• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved PBFT protocol based on phase voting and threshold signature

    2022-10-18 04:26:26ChenLiquanHuJieGuPengpeng

    Chen Liquan Hu Jie Gu Pengpeng

    (1School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China)(2Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China)

    Abstract:The communication complexity of the practical byzantine fault tolerance (PBFT) protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT (PV-PBFT). As most communication occurs between the primary node and replica nodes in PV-PVFT, consistency verification is accomplished through threshold signatures, multi-PV, and multiple consensus. The view replacement protocol introduces node weights to influence the election of a primary node, reducing the probability of the same node being elected primary multiple times. The experimental results of consensus algorithms show that compared to PBFT, the communication overhead of PV-PBFT decreases by approximately 90% with nearly one-time improvement in the throughput relative and approximately 2/3 consensus latency, lower than that of the scalable hierarchical byzantine fault tolerance. The communication complexity of the PBFT is O(N2), whereas that of PV-PBFT is only O(N), which implies the significant improvement of the operational efficiency of the blockchain system.

    Key words:blockchain; practical byzantine fault tolerance (PBFT); threshold signature; phase voting

    In 2008, Nakamoto[1]first proposed an electronic cash system constructed with blockchain technology. Blockchain technology has made it possible to directly use Bitcoin for transactions between entities that do not trust each other without any centralized trusted third party for management. In 2013, Buterin et al.[2-3]created the Ethereum platform inspired by Bitcoin to apply smart contract technology to blockchain and improve the scalability of a blockchain system. The Linux Foundation launched the Hyperledger Fabric open-source project for developing enterprise-level applications[4]. Blockchain technology has allowed the direct use of Bitcoin for transactions between entities that do not trust each other without any centralized trusted third party for management. The consensus algorithm, one of the core technologies of blockchain, is the mechanism of how mutually independent nodes in a blockchain system can reach consistency. Consequently, the consensus algorithm is a significant factor in determining the operational efficiency of the blockchain system.

    Recently, consensus protocols can be categorized into three categories based on whether or not they are fault tolerant: the non-fault-tolerant proof of X class of schemes represented by the proof of work[5], general fault-tolerant CFT class of schemes represented by Raft[6], and byzantine fault-tolerant (BFT) class of schemes represented by the PBFT[7]. Each type of consensus protocol has its drawbacks, which limit its application to specific scenarios. BFT class protocols have a long history, are the most widely used, and can tolerate partially faulty nodes and evil nodes. However, the performance of these protocols is poor, so the improvement of PBFT has become a crucial research direction for consensus protocols used in various enterprise-level applications, including BFT-SmaRT[8], G-PBFT[9], and LibraBFT[10]consensus. Li et al.[11]proposed a PBFT-optimized consensus protocol named scalable hierarchical byzantine fault tolerance (SHBFT), which improves the efficiency of internode negotiation by designing a hierarchical structure. Li et al.[12]proposed a scalable multilayer PBFT-based consensus mechanism by hierarchically grouping nodes into different layers.

    In the PBFT consensus protocol, all nodes have to communicate with one another to reach consensus, and the communication complexity isO(N2). PV-PBFT uses the threshold signature, where the threshold is set to 2f+1 andfis the number of malicious nodes. The main communication is between the primary and replica nodes, and phase voting is used, which brings the communication complexity down toO(N).

    1 PV-PBFT Protocol

    1.1 PV-PBFT consensus protocol

    The PV-PBFT consensus protocol includes five phases with the same phase number as the original PBFT consensus protocol, and they can correspond to one another. The specific process is shown in Fig. 1. The following are the detailed processes.

    1)Request phase: Similar to the request phase of the original PBFT. ClientC sends a request message to the primary nodeP. The format of the request message ism=[o,t,cid,csig], wheremis the request message,ois the operation to be executed,tis the timestamp,cidis the client ID, andcsigis the client’s signature. The timestamp ensures that the command is only executed once, and the client signature ensures that the message is correct.

    2)Preparation phase: PV-PBFT is different from the original PBFT as the prepare phase of the sequence number distribution focuses mainly on distributing messages from the primary node to the replica nodes. PV-PBFT not only distributes messages from the primary node to the replica nodes in this phase but also performs voting after the replica node acknowledges the message. The replica node completes its own threshold signature and sends its signed part back to the primary node. After receiving a request from clientC, primary nodePassigns a sequence numbersto messagem, constructs a prepare message [v,s,psig,m], and broadcasts it to all replica nodes, wherevis the view number,sis the sequence number,psigis the signature of the primary node, andmis the request message. The sequence numbersis the order of request execution, the view number allows the replica node to record the current view, and the primary node signature ensures the authentication of the replica node to the primary node’s identity. After the correctness check of the prepare message from the primary node, the replica nodeifirst calculates the hash digesth=H(v,s,m) and then signshusing the subkey to obtainξ(h)i, whereξ(h)iis the partial threshold signature generated by the replica nodei. The prepare-vote message is constructed [v,s,ξ(h)i] to the primary nodeP.

    3)Precommit phase: In the precommit phase of the original PBFT, the replica nodes each confirm the correctness of the message and then broadcast the confirmation information to all other nodes[13]. However, PV-PBFT already performs replica node message confirmation in the previous phase. In this phase, the primary node combines messages containing signatures, completes a round of consensus, sends the consensus results to all replica nodes, and opens another round of consensus. When the primary node receives 2f+1 prepare-vote messages, it calculates the resulting overall threshold signatureξ(h) and constructs a precommit message [v,s,ξ(h)] to broadcast to all replica nodes. The replica node verifies the correct precommit message from the primary node by verifying the public keykand then computes the hash digestd=H(v,s,ξ(h)). Then, it signsdwith the subkey to obtainσ(d)i, whereσ(·)iis the partial threshold signature generated by the replica node. Eventually, the replica node constructs the precommit-vote message [v,s,σ(d)i] to the primary nodeP.

    4)Commitment phase: The sequence number confirmation phase of the original PBFT starts to confirm the consensus, whereas the PV-PBFT has already performed the second round of consensus confirmation. After receiving 2f+1 precommit-vote messages, the primary node calculates the resulting overall threshold signatureσ(d) and constructs a commit message [v,s,σ(d)] to broadcast to the replica node. After verifying the correctness of the commit message from the primary node by verifying the public keyk′, the replica nodeiexecutes the request message with the sequence numbers, updates the state machine state toχ, and computes the hash digestτ=H(χ). Then, it signsτwith the subkey to obtainπ(τ)i, whereπ(·)iis the partial threshold signature. Eventually, the replica node generates the commit-vote message [v,s,π(τ)i] to the primary nodeP.

    5)Reply phase: While all nodes in the response phase of the original PBFT send the consensus result to the client,the PV-PBFT is a broadcast of the consensus result by the primary node, including the client. After the primary node receives 2f+1 commit-vote messages and successfully computes the resulting overall threshold signatureπ(τ). It indicates that the request message has been successfully executed by enough nodes, constructs a reply message [v,s,π(τ)] to broadcast to all replica nodes, and responds to the client. The replica node ends this consensus after the reply message from the primary node is verified to be correct.

    Fig.1 PV-PBFT consensus protocol process

    1.2 PV-PBFT view-change protocol

    The node weightwiis added to the PV-PBFT view-change protocol. This value will directly affect the election of the primary node. For any nodei, its weight value is calculated as follows:

    wi=Nlevel-αnprimary

    (1)

    whereNlevelis the weight level of the node, which can be set by the user;αis the adjustment coefficient; andnprimaryis the number of times the node has been elected as the primary node in history, whose value increases by 1 each time the node is elected.

    A node with a higher weight level has a higher probability of being elected as the primary node. If each node is initially elected as the primary node with the same probability, the weight level of all nodes can be set to the same value. If a node is elected as the primary node too many times, it can likely become the target of the attacker’s priority attack. Therefore, the number of times the node has been elected as the primary node in the history of the node is used as the influencing factor to reduce the probability of the same node being elected as the primary node multiple times, thereby reducing the attacker’s attention.

    Similarly to the trigger condition of the PBFT view-change protocol, the replica node does not receive a message from the primary node for a long time. For example, in the prepare phase, the replica node does not receive the prepare message from the primary node within the timer time. In contrast, in the precommit phase, the primary node does not. After calculating the overall threshold signature, the information that 2f+1 replica nodes have confirmed to receive the prepare message to the replica nodes is broadcasted. The view-change protocol of the PV-PBFT is shown in Fig. 2. The detailed process is as follows.

    1)View-change phase: The replica nodeistops receiving requests, constructs a view-change message and broadcasts it to all other nodes in the format [wi,x,C,S,i], wherewiis the weight value of nodeiin the current view,xis the latest stable checkpoint message sequence number of node i,Cis the set of 2f+1 valid checkpoint messages saved by nodei, andSis the set of messages after the sequence numberx.

    2)View-change-Ack phase: After the replica nodeireceives 2f+1 view-change messages, after the correctness check, the size ofwiin all the messages is compared, the node with the largest weight value is compared and determined, and the hash value is calculated. Hashh=H(wa,a) is computed, whereais the unique identifier of the replica node with the largest weight value andwais its corresponding weight value. Then, the subkey is used to sign to obtainξ(h)i, whereξ(·)iis the partial threshold signature generated by the replica node. A view-change-Ack message is constructed and sent to nodeain the format [i,ξ(h)i].

    3)New-view phase: After the replica nodeareceives 2f+1 view-change-ack messages, it calculates the obtained overall threshold signatureξ(h), constructs a new-view message, and broadcasts it to all replica nodes. Its format is [v+1,a,ξ(h),O], whereOis the set of prepare messages received by nodeaunder viewv. After receiving the new-view message, the other replica nodes verify the correctness of the public keykand approve the nodeaas the new primary node, and the view replacement protocol ends.

    Based on the specific process of the PV-PBFT view-change protocol above, the replica node needs to propose a candidate primary node according to the node with the largest weight value in the received view-change

    Fig.2 PV-PBFT view-change protocol process

    message. The candidate primary node is confirmed as the primary node after receiving 2f+1 proposal messages. Compared with the PBFT view-change protocol, where the primary node is directly determined by the current view number, that is, (v+1)modn, wherenis the total number of nodes, the election security of the primary node in the PV-PBFT view-change protocol is significantly improved.

    2 Performance Analysis

    In this section, the communication overheads of the PV-PBFT and PBFT protocols were first analyzed and compared. Then, the performance of three consensus protocols, namely, PV-PBFT, SHBFT, and PBFT, was tested in terms of throughput and consensus latency. The consensus protocols were written in Go language for experimental simulation.

    2.1 Communication overhead analysis

    Assuming that the total number of nodes in the system isn, the number of Byzantine malicious nodes isf=(n-1)/3. During the various phases of consensus execution, as long as each node can receiven-fmessages, the normal operation of the system can be guaranteed. For the receivedn-fmessages, there may be false messages spread byfmalicious nodes at most, so to ensure that most messages are reliable,n-f-f>fmust be satisfied,n>3f,n≥3f+1, and the maximum number of BFT nodes isf=(n-1)/3. The BFT requirement forn≥3f+1 was first demonstrated by Pease et al.[14]in 1980. The detailed proof process can look over Ref.[14].

    w1=2n2-n-1+p(n2-1)=18f2+9f+p(9f2+6f)

    (2)

    wherew1is the number of PBFT communications, andpis the trigger view replacement protocol probability. In the PBFT consensus protocol, the number of communications is (n-1)+2n(n-1)=2n2-n-1=18f2+9f. If the view replacement protocol is triggered, the additional number of communications can be calculated asn(n-1)+(n-1)=n2-1=9f2+6f.

    w2=6(n-1)+p(n2+n-2)=18f+p(9f2+9f)

    (3)

    wherew2is the number of PV-PBFT communications. In the PV-PBFT consensus protocol, the number of communications is 6(n-1)=18f. If the view replacement protocol occurs, the additional number of communications isn(n-1)+2(n-1)=n2+n-2=9f2+9f.

    The resulting ratioRof the number of PV-PBFT communications to the number of PBFT communications can be obtained as follows:

    (4)

    MATLAB is used to make a visual graph of the variation ofRwithfandp, as shown in Fig. 3, whereftakes values from 4 to 20 in steps of 2 andptakes values from 0 to 1 in steps of 0.1.

    Fig.3 Ratio graph of the PV-PBFT to the PBFT communication overheads

    As shown in Fig. 3, the value ofRis always less than 1 in the given range offandp; i.e., the PV-PBFT communication overhead is always less than the communication overhead of the PBFT. In addition, with the same view replacement probability, the PV-PBFT communication overhead decreases more significantly as the number of nodes in the system increases. When the number of Byzantine malicious nodes is 20 and the view switching probability is 0.1, the value ofRis only approximately 0.1. That is, the PV-PBFT protocol makes the communication overhead significantly decrease, only approximately 10% of the PBFT protocol.

    2.2 Throughput test

    The consensus protocols’ throughput is the maximum rate of agreement on the values done to verify the transactions in a blockchain network[15]. In the blockchain system, the throughput can be expressed in terms of the number of transactions processed in each second (TPS), i.e.,

    (5)

    whereNtranis the number of transactions processed by the system in the block generation time, and Δtis the block-out time.

    To test the throughput of the PV-PBFT, this section first conducted experiments on the variation of the PV-PBFT with the SHBFT and PBFT throughput with the number of nodes in the system. The total number of nodes in the system was set to increase from 10 to 60 in steps of 5, the number of Byzantine error nodes always did not exceed one-third, and the number of transaction requests initiated in each experiment was 2 000. After performing ten experiments for each of the three algorithms at different numbers of nodes, the average value was taken as the throughput at different numbers of nodes, and the results are shown in Fig. 4.

    Fig.4 Comparison of the PV-PBFT, SHBFT, and PBFT throughput changes with the number of nodes

    On the whole, the throughput of the PV-PBFT is significantly higher than that of the PBFT and SHBFT. With the same number of nodes, the throughput of the PV-PBFT is nearly double that of the PBFT. According to the definition of the throughput, i.e., the number of transactions processed in the block-out time of the system, the number of recent transactions in the new blocks generated by the three consensus protocols is the same. However, there was no process of all replica nodes broadcasting communication with one another in the PV-PBFT; the consensus efficiency was substantially improved, the block-out time was reduced, and the throughput was increased. Although the SHBFT was optimized for the PBFT consensus by the node hierarchy, all tertiary nodes still need to makeO(N2) broadcast communication. As the number of nodes in the blockchain system increased, the throughput of the three consensus protocols basically remained within a stable range. As the number of nodes increased, with Byzantine error nodes, for the PV-PBFT and PBFT, the time to collect 2f+1 messages in each phase of the protocol became longer and may trigger the view replacement protocol, resulting in a longer processing time for transactions in the current block and a certain decrease in the throughput occurs. The number of tertiary nodes in the SHBFT is relatively stable, so the consensus protocol time consumption is less affected by the total number of nodes. The throughput of the SHBFT is basically not degraded.

    2.3 Consensus latency test

    Consensus latency is the total time from the time the client launched the transaction request to the time the consensus is completed, and the transaction information is stored in the new block. It is also an important parameter to evaluate the performance of the consensus protocol. The lower the consensus time delay, the more efficient the system is in processing transactions and the better the performance. The consensus time delayTdelayis defined as follows:

    Tdelay=Ttx+Tcon+Tblock

    (6)

    whereTtxis the time from when the client initiates a transaction to when the primary node takes out the transaction message from the transaction pool, which is the propagation time for a transaction message to enter the execution phase of the consensus protocol;Tconrepresents the time of the consensus protocol execution in the consensus protocol; andTblockis the confirmation time of the new block in all replica nodes.

    To test the consensus latency of the three protocols, the total number of nodes in the system was set to increase incrementally from 10 to 60 with steps of 5, and the Byzantine error nodes did not exceed one-third of the total nodes. The experiment was repeated ten times for each of the three protocols with different numbers of nodes to measure the total time between the initiation of a single request and the receipt of a sufficient confirmation response by the client. Then, the average value is taken as the consensus latency with different numbers of nodes. The results are shown in Fig. 5.

    Fig.5 Comparison of the PV-PBFT, SHBFT, and PBFT consensus delays with the number of nodes

    Based on the experimental results in Fig. 5,on the whole, the consensus latency of the PV-PBFT protocol is lower than that of the SHBFT protocol with the same number of nodes and significantly lower than that of the PBFT protocol, which is only approximately one-third of the consensus latency of the PBFT protocol. By using the primary node as the communication intermediary in the PV-PBFT protocol, the broadcast communication process between all replica nodes is omitted, which not only makes the completion efficiency of the protocol better than SHBFT and PBFT but also reduces the consensus delay. As the number of nodes increases, in the presence of Byzantine error nodes, the time for nodes to receive 2f+1 messages during communication increases, which makes the consensus protocol completion time increase and consensus latency rise. However, the growth rate of the consensus latency of the PV-PBFT protocol with the increasing number of nodes is lower than that of the PBFT protocol.

    3 Conclusions

    1) We propose an improved PBFT consensus protocol, including the PV-PBFT consensus protocol and view-change protocol, which reduces the communication complexity toO(N) and extends the scope of use of the protocol.

    2) The PV-PBFT uses the threshold signature technique, which improves the fault tolerance of the system and prevents Byzantine nodes and primary nodes from committing errors. Multi-phase voting, with multiple consensus, further reduces the node consensus error rate.

    3) We implemented a prototype of the PV-PBFT and compared it with two consensus protocols, i.e., SHBFT and PBFT. The theoretical performance analysis and simulation experimental results demonstrate that the PV-PBFT protocol outperforms the PBFT protocol in terms of the communication overhead and significantly outperforms the SHBFT and PBFT protocols in terms of throughput and consensus latency.

    国产一区二区亚洲精品在线观看| 国产亚洲欧美在线一区二区| 国产91精品成人一区二区三区| www.色视频.com| 午夜a级毛片| 搡老岳熟女国产| 99久久精品热视频| 久久99热这里只有精品18| 88av欧美| 国产精品爽爽va在线观看网站| 久久久久久久久久黄片| 九九热线精品视视频播放| 欧美日韩乱码在线| 嫩草影院入口| 国产精品久久久久久人妻精品电影| 亚洲七黄色美女视频| 欧美zozozo另类| 毛片一级片免费看久久久久 | 赤兔流量卡办理| 波多野结衣巨乳人妻| 搞女人的毛片| 伦理电影大哥的女人| 中文亚洲av片在线观看爽| 麻豆久久精品国产亚洲av| 久久久久亚洲av毛片大全| 3wmmmm亚洲av在线观看| 欧美在线黄色| 久久中文看片网| www.999成人在线观看| 噜噜噜噜噜久久久久久91| 欧美日韩乱码在线| 欧美zozozo另类| 久久久久九九精品影院| 国产真实乱freesex| 成人鲁丝片一二三区免费| 亚洲久久久久久中文字幕| 国产精品一区二区免费欧美| 免费av观看视频| 国产探花极品一区二区| 欧美不卡视频在线免费观看| 午夜两性在线视频| 国产乱人视频| 中文字幕人成人乱码亚洲影| 色吧在线观看| 露出奶头的视频| 啪啪无遮挡十八禁网站| 久久久色成人| 给我免费播放毛片高清在线观看| 天天躁日日操中文字幕| 99riav亚洲国产免费| 国产麻豆成人av免费视频| 婷婷丁香在线五月| 午夜精品一区二区三区免费看| 看片在线看免费视频| 国产精品不卡视频一区二区 | 免费观看精品视频网站| 18禁黄网站禁片午夜丰满| 国产精品日韩av在线免费观看| 日本一本二区三区精品| 99热这里只有是精品在线观看 | 精品午夜福利在线看| 亚洲无线在线观看| 51午夜福利影视在线观看| 国产精品久久视频播放| 老鸭窝网址在线观看| 亚洲黑人精品在线| 夜夜爽天天搞| 99精品久久久久人妻精品| 麻豆av噜噜一区二区三区| 高清在线国产一区| 看黄色毛片网站| 色哟哟哟哟哟哟| 亚洲色图av天堂| 午夜日韩欧美国产| 国产久久久一区二区三区| 成人一区二区视频在线观看| 免费黄网站久久成人精品 | 在线天堂最新版资源| 国语自产精品视频在线第100页| 色哟哟哟哟哟哟| 少妇丰满av| 亚洲熟妇熟女久久| 国产高清有码在线观看视频| 真人一进一出gif抽搐免费| 麻豆av噜噜一区二区三区| 国产在视频线在精品| 看黄色毛片网站| 国产老妇女一区| 日本五十路高清| 丰满人妻一区二区三区视频av| 90打野战视频偷拍视频| 成人无遮挡网站| 夜夜夜夜夜久久久久| 观看免费一级毛片| 久久久久免费精品人妻一区二区| 久久香蕉精品热| 亚洲乱码一区二区免费版| 色综合亚洲欧美另类图片| 亚洲熟妇熟女久久| 一本综合久久免费| 亚洲久久久久久中文字幕| 极品教师在线视频| 高清在线国产一区| 特级一级黄色大片| 91狼人影院| 看十八女毛片水多多多| 国产免费一级a男人的天堂| 人人妻人人看人人澡| 国产亚洲精品av在线| 在线观看66精品国产| 国产精品综合久久久久久久免费| 中文字幕人成人乱码亚洲影| 日本精品一区二区三区蜜桃| 午夜亚洲福利在线播放| 久久午夜亚洲精品久久| 如何舔出高潮| 看片在线看免费视频| 变态另类成人亚洲欧美熟女| 国产乱人视频| 黄色女人牲交| 欧美日韩中文字幕国产精品一区二区三区| 国产黄色小视频在线观看| 久久午夜亚洲精品久久| 97超级碰碰碰精品色视频在线观看| 精品久久久久久久久久久久久| 午夜免费男女啪啪视频观看 | 亚洲成人久久爱视频| 色av中文字幕| 中文字幕高清在线视频| 看十八女毛片水多多多| 大型黄色视频在线免费观看| 精品一区二区免费观看| 国产亚洲欧美在线一区二区| 精品久久久久久久末码| 97超级碰碰碰精品色视频在线观看| 国产av一区在线观看免费| 欧美高清成人免费视频www| 欧美区成人在线视频| 色在线成人网| 麻豆国产97在线/欧美| 18禁裸乳无遮挡免费网站照片| 国产视频内射| 午夜精品一区二区三区免费看| 国产精品亚洲美女久久久| 日本黄大片高清| 97人妻精品一区二区三区麻豆| 亚洲av成人av| 97热精品久久久久久| 性欧美人与动物交配| 国产精品野战在线观看| 欧美区成人在线视频| 少妇被粗大猛烈的视频| 噜噜噜噜噜久久久久久91| 好男人在线观看高清免费视频| 黄色丝袜av网址大全| 激情在线观看视频在线高清| 大型黄色视频在线免费观看| 3wmmmm亚洲av在线观看| 精品久久国产蜜桃| 久久天躁狠狠躁夜夜2o2o| bbb黄色大片| 久久国产精品人妻蜜桃| 久久久久国产精品人妻aⅴ院| 久久久久久九九精品二区国产| 色综合亚洲欧美另类图片| 我要看日韩黄色一级片| 一夜夜www| 1024手机看黄色片| 久久精品国产亚洲av天美| 无人区码免费观看不卡| 国产 一区 欧美 日韩| 色尼玛亚洲综合影院| 国产探花在线观看一区二区| 精品一区二区三区av网在线观看| 日日夜夜操网爽| 国产精品国产高清国产av| 亚洲av成人不卡在线观看播放网| 免费电影在线观看免费观看| 日韩欧美免费精品| 亚洲国产色片| 精品人妻一区二区三区麻豆 | 亚洲精品一区av在线观看| 久久精品国产亚洲av香蕉五月| 亚洲七黄色美女视频| 别揉我奶头~嗯~啊~动态视频| 亚洲国产精品久久男人天堂| 18+在线观看网站| 永久网站在线| 国产私拍福利视频在线观看| 我要搜黄色片| 日韩 亚洲 欧美在线| 淫妇啪啪啪对白视频| 久久久久国产精品人妻aⅴ院| 好男人电影高清在线观看| 黄片小视频在线播放| 51午夜福利影视在线观看| 男人和女人高潮做爰伦理| 欧美高清性xxxxhd video| 欧美+日韩+精品| 国产高潮美女av| 黄片小视频在线播放| 一边摸一边抽搐一进一小说| 久久草成人影院| 亚洲成av人片在线播放无| ponron亚洲| www.999成人在线观看| 久久天躁狠狠躁夜夜2o2o| 欧美成人免费av一区二区三区| 可以在线观看毛片的网站| 动漫黄色视频在线观看| 亚洲,欧美精品.| 亚洲黑人精品在线| 国产精品亚洲av一区麻豆| 亚洲av中文字字幕乱码综合| 久久久久久九九精品二区国产| 久久久久久国产a免费观看| 欧美乱妇无乱码| 精品久久久久久久久久久久久| 欧美日韩瑟瑟在线播放| 亚洲欧美日韩无卡精品| 日韩欧美免费精品| 久久99热6这里只有精品| 国产成人a区在线观看| 亚洲国产精品合色在线| 色在线成人网| 51午夜福利影视在线观看| 一级av片app| 757午夜福利合集在线观看| 日韩中字成人| 亚洲av熟女| 色av中文字幕| 亚洲av二区三区四区| 国产精品av视频在线免费观看| 成人午夜高清在线视频| 色av中文字幕| 亚洲av二区三区四区| 久久婷婷人人爽人人干人人爱| 免费搜索国产男女视频| 免费黄网站久久成人精品 | 91在线精品国自产拍蜜月| 精品午夜福利视频在线观看一区| 757午夜福利合集在线观看| 色噜噜av男人的天堂激情| 69人妻影院| 校园春色视频在线观看| 激情在线观看视频在线高清| 搡女人真爽免费视频火全软件 | 国产白丝娇喘喷水9色精品| 久久99热这里只有精品18| 一本久久中文字幕| 午夜精品一区二区三区免费看| 日本免费一区二区三区高清不卡| 欧美性猛交黑人性爽| 国产精品亚洲av一区麻豆| 成人国产综合亚洲| 免费av毛片视频| 免费观看的影片在线观看| 中文字幕久久专区| 中文字幕av成人在线电影| 亚洲无线在线观看| 国产单亲对白刺激| 黄色配什么色好看| 国产蜜桃级精品一区二区三区| www.www免费av| 日韩大尺度精品在线看网址| 亚洲专区中文字幕在线| 欧美一区二区亚洲| 亚洲精品456在线播放app | 麻豆久久精品国产亚洲av| 午夜福利免费观看在线| 成人鲁丝片一二三区免费| 看十八女毛片水多多多| 亚洲精品色激情综合| 熟女人妻精品中文字幕| 欧美日韩国产亚洲二区| 欧美bdsm另类| 国产成人影院久久av| av专区在线播放| 精品人妻1区二区| av视频在线观看入口| 丰满人妻熟妇乱又伦精品不卡| 午夜福利在线观看免费完整高清在 | 久久精品国产自在天天线| 欧美xxxx黑人xx丫x性爽| 天堂网av新在线| 婷婷精品国产亚洲av在线| а√天堂www在线а√下载| 99久久成人亚洲精品观看| 麻豆久久精品国产亚洲av| 听说在线观看完整版免费高清| 欧美日韩亚洲国产一区二区在线观看| 国产精品亚洲一级av第二区| 久久精品影院6| 亚洲精品粉嫩美女一区| 国产精华一区二区三区| 老女人水多毛片| 成人av一区二区三区在线看| 欧美一区二区亚洲| 欧美另类亚洲清纯唯美| 午夜两性在线视频| 九九热线精品视视频播放| 色综合欧美亚洲国产小说| 久久国产精品影院| 九色成人免费人妻av| 精品午夜福利视频在线观看一区| 99视频精品全部免费 在线| 色哟哟·www| 男人狂女人下面高潮的视频| .国产精品久久| 国产一区二区在线av高清观看| 成年免费大片在线观看| 亚洲av五月六月丁香网| 他把我摸到了高潮在线观看| 国产淫片久久久久久久久 | 亚洲精品日韩av片在线观看| 久久亚洲真实| 高潮久久久久久久久久久不卡| 2021天堂中文幕一二区在线观| 岛国在线免费视频观看| 高清在线国产一区| ponron亚洲| 国内毛片毛片毛片毛片毛片| 丰满人妻熟妇乱又伦精品不卡| 每晚都被弄得嗷嗷叫到高潮| 深爱激情五月婷婷| 如何舔出高潮| 亚洲第一区二区三区不卡| 噜噜噜噜噜久久久久久91| 99热这里只有精品一区| 久久精品91蜜桃| 中文字幕熟女人妻在线| 中文字幕免费在线视频6| 一区二区三区激情视频| 九九热线精品视视频播放| 亚洲男人的天堂狠狠| 两个人的视频大全免费| 性色av乱码一区二区三区2| 级片在线观看| 欧美又色又爽又黄视频| 欧美在线一区亚洲| 啦啦啦观看免费观看视频高清| 亚洲成人精品中文字幕电影| 色精品久久人妻99蜜桃| 亚洲av中文字字幕乱码综合| 色噜噜av男人的天堂激情| 好男人在线观看高清免费视频| 久久久久久久久久成人| 精品乱码久久久久久99久播| 日本撒尿小便嘘嘘汇集6| 一级黄色大片毛片| 久久精品综合一区二区三区| 极品教师在线视频| av在线蜜桃| 日日干狠狠操夜夜爽| 午夜精品一区二区三区免费看| 精品久久久久久,| 欧美xxxx黑人xx丫x性爽| 看黄色毛片网站| 黄色女人牲交| 国内精品久久久久久久电影| 国产欧美日韩精品一区二区| 免费看a级黄色片| 久久天躁狠狠躁夜夜2o2o| 中文字幕av在线有码专区| 婷婷六月久久综合丁香| 亚洲成人久久爱视频| 国产乱人伦免费视频| 宅男免费午夜| 国内精品久久久久久久电影| 国语自产精品视频在线第100页| 久久久久久国产a免费观看| 内地一区二区视频在线| 欧美一区二区精品小视频在线| 91久久精品国产一区二区成人| 啦啦啦观看免费观看视频高清| 精品久久久久久,| 俺也久久电影网| 国产亚洲精品综合一区在线观看| 久久国产乱子免费精品| 亚洲成av人片免费观看| 久久久久久久久久成人| www.999成人在线观看| 色av中文字幕| 亚洲精品亚洲一区二区| 麻豆成人午夜福利视频| 亚洲人成网站在线播放欧美日韩| 露出奶头的视频| 级片在线观看| 无遮挡黄片免费观看| 在现免费观看毛片| 特级一级黄色大片| 国产成人福利小说| 欧洲精品卡2卡3卡4卡5卡区| 又粗又爽又猛毛片免费看| 日韩欧美精品免费久久 | 噜噜噜噜噜久久久久久91| 亚洲天堂国产精品一区在线| 久久国产乱子伦精品免费另类| 久久性视频一级片| 亚洲欧美日韩东京热| 久久久久久国产a免费观看| 精品久久久久久成人av| 亚洲真实伦在线观看| 男人的好看免费观看在线视频| 国产精品99久久久久久久久| 变态另类丝袜制服| 一本精品99久久精品77| 亚洲精品成人久久久久久| 久久人人精品亚洲av| 丝袜美腿在线中文| 搡老熟女国产l中国老女人| 久久精品夜夜夜夜夜久久蜜豆| 国产麻豆成人av免费视频| 亚洲中文字幕一区二区三区有码在线看| 午夜福利在线观看吧| 伊人久久精品亚洲午夜| 国产国拍精品亚洲av在线观看| 精品99又大又爽又粗少妇毛片 | 久久精品国产亚洲av天美| 日本与韩国留学比较| 日韩有码中文字幕| 成年女人看的毛片在线观看| 成人无遮挡网站| 欧美高清成人免费视频www| 麻豆国产97在线/欧美| 日本一本二区三区精品| 国产高清激情床上av| 首页视频小说图片口味搜索| 日韩人妻高清精品专区| 亚洲精品影视一区二区三区av| 一本综合久久免费| 90打野战视频偷拍视频| 看黄色毛片网站| 国产亚洲欧美在线一区二区| 国产精品永久免费网站| 久久精品国产自在天天线| 亚洲欧美激情综合另类| 日本黄大片高清| 日韩高清综合在线| 国产精品嫩草影院av在线观看 | 特大巨黑吊av在线直播| 一区二区三区高清视频在线| 18禁裸乳无遮挡免费网站照片| 又黄又爽又免费观看的视频| 国产精品自产拍在线观看55亚洲| 久久久精品大字幕| 国产欧美日韩一区二区三| 中出人妻视频一区二区| 亚洲avbb在线观看| 搡老岳熟女国产| 麻豆av噜噜一区二区三区| 日韩中文字幕欧美一区二区| 国产国拍精品亚洲av在线观看| 亚洲男人的天堂狠狠| 亚洲国产精品sss在线观看| 久久久久性生活片| 亚洲专区中文字幕在线| 51午夜福利影视在线观看| 蜜桃久久精品国产亚洲av| 国产精品久久久久久亚洲av鲁大| av女优亚洲男人天堂| 精品国产亚洲在线| 高清毛片免费观看视频网站| 亚洲专区国产一区二区| 69av精品久久久久久| 国产免费男女视频| 亚洲性夜色夜夜综合| 午夜视频国产福利| 欧美性猛交黑人性爽| 欧美一级a爱片免费观看看| 深夜精品福利| 在线播放国产精品三级| 久久精品久久久久久噜噜老黄 | 亚洲欧美日韩卡通动漫| 国产精品亚洲美女久久久| 一个人免费在线观看的高清视频| 成人一区二区视频在线观看| www.999成人在线观看| 国产 一区 欧美 日韩| 国产蜜桃级精品一区二区三区| 欧美极品一区二区三区四区| 国产野战对白在线观看| 老司机午夜十八禁免费视频| 大型黄色视频在线免费观看| 成人av在线播放网站| 久久香蕉精品热| 中国美女看黄片| .国产精品久久| 欧美成人a在线观看| 亚洲色图av天堂| 国产精品久久久久久人妻精品电影| 在线十欧美十亚洲十日本专区| 天美传媒精品一区二区| 欧美日韩国产亚洲二区| 最近视频中文字幕2019在线8| 中文字幕高清在线视频| 亚洲av日韩精品久久久久久密| 窝窝影院91人妻| 床上黄色一级片| 欧美潮喷喷水| 亚洲熟妇熟女久久| 高潮久久久久久久久久久不卡| 88av欧美| 精品一区二区三区av网在线观看| 精品乱码久久久久久99久播| 久久人妻av系列| 91麻豆精品激情在线观看国产| 久久久久精品国产欧美久久久| 色综合亚洲欧美另类图片| 乱码一卡2卡4卡精品| 久久久久久久久大av| 尤物成人国产欧美一区二区三区| 搡女人真爽免费视频火全软件 | av天堂在线播放| 国产淫片久久久久久久久 | 舔av片在线| 欧美高清成人免费视频www| 久久精品综合一区二区三区| 国产伦精品一区二区三区四那| 亚洲av成人av| 成人一区二区视频在线观看| 国产一区二区在线av高清观看| 免费一级毛片在线播放高清视频| 99在线人妻在线中文字幕| 成人一区二区视频在线观看| 亚洲精品粉嫩美女一区| 午夜视频国产福利| a级毛片a级免费在线| 午夜日韩欧美国产| 国产精品自产拍在线观看55亚洲| 久久久久免费精品人妻一区二区| 美女xxoo啪啪120秒动态图 | 日本a在线网址| 久久久久国产精品人妻aⅴ院| 最近中文字幕高清免费大全6 | 美女被艹到高潮喷水动态| 色哟哟·www| 人人妻人人看人人澡| 噜噜噜噜噜久久久久久91| 欧美日韩国产亚洲二区| 一区二区三区四区激情视频 | av国产免费在线观看| 中文字幕免费在线视频6| 久久这里只有精品中国| 99久久成人亚洲精品观看| 色吧在线观看| 人妻丰满熟妇av一区二区三区| 长腿黑丝高跟| 国产在线精品亚洲第一网站| 亚洲av成人av| 日日摸夜夜添夜夜添小说| 亚洲无线在线观看| 欧美高清成人免费视频www| 舔av片在线| 日本熟妇午夜| 亚洲黑人精品在线| av天堂中文字幕网| 禁无遮挡网站| 色哟哟哟哟哟哟| 亚洲成人久久爱视频| 久久精品人妻少妇| 最新在线观看一区二区三区| 婷婷色综合大香蕉| 亚洲国产精品久久男人天堂| 国产精品,欧美在线| 高潮久久久久久久久久久不卡| 亚洲国产欧美人成| 在线播放无遮挡| 欧美激情在线99| 久久香蕉精品热| 99在线视频只有这里精品首页| 久久热精品热| 最新在线观看一区二区三区| 少妇丰满av| 久久国产精品人妻蜜桃| 女生性感内裤真人,穿戴方法视频| 搡老熟女国产l中国老女人| 99国产精品一区二区蜜桃av| 一级黄色大片毛片| 亚洲欧美日韩高清专用| 日韩欧美国产一区二区入口| 亚洲精品456在线播放app | 有码 亚洲区| 色5月婷婷丁香| 天天躁日日操中文字幕| 永久网站在线| 很黄的视频免费| 久久精品国产自在天天线| 中文字幕人妻熟人妻熟丝袜美| 长腿黑丝高跟| 日日摸夜夜添夜夜添av毛片 | 午夜福利视频1000在线观看| 久久久久久九九精品二区国产| 夜夜夜夜夜久久久久| 国内揄拍国产精品人妻在线| 男女那种视频在线观看| 色综合站精品国产| 亚洲欧美日韩东京热| 18禁裸乳无遮挡免费网站照片| 99久久久亚洲精品蜜臀av| 亚洲成a人片在线一区二区| 少妇被粗大猛烈的视频| 九色国产91popny在线| a级毛片免费高清观看在线播放| 搡老熟女国产l中国老女人| 欧美成人性av电影在线观看| 九九在线视频观看精品| 真人一进一出gif抽搐免费| 国产三级中文精品| 亚洲精品456在线播放app | 久久精品综合一区二区三区| 特级一级黄色大片| 99riav亚洲国产免费| 91午夜精品亚洲一区二区三区 | 国产成人a区在线观看|