦啦啦 在线观看视频| 中文精品一卡2卡3卡4更新| 中文字幕精品免费在线观看视频| 成年人免费黄色播放视频| 日韩大片免费观看网站| 老司机在亚洲福利影院| 国产在线视频一区二区| 七月丁香在线播放| 水蜜桃什么品种好| 黑丝袜美女国产一区| 国产视频首页在线观看| 丝袜在线中文字幕| 成年人免费黄色播放视频| 大码成人一级视频| 丰满饥渴人妻一区二区三| 国产爽快片一区二区三区| 老司机影院毛片| 日本猛色少妇xxxxx猛交久久| 大码成人一级视频| 麻豆乱淫一区二区| 国产精品.久久久| 2018国产大陆天天弄谢| 午夜福利影视在线免费观看| 久久久精品94久久精品| 人人妻,人人澡人人爽秒播 | 成年av动漫网址| 亚洲人成网站在线观看播放| 一本—道久久a久久精品蜜桃钙片| 欧美日韩亚洲国产一区二区在线观看 | 国产97色在线日韩免费| 日本vs欧美在线观看视频| www日本在线高清视频| 精品酒店卫生间| 1024视频免费在线观看| 人妻人人澡人人爽人人| 精品一区二区三卡| 久久av网站| 精品午夜福利在线看| 国产精品免费视频内射| videosex国产| 91国产中文字幕| 一二三四在线观看免费中文在| 欧美激情极品国产一区二区三区| 日韩中文字幕视频在线看片| 一区二区三区激情视频| 亚洲第一区二区三区不卡| 91精品国产国语对白视频| 精品国产一区二区三区四区第35| 亚洲欧美精品自产自拍| 久久99热这里只频精品6学生| 成年动漫av网址| 亚洲精品视频女| 一二三四中文在线观看免费高清| 熟女av电影| 极品人妻少妇av视频| 黄网站色视频无遮挡免费观看| 国产精品国产三级国产专区5o| 男女之事视频高清在线观看 | 国产欧美亚洲国产| 国产男人的电影天堂91| www.自偷自拍.com| 国产福利在线免费观看视频| 国产精品一区二区在线不卡| 国产免费视频播放在线视频| 久久狼人影院| 麻豆精品久久久久久蜜桃| 尾随美女入室| 老司机影院毛片| 精品午夜福利在线看| 亚洲av成人不卡在线观看播放网 | 啦啦啦视频在线资源免费观看| 男女午夜视频在线观看| 观看av在线不卡| 在线观看www视频免费| 亚洲国产欧美一区二区综合| 国产一区二区 视频在线| 亚洲欧美激情在线| 亚洲激情五月婷婷啪啪| 欧美人与性动交α欧美软件| 极品少妇高潮喷水抽搐| a级毛片在线看网站| av不卡在线播放| 狂野欧美激情性bbbbbb| 久久精品人人爽人人爽视色| 少妇人妻久久综合中文| 亚洲精品中文字幕在线视频| 电影成人av| 五月天丁香电影| 一区二区日韩欧美中文字幕| 可以免费在线观看a视频的电影网站 | 亚洲自偷自拍图片 自拍| 看免费成人av毛片| 十分钟在线观看高清视频www| 亚洲精品国产av蜜桃| 极品少妇高潮喷水抽搐| 视频区图区小说| 久久久久精品久久久久真实原创| 999精品在线视频| 男的添女的下面高潮视频| 中文字幕精品免费在线观看视频| 嫩草影院入口| 黄色视频不卡| 人人澡人人妻人| 欧美黄色片欧美黄色片| 天堂中文最新版在线下载| 精品国产一区二区久久| 午夜免费鲁丝| 国产片特级美女逼逼视频| 夜夜骑夜夜射夜夜干| 午夜福利免费观看在线| 亚洲,一卡二卡三卡| 男人舔女人的私密视频| 亚洲熟女精品中文字幕| 777久久人妻少妇嫩草av网站| 国产av码专区亚洲av| 久久青草综合色| 久久毛片免费看一区二区三区| 久久99一区二区三区| 国产成人啪精品午夜网站| 久久国产亚洲av麻豆专区| 国产色婷婷99| 免费观看av网站的网址| 女人爽到高潮嗷嗷叫在线视频| 久久婷婷青草| 亚洲av福利一区| 99久久精品国产亚洲精品| 国产日韩欧美亚洲二区| 一级片免费观看大全| 亚洲欧美清纯卡通| 国产有黄有色有爽视频| 校园人妻丝袜中文字幕| 精品视频人人做人人爽| 免费不卡黄色视频| 少妇人妻 视频| 天天躁夜夜躁狠狠躁躁| 亚洲欧美精品自产自拍| 高清欧美精品videossex| 一区二区三区激情视频| 国产精品国产三级专区第一集| 国产精品免费视频内射| 两个人免费观看高清视频| 狂野欧美激情性xxxx| 一级爰片在线观看| 中文字幕色久视频| 亚洲欧美色中文字幕在线| 性少妇av在线| 精品亚洲成国产av| 色婷婷av一区二区三区视频| 飞空精品影院首页| 欧美xxⅹ黑人| 不卡av一区二区三区| 大陆偷拍与自拍| 精品一区在线观看国产| 在线观看免费视频网站a站| 精品久久蜜臀av无| 国产免费又黄又爽又色| 国产一区二区三区av在线| 建设人人有责人人尽责人人享有的| 国产成人精品久久二区二区91 | 日韩成人av中文字幕在线观看| 国产毛片在线视频| 午夜日本视频在线| 黄网站色视频无遮挡免费观看| 男的添女的下面高潮视频| 一级a爱视频在线免费观看| 国产一区二区三区综合在线观看| 搡老乐熟女国产| 宅男免费午夜| 伦理电影免费视频| 日韩一区二区视频免费看| 少妇被粗大猛烈的视频| 亚洲专区中文字幕在线 | 久久99热这里只频精品6学生| 老汉色av国产亚洲站长工具| 日本爱情动作片www.在线观看| 亚洲国产毛片av蜜桃av| 波多野结衣一区麻豆| 国产一级毛片在线| 欧美亚洲 丝袜 人妻 在线| 亚洲国产最新在线播放| 久久鲁丝午夜福利片| 亚洲成人手机| 叶爱在线成人免费视频播放| 国产成人免费观看mmmm| 搡老岳熟女国产| av片东京热男人的天堂| 亚洲国产欧美网| 日韩熟女老妇一区二区性免费视频| 亚洲成人手机| 丝袜美腿诱惑在线| 精品国产国语对白av| 久久久欧美国产精品| 国产精品一区二区在线不卡| 波多野结衣av一区二区av| 少妇被粗大猛烈的视频| 国产老妇伦熟女老妇高清| 欧美在线一区亚洲| 日韩 亚洲 欧美在线| 一级毛片黄色毛片免费观看视频| 色婷婷久久久亚洲欧美| 久久久国产欧美日韩av| 精品久久蜜臀av无| 精品视频人人做人人爽| 色综合欧美亚洲国产小说| 少妇被粗大的猛进出69影院| 精品一区在线观看国产| 国产一区有黄有色的免费视频| 在线观看免费午夜福利视频| 十八禁高潮呻吟视频| 大码成人一级视频| 九九爱精品视频在线观看| 18禁裸乳无遮挡动漫免费视频| 久久婷婷青草| 夫妻午夜视频| 国产爽快片一区二区三区| e午夜精品久久久久久久| 搡老岳熟女国产| 男女国产视频网站| 一区二区日韩欧美中文字幕| 天堂8中文在线网| av有码第一页| 国产精品久久久久成人av| 亚洲精品aⅴ在线观看| 久久人人爽av亚洲精品天堂| 国产成人精品在线电影| 看免费av毛片| 色网站视频免费| 99久国产av精品国产电影| 亚洲精品aⅴ在线观看| 天堂俺去俺来也www色官网| 欧美精品一区二区免费开放| e午夜精品久久久久久久| 成年动漫av网址| 男女边摸边吃奶| 超碰97精品在线观看| 亚洲欧美成人综合另类久久久| 精品亚洲成国产av| av又黄又爽大尺度在线免费看| 男人添女人高潮全过程视频| 国产男人的电影天堂91| 亚洲精品一二三| 毛片一级片免费看久久久久| av有码第一页| 色视频在线一区二区三区| 国产高清不卡午夜福利| 一区二区三区乱码不卡18| 伊人亚洲综合成人网| a级毛片黄视频| 91aial.com中文字幕在线观看| 老熟女久久久| 国产激情久久老熟女| 亚洲精品一二三| 国产精品免费大片| 老汉色av国产亚洲站长工具| 国产精品免费大片| 久久久精品免费免费高清| 黄色怎么调成土黄色| 色94色欧美一区二区| 9热在线视频观看99| 男女下面插进去视频免费观看| 婷婷色综合www| 国产精品 国内视频| 久久精品久久久久久久性|