• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    New Representative Collective Signatures Based on the Discrete Logarithm Problem

    2022-11-10 02:29:52TuanNguyenKimDuyHoNgocandNikolayMoldovyan
    Computers Materials&Continua 2022年10期

    Tuan Nguyen Kim,Duy Ho Ngoc and Nikolay A.Moldovyan

    1School of Computer Science,Duy Tan University,Da Nang,Vietnam

    2Department of Information Technology,Ha Noi,Vietnam

    3ITMO University,St.Petersburg,Russia

    Abstract:The representative collective digital signature scheme allows the creation of a unique collective signature on document M that represents an entire signing community consisting of many individual signers and many different signing groups,each signing group is represented by a group leader.On document M,a collective signature can be created using the representative digital signature scheme that represents an entire community consisting of individual signers and signing groups,each of which is represented by a group leader.The characteristic of this type of letter is that it consists of three elements (U,E,S),one of which (U) is used to store the information of all the signers who participated in the formation of the collective signature on document M.While storing this information is necessary to identify the signer and resolve disputes later,it greatly increases the size of signatures.This is considered a limitation of the collective signature representing 3 elements.In this paper,we propose and build a new type of collective signature,a collective signature representing 2 elements (E,S).In this case,the signature has been reduced in size,but it contains all the information needed to identify the signer and resolve disputes if necessary.To construct the approved group signature scheme,which is the basic scheme for the proposed representative collective signature schemes,we use the discrete logarithm problem on the prime finite field.At the end of this paper,we present the security analysis of the AGDS scheme and a performance evaluation of the proposed collective signature schemes.

    Keywords:Elliptic curve;signing group;individual signer;collective signature;group signature

    1 Introduction

    To ensure the security of transactions on the network,people often use authentication systems based on digital signatures.Digital signatures[1]not only help authenticate the origin of information,but also help check the integrity of information as it is transmitted from source to destination.In addition,digital signatures also help prevent the repudiation of a communication partner.

    In order to meet many different authentication requirements in practice,many types of digital signature schemes have been researched and published such as single digital signature scheme[2],multiple digital signature scheme[3],blind digital signature scheme[4,5],group digital signature scheme[6-9],collective signature scheme[10],blind collective digital signature scheme[11],representative collective signature scheme[12].

    It is known that a group signature is a multi-signature formed by a group of signers under the control of the group leader (who manages the signing group).This type of signature usually consist of two components,or pairs of two sufficiently large integers (E and S).A group signature scheme must meet the following minimum requirements:i) A set (subnet) of any individual signers the individual,selected from a group of members,can generate a signature,representing the signing group,on document M;ii)The signing group manager can identify everyone who participated in the group signature formation process of the signing group they manage,and only the group manager can do this;and iii)Persons outside of the signing group cannot establish a subset of individual signers so that these people create group signatures representing the signing group.

    The Approved Group Digital Signatures (AGDS) type proposed by us[13],to serve as the basic scheme for the representative collective signature scheme,also satisfies the following additional conditions:i)No anyone in the signing group,including the group manager,knows the private key used by the individual signers in the group signature formation process;ii)Group signatures are formed in two stages:First,each individual signer generates the associated parameters and their shared personal signature and then passes it all on to the group manager.The group manager then checks the validity of each signature received by the shared individuals,if all are valid then the manager proceeds to generate the final group signature,from the shared signatures and signature of the administrator himself.This is why this signature is called a consent group signature.

    Therefore,to meet the above conditions,the approved group signature has been designed in the form of a set of three components U,E,and S[10].The U component is used to store information of all participating members participating in the formation of group signatures,as the basis for the identification of the signer later.Obviously,it is necessary to save the information of those who participated in the formation of the group signature,but it makes the size of the group signature significantly increase,which is considered a limitation of this group signature scheme.Because the representative collective signature scheme is built on the basis of the AGDS scheme,this is also a limitation of the three-component representative collective signature(U,E,S).

    To overcome this limitation,we change the AGDS schema,and subsequently change the representative collective signature scheme,so that it allows the creation of group signatures and representative collective signatures consisting of only sets of 2 components (E,S)[13].Of course,it still contains all the necessary information so that it can later be identified who participated in the creation of the signing group’s group signature.This information is contained in the random component(R),which is used to form the E component of the group signature,the ultimate representative collective signature.

    In three-element grouping signature schemes[13],the random parameter (R) is formed from a randomly chosen numeric value (t).In a 2-component grouping signature protocol,since the information of all the signers involved in the signature generation process is embedded in the random parameter (R),the random value (T) is not chosen in the random way that it is generated by some pseudo-random value generator algorithm.The random parameter in this case not only satisfies the requirements of uniqueness,secrecy,and unpredictability but also ensures the function of protecting the private keys of the participants in the group signature generation process of the signing group.The pseudo-random number generation algorithm used in the group signature schemes below fulfills this.

    The AGDS generation procedure in this case,which generates a 2-component group signature,is performed through the following steps:

    1.The set of individual signers together create a collective signature on the document M to be signed.Then,send the newly created collective signature(Ecol,Scol)to the group manager.

    2.The group manager uses the received collective signature (Ecol,Scol),document M,and his private key z to compute a pseudo-random value T,according to a predefined algorithm.

    3.Using the calculated pseudo-random value,the group manager computes the random component of the group signature(R),and then computes the two components of the team leader’s signature(E,S)on document M This is also the group signature of the whole group signing on document M.

    Thus,we reduce the size of the group signature and the representative collective signature[10]by not using the U element to contain the signer information,but embedding this information in the random parameter R.That is the group signature and the representative collective signature are reduced to two elements(E,S),but still contain all the necessary information to serve the identification of the signer later.

    In this paper,we use the difficult problem of the discrete logarithm on prime finite fields to build both forms of collective signature schema representing 2 components:i)Collective signature shared by multiple signing groups and ii)Collective signatures shared by multiple signing groups and many individual signers.The collective signature scheme and the consent group signature scheme are used as the basis for the proposed collective signature scheme.

    2 Related Basis Digital Signature Schemes

    2.1 The Collective Signature Scheme Based on the Discrete Logarithm Problem(The CDS-2.1 Scheme)

    2.2 The Approved Group Signature Scheme Based on the Discrete Logarithm Problem(The GDS-2.2 Scheme)

    This section describes the two-component approved group signature scheme.The signing group in this case consists of m signers and one who plays the role of group manager.The input parameters are selected as shown in the CDS-2.1 scheme.M is the document that needs to have a group signature on it.

    Each signer generates a random secret number to serve as the private key.The public keyyjis calculated by the formula:yj=αxj mod p;j=1,2,3,...,m;The group manager(GM)also chooses a random secret numberz,z <q,as the private key.GM’s public key is:Y=αz mod p.This Y is also the public key of the signing group.

    The main procedures of the two-component approved group signature scheme on the document M are described below.

    ?The procedure for generating the approved group digital signature on the document M

    The group signature in this case is formed through two stages:

    i) Creating a collective signature on documentM,made by a collective ofmindividual signers;

    ii) On the basis of the collective signature that has just been created,the group manager creates a group signature of 2 components,representing the whole signing group

    1.Individual signers create a collective signature on the documentM:

    1.1.Eachisigner generates a random numberti,ti <r,and then computesRi:

    Then sendRito the other signers in the signing group(i=1,2,...,m).

    1.2.Any signer in the group,or all,calculateRcol:

    And calculateEcol:

    where:FHis a given hash function,the value ofEcolis the first element in the collective signature.

    1.3.Eachisigner calculate the personal share valueSi:

    Then,sendsSito other signers in the signing group.

    1.4.Any signer in the signing group,or all,calculateScol:

    So the tuple(Ecol,Scol)is the collective signature of a signing group of m members.The length of the signature is:|Ecol|+|Scol|≈240 bit.

    This collective signature is forwarded to the group manager,

    2.The group manager checks the validity of the received collective signature (Ecol,Scol) by checking the precision of the following expression:

    where:

    If the collective signature is valid,the group manager will calculate the pseudo-random value T:

    where:Hz=FH(M,z)mod qand

    3.The group manager calculates the values R,E and S as follows:

    Thus,the tuple (E,S) is the two-component approved group signature of the signing group including m signers and the group manager on the document M.

    ?The procedures for verification the approved group digital signature on the document M

    To check the validity of the approved group signature received with the document M,the verifier performs the following steps:

    1.Calculate the value of the random parameterR*using the following formula:

    2.Calculate the value of component E*using the following formula:

    3.Compare E*with E.If E*=E:The received signature is valid;otherwise,it is invalid and will be rejected.

    ? Proof of the correctness of the GDS-2.2 scheme:

    The correctness of this representative collective signature scheme is shown through:i) The existence of a formula to check the shared signatureSjof each signing groupRj;ii)The existence of the collective signature test formulaRcoland iii)The existence of the test expressionE*=E.Detailed as follows:

    a) The correctness of the formula to check the shared signature per signer:

    It is easy to see that the shared signature checking formula is always correct:

    b) The correctness of the formula for checking collective signatures:

    It is easy to see that the collective signature checking formula is always correct:

    c) The correctness of the group signature checking procedure:

    Conspicuously,the signature checking expressionE*=Ealways exists:

    R*=Y-E αE-1S mod p

    =α-zE αE-1E(T+zE) mod p

    =αT mod p=R

    And calculates:

    E*=FH(M||R*)mod2128

    =FH(M||R) mod2128=E

    Thus,the expressionE*=Ealways exists:This proves that the correctness of the signature checking procedure,or the correctness of the GDS-2.2 scheme is always guaranteed.

    3 Constructing the Proposed Collective Digital Signature Schemes Based on the Discrete Logarithm Problem on Prime Finite Field

    3.1 Constructing the Two-Element Collective Digital Signature Scheme for Signing Groups(The RCS.01-3.1 Scheme)

    This scheme generates a collective signature for g signing groups,with the public key of each group manager(GM),and the public key of each signing group:mod p;with j=1,2,...,g,and Xjis the secret key of j-th GM.Suppose that the j-th group consists of mjindividual signers.M is a document to be signed on.The protocol of collective signatures for signing groups is descibed as follows:

    ?The procedure for generating the collective digital signature for g signing groups on the document M:

    Including these following steps:

    1.Each j-th group generates a group signature according to the GDS-2.2 signing group scheme above and then send Rjto all the remaining groups in the signing pool.

    2.A certain GM in the collective,or all,calculates the values of R and E by the following formulas:

    E is the first component of the collective signature.

    3.GM of each j-th signing group continues to execute:

    -Calculate the shared composition Sjof the signing group:

    -Send Sjto all other GM in the signing group.

    4.A certain GM in the collective,or all,does the final works:

    -Verify the precision of the shared component Sjof each signing group by the following formula:

    -If all Sjsatisfied the test formula,then the third element S of the collective signature is calculated by the formula:

    Thus,the value par(E,S)is the collective digital signature,two components,of a collective of g signing groups on the document M.

    ? The procedure to verification the collective digital signature for g group signing on the document M:

    To check the validity of the signature received with the document M,the verifier performs the following steps:

    1.Calculate collective public keyYcolusing the formula:

    2.Calculate theR*using the following formula:

    3.Calculate theE*using the following formula:

    4.Compare E*with E.If E*=E:The received signature is valid;otherwise,it is invalid and will be rejected.

    ? The proof of the correctness of the RCS.01-3.1 scheme:

    The precision of this representative collective signature scheme is shown through:i)The existence of a shared signature verification formula shared by the signing team leaders;and ii)Existence of the test expression in the signature check procedure.

    a) Prove the correctness of the member’s signature:

    It is easy to see that the shared signature checking formulaSjshared by the signing team leaders always exists:

    b) Prove the correctness of the last signature:

    Conspicuously,the signature check expressionE*=Ealways exists:

    Thus,the expressionE*=Ealways exists:This proves that the correctness of the signature checking procedure scheme is always guaranteed.

    From(a)and(b):The correctness of the RCS.01-3.1 scheme is guaranteed.

    3.2 Constructing the Two-Element Collective Digital Signature Scheme for Signing Groups and Individual Signers(The RCS.02-3.2 Scheme)

    Suppose there is a signing collective consisting ofgsigning groups andmindividual signers,and want to create a representative collective signature on the document M.Assume that thej-thsigning group consists ofmsigning members (mj),these people are designated to participate in the formation of the group signature of thej-thsigning group(j=1,2,...,g),and each individual signer is considered as a one-member signing group.

    The input parameters,secret key,public key...are selected and calculated as the scheme RCS.01-3.1.

    ? The procedure for generating the collective digital signature for g signing groups and m individual signers on the document M

    Including these steps:

    1a.The GM of each group performs:

    - Generate a group signature according to the scheme for the GDS-2.2 signing group above and then sendRjto all GM of the signing groups in the signing collective.

    -Rjis the shared component of thej-thsigning group used to generate a random parameter of the collective signature.

    1b.Eachj-th:

    - Choose a random numbertjand calculate the random valueRjusing the following formula:

    - SendRjto all individual signers and other GMs in the signing collective.

    2.A GM or an individual signer in the collective calculates the values ofRandEby using the following formula:

    where:j=1,2,3,...,g+m.Eis the first element of the signature.

    3a.GM of each j-th group will:

    - Calculate the shared componentSjof thejgroup by using the following formula:

    - SendSjto other GM-s and other individual signers in the signing collective.

    3b.Eachj-thindividual signerj (j=g+1,g+2,...,g+m)will:

    - Calculate their shared componentSjby the following formula:

    - SendSjto other GM-s and other individual signers in the signing collective.

    4.A GM or an individual signer in the signing collective will:

    - Check the validity of eachSjby using the following formula:

    withj=1,2,...,gand

    withj=g+1,g+2,...,g+m

    - If all the conditions are satisfied,the third component of the group signature will be calculated by the formula:

    Thus,the value pair (E,S) is a collective signature,two components,of a collective consisting ofgsigning groups andmindividual signers on the document M.It represents this collective signing.

    ? The procedure for verification the collective digital signature for multiple signing groups and individual signers on the document M

    To check the validity of the signature received with the document M,the verifier performs the following steps:

    1.Calculate the collective public key of the signing collective by using the following formula:

    2.Calculate the random parameter value by using the following formula:

    3.Calculate the E*using the following formula:

    4.Compare E*with E.If E*=E:The received signature is valid;otherwise,it is invalid and will be rejected.

    ? The proof of the correctness of the RCS.02-3.2 scheme

    The precision of this representative collective signature scheme is shown through:i)The existence of a formula to check the shared signature Sjof each signing group;ii)The existence of the signature test formula shared Sjby each individual signer and iii)The existence of the test expressionE*=E.

    a) The correctness of the formula to check the shared signature of m group managers:

    Conspicuously,the formula for checking the shared signature of each group manager always exists:

    b) The correctness of the formula to check the shared signature per signer:

    Conspicuously,the formula for checking the shared signature of each group manager always exists:

    c) The correctness of the procedure for checking the representative collective signature:

    Conspicuously,the signature checking expression E=E*always exists.

    and calculate:

    Thus,the expression E*=E always exisits:This proves that the precision of the signature checking precedure,or the precision of the RCS.02-3.2 scheme is always guaranteed.

    From(a),(b)and(c):The correctness of the RCS.02-3.2 scheme is guaranteed.

    4 Security Analysis and Performance Evaluation

    4.1 Security Advantages of the Proposed Collective Signature Schemes

    The approved group signature and the approved group signature scheme has the following security advantages:

    ? The group signature in this paper is built based on the discrete logarithm problem on the prime finite field,so it inherits all the security advantages of this difficult problem.The same is true for the group approved digital signature scheme.

    ? Signing group members and the group manager can both use a pair of their private key and public key for both purposes:Forming private signatures and participating in group signature formation.As a result,this scheme can be fully deployed on existing PKI (Public Key Infrastructure)systems[14].

    ? The signer’s private key and secret keys are not used directly in the group signature formation process,nor are they passed on to the group manager and other members of the signing group.In this case,the security and privacy of the values involved are guaranteed.

    ? Using the group manager’s public key Y as the public key of the signing group makes it possible both to check the validity of the signature(of the verifier)and to change the set of participants that form the signature(of the group manager)have become much more convenient.

    ? The random parameterstiis treated as the second secret key of the signing group member.Unlike the first secret key,the private key,tirandomly chosen for each signature generation,i.e.,it is used only once.This results in also a random and unique R component in each group signature generated on document M.The“single-use”here enables the signing collective to generate different signatures across documents are different,although they still use the same original public key and private key pair.Thus,it is difficult for an attacker to use the signature collection method of the signing group on different documents to find out the secret components in the received signature set.

    The proposed representative collective signature scheme is built on the basis of the approved group signature scheme,so it fully inherits the advantages of this scheme.

    4.2 Performance of the Proposed Collective Signature Schemes

    We evaluate the computational performance of the two-element representative collective signature schemes by calculating the time cost that the scheme takes for the signature generation process(Signature generation procedure) and the need for the signature verification process (Signature verification procedure).The time costs of representative collective signature schemes proposed in this paper are shown in Tab.1.

    Notations:Th:Time cost of a hash operation inZp;Ts:Time cost of a scalar multiplication inZp;Tinv:Time cost of a inverse operation inZp;Te:Time cost of an exponent operation inZp;Tm:Time cost of a modular multiplication inZp.

    According to[15]:Th≈Tm,Ts≈29Tm,Tinv≈240Tm,Te≈240Tm,Tsqrt≈290Tm.

    Information from Tab.1 shows that the time cost for signature generation and signature checking of a two-element representative signature scheme is not much reduced compared to a three-element scheme[10],of course,if both Both schemes are built on the same difficult problem and/or the same digital signature standard.The advantage of the new representative collective signature scheme is that it still produces a shorter collective signature,but still ensures the security level and meets the basic requirements of a representative collective signature scheme.

    Table 1:Time cost of the proposed collective signature scheme:RCS.01-3.2 and RCS.02-3.3

    5 Discussion

    The pseudo-random number generation algorithm T[13]that we use is guaranteed to contain all the information of everyone who participated in informing the signature and it is also easy to identify the signer later.Indeed,when it comes to identifying those who have previously participated in the formation of the consent group signature,the group manager only needs to perform the following steps:

    - Use the group signature(E,S)to recalculate T by using the following formula:

    - Calculate:

    - And then recalculate the collective signature value using the formula:

    - Select a signing group(subset)consisting of any m members from the signing collective(this is a group of signers selected from the signing collective,they are assigned the task of creating a collective signature on document M):Use public key of this signing group to generate the collective public key.Use the newly computed collective public key to recalculate the Ecol||Scol:If this value is equal to the Ecol||Scolof(44),it is the people in this signing group who participated in the generation of the set signature body of collective sign;Otherwise,the group manager will choose another signing group and do the same until they find a signing group whose public key results in a matching E_col||S_col value pair(44).That is,iterate until the identifier is signed by the signers who have participated in the creation of the collective signature,then stop(Here accepted:The probability of coincidence is negligible).

    6 Conclusion

    A representative collective signature is a form of signature formed by a group of signatures whose members are drawn from different signing groups and/or are from individuals of the same level with the signatories.It is a requirement of this type of signature that it contains information regarding all signers who participated in the signing process.This information is needed for the identification of the signer and to solve the“repudiation”responsibility issue later.We have proposed and implemented a representative collective signature scheme that only has two components(E,S)while still meeting the requirements for a representative scheme.

    In[13],we proposed a approved group signature protocol that entails two components.The advantages of this protocol are i)All signer information is embedded in the collective signature(Ecol,Scol),precisely in the pseudo-random parameter T;ii)The group manager can easily identify all those who participated in the formation of the group’s consent group signature,this is possible thanks to the special structure of the parameter T;and iii)Only the group manager can perform the“opening”of the group signature to identify the signer since only this person knows must know the secret key z,a very important component in T.

    In addition to having the same security advantages of the three-component signature scheme and the consensus group signature protocol,the two-component collective signature scheme also exhibits the following capabilities:i)Helps to create signatures of shorter size,equal to|E|+|S|,but keeping the same level of security;ii)Helps to reduce time costs for signature generation and signature checking process.To achieve these advantages,the U component is removed from the signature,with the information of all signers whose signatures were used to form the signature stored in a pseudorandom parameter.

    In this paper,we use the discrete logarithm problem on a prime finite field to build the proposed collective signature,hence the signature size and time cost for the signature formation/checking process not significantly reduced.We have reason to believe that,if we use the discrete logarithm problem on the elliptic curve[16,17],combined with the GOST R34.10-2012 signature standard[18,19],to build a collective signature scheme representing two components,signature size,and associated time costs will be greatly reduced.This is our future work.

    Funding Statement:We received funding for this research from Duy Tan University,Danang,550000,Vietnam.https://duytan.edu.vn/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲午夜理论影院| 日韩免费av在线播放| 69精品国产乱码久久久| 一区二区日韩欧美中文字幕| av国产精品久久久久影院| 久久久久精品人妻al黑| 亚洲精品国产区一区二| 黑人欧美特级aaaaaa片| 久久久精品国产亚洲av高清涩受| 成人免费观看视频高清| 嫩草影视91久久| 曰老女人黄片| 国产aⅴ精品一区二区三区波| 国产精品偷伦视频观看了| 日韩 欧美 亚洲 中文字幕| 一级毛片女人18水好多| 国产熟女午夜一区二区三区| 欧美变态另类bdsm刘玥| 久久婷婷成人综合色麻豆| 一级毛片女人18水好多| 欧美精品一区二区免费开放| 亚洲精品一二三| 国产深夜福利视频在线观看| 中文字幕色久视频| 久久亚洲真实| a级片在线免费高清观看视频| 欧美成人午夜精品| 亚洲情色 制服丝袜| 亚洲欧美一区二区三区久久| 捣出白浆h1v1| 精品福利观看| 欧美一级毛片孕妇| 亚洲国产欧美一区二区综合| 宅男免费午夜| 国产成人欧美| netflix在线观看网站| 久久影院123| 久久天堂一区二区三区四区| av国产精品久久久久影院| 午夜精品久久久久久毛片777| 五月开心婷婷网| avwww免费| 久久久久久人人人人人| 中文字幕高清在线视频| 最黄视频免费看| 狠狠狠狠99中文字幕| 人妻一区二区av| 亚洲熟女毛片儿| 国产成人免费无遮挡视频| bbb黄色大片| 欧美黑人欧美精品刺激| h视频一区二区三区| 狠狠精品人妻久久久久久综合| 精品久久久精品久久久| 777米奇影视久久| 亚洲一区二区三区欧美精品| 国产精品麻豆人妻色哟哟久久| 欧美日韩中文字幕国产精品一区二区三区 | 在线观看舔阴道视频| 精品国产一区二区久久| 满18在线观看网站| 亚洲 国产 在线| 亚洲熟女毛片儿| 亚洲欧美日韩高清在线视频 | 波多野结衣一区麻豆| 美女高潮到喷水免费观看| 亚洲精品国产区一区二| 色综合婷婷激情| 丰满迷人的少妇在线观看| 国产熟女午夜一区二区三区| 日本a在线网址| 考比视频在线观看| 日本黄色视频三级网站网址 | 久久人人97超碰香蕉20202| 欧美激情久久久久久爽电影 | 另类亚洲欧美激情| 久热爱精品视频在线9| 成人精品一区二区免费| 欧美另类亚洲清纯唯美| 日本vs欧美在线观看视频| 中文字幕人妻丝袜制服| 国产精品二区激情视频| 亚洲美女黄片视频| 老司机亚洲免费影院| 国产成人欧美在线观看 | 夜夜爽天天搞| 亚洲欧美色中文字幕在线| 精品久久久精品久久久| 免费av中文字幕在线| 电影成人av| 人成视频在线观看免费观看| 精品国产一区二区三区久久久樱花| 成年人免费黄色播放视频| 1024香蕉在线观看| 欧美在线黄色| 十八禁高潮呻吟视频| 动漫黄色视频在线观看| 午夜激情av网站| 日日爽夜夜爽网站| 欧美激情 高清一区二区三区| 日本黄色日本黄色录像| 国产欧美亚洲国产| 99精品欧美一区二区三区四区| 女人久久www免费人成看片| 女性生殖器流出的白浆| av欧美777| 国产不卡av网站在线观看| 美女高潮喷水抽搐中文字幕| 99久久精品国产亚洲精品| 久久精品国产亚洲av香蕉五月 | 女同久久另类99精品国产91| 日韩免费av在线播放| 日韩视频在线欧美| 午夜福利欧美成人| 国产精品电影一区二区三区 | 两个人看的免费小视频| 国产有黄有色有爽视频| 国产又爽黄色视频| 亚洲av欧美aⅴ国产| 亚洲一码二码三码区别大吗| cao死你这个sao货| 91精品三级在线观看| 女人久久www免费人成看片| 精品久久蜜臀av无| 国产91精品成人一区二区三区 | 国产野战对白在线观看| 最新美女视频免费是黄的| 怎么达到女性高潮| 成人特级黄色片久久久久久久 | 久久精品亚洲精品国产色婷小说| 国产一区有黄有色的免费视频| 亚洲国产欧美一区二区综合| 18禁国产床啪视频网站| www.自偷自拍.com| 亚洲国产欧美日韩在线播放| 国产激情久久老熟女| 纵有疾风起免费观看全集完整版| 亚洲欧美色中文字幕在线| 色精品久久人妻99蜜桃| 午夜91福利影院| 久久久国产精品麻豆| 成人av一区二区三区在线看| 亚洲成国产人片在线观看| 久久av网站| 亚洲av片天天在线观看| 亚洲男人天堂网一区| 少妇裸体淫交视频免费看高清 | 午夜日韩欧美国产| 欧美精品啪啪一区二区三区| 久久av网站| 精品卡一卡二卡四卡免费| 久久精品91无色码中文字幕| 久久国产精品男人的天堂亚洲| 纯流量卡能插随身wifi吗| a在线观看视频网站| 咕卡用的链子| 19禁男女啪啪无遮挡网站| 欧美成人午夜精品| 美女扒开内裤让男人捅视频| 波多野结衣av一区二区av| 日本wwww免费看| 欧美成狂野欧美在线观看| 俄罗斯特黄特色一大片| 国产日韩欧美亚洲二区| 我要看黄色一级片免费的| 18禁黄网站禁片午夜丰满| a级毛片黄视频| 欧美 亚洲 国产 日韩一| 色播在线永久视频| 精品久久久精品久久久| 757午夜福利合集在线观看| 下体分泌物呈黄色| 激情视频va一区二区三区| 纯流量卡能插随身wifi吗| tube8黄色片| 一区福利在线观看| 宅男免费午夜| 黄片小视频在线播放| 老司机影院毛片| 99热国产这里只有精品6| 国产成人av激情在线播放| 丰满饥渴人妻一区二区三| 在线观看免费视频网站a站| 久久中文字幕人妻熟女| 美女主播在线视频| 欧美久久黑人一区二区| 精品少妇一区二区三区视频日本电影| 国产不卡一卡二| 国产福利在线免费观看视频| aaaaa片日本免费| 2018国产大陆天天弄谢| 视频区图区小说| 精品欧美一区二区三区在线| 99久久精品国产亚洲精品| 自拍欧美九色日韩亚洲蝌蚪91| 欧美另类亚洲清纯唯美| 久久精品人人爽人人爽视色| 午夜福利免费观看在线| 久久久久久久精品吃奶| 国产精品成人在线| 亚洲国产av新网站| aaaaa片日本免费| 老司机福利观看| 中文字幕最新亚洲高清| 国产免费视频播放在线视频| 91九色精品人成在线观看| 亚洲va日本ⅴa欧美va伊人久久| 午夜两性在线视频| 建设人人有责人人尽责人人享有的| 最新美女视频免费是黄的| 精品卡一卡二卡四卡免费| 一边摸一边抽搐一进一出视频| av免费在线观看网站| 成人av一区二区三区在线看| 日本五十路高清| av欧美777| 国产av一区二区精品久久| av天堂在线播放| 中文亚洲av片在线观看爽 | 午夜福利视频精品| 久久精品国产99精品国产亚洲性色 | 久久精品人人爽人人爽视色| 18禁国产床啪视频网站| 精品人妻1区二区| 两个人免费观看高清视频| 色精品久久人妻99蜜桃| 欧美精品av麻豆av| 免费看a级黄色片| 精品视频人人做人人爽| 免费女性裸体啪啪无遮挡网站| 欧美一级毛片孕妇| 色综合婷婷激情| 男人舔女人的私密视频| 怎么达到女性高潮| 91精品国产国语对白视频| 成人av一区二区三区在线看| 性高湖久久久久久久久免费观看| 99久久精品国产亚洲精品| 一本大道久久a久久精品| 国产日韩欧美亚洲二区| 亚洲av日韩在线播放| 亚洲精品国产一区二区精华液| 亚洲色图av天堂| 国产精品久久久人人做人人爽| 国产精品偷伦视频观看了| 一级毛片女人18水好多| 狠狠精品人妻久久久久久综合| 黄色视频,在线免费观看| 亚洲免费av在线视频| a级毛片黄视频| 欧美日韩亚洲综合一区二区三区_| 国产成人免费观看mmmm| 欧美 亚洲 国产 日韩一| 国产主播在线观看一区二区| 丝袜人妻中文字幕| 天堂8中文在线网| 老熟妇仑乱视频hdxx| 18在线观看网站| 久久毛片免费看一区二区三区| 色精品久久人妻99蜜桃| 黄色怎么调成土黄色| 美女视频免费永久观看网站| 亚洲中文av在线| e午夜精品久久久久久久| 免费日韩欧美在线观看| 久久亚洲精品不卡| 亚洲av国产av综合av卡| 色视频在线一区二区三区| 亚洲一区中文字幕在线| 日本欧美视频一区| 最近最新中文字幕大全免费视频| 多毛熟女@视频| 国产精品1区2区在线观看. | a级毛片黄视频| 欧美黄色片欧美黄色片| 99热国产这里只有精品6| 无限看片的www在线观看| avwww免费| 18在线观看网站| 精品国产乱子伦一区二区三区| 91字幕亚洲| 性色av乱码一区二区三区2| 久久午夜亚洲精品久久| 午夜久久久在线观看| av不卡在线播放| 日韩欧美国产一区二区入口| 90打野战视频偷拍视频| 国产97色在线日韩免费| 久久久久网色| 精品乱码久久久久久99久播| 香蕉国产在线看| 亚洲成人手机| videos熟女内射| 精品少妇黑人巨大在线播放| 精品亚洲成a人片在线观看| 亚洲中文av在线| 久久亚洲真实| 欧美中文综合在线视频| 久久 成人 亚洲| 国产精品麻豆人妻色哟哟久久| 欧美日韩亚洲综合一区二区三区_| 国产人伦9x9x在线观看| 伊人久久大香线蕉亚洲五| 69av精品久久久久久 | 欧美激情久久久久久爽电影 | 男女床上黄色一级片免费看| 如日韩欧美国产精品一区二区三区| 亚洲欧美日韩高清在线视频 | 亚洲伊人久久精品综合| 97人妻天天添夜夜摸| 国产在线视频一区二区| 色婷婷av一区二区三区视频| 久久 成人 亚洲| 亚洲少妇的诱惑av| 久久精品国产亚洲av高清一级| 免费久久久久久久精品成人欧美视频| 亚洲中文字幕日韩| 19禁男女啪啪无遮挡网站| 大码成人一级视频| 欧美成人午夜精品| 国产精品国产av在线观看| 狠狠婷婷综合久久久久久88av| 国产成人啪精品午夜网站| 欧美日韩黄片免| 国产一区二区三区在线臀色熟女 | 日韩欧美一区视频在线观看| 亚洲七黄色美女视频| 成人国语在线视频| 激情在线观看视频在线高清 | 亚洲欧美色中文字幕在线| 久久免费观看电影| 中文字幕色久视频| 一二三四在线观看免费中文在| 一本一本久久a久久精品综合妖精| 亚洲天堂av无毛| 女性被躁到高潮视频| 久久久国产欧美日韩av| 亚洲人成77777在线视频| 欧美黄色淫秽网站| 国产精品98久久久久久宅男小说| 精品国产一区二区三区四区第35| 在线av久久热| 久久精品亚洲精品国产色婷小说| 国产淫语在线视频| 交换朋友夫妻互换小说| 国产精品 欧美亚洲| 日本黄色视频三级网站网址 | 久久国产精品大桥未久av| 成人国产av品久久久| 日韩 欧美 亚洲 中文字幕| 久久精品人人爽人人爽视色| 在线永久观看黄色视频| 香蕉国产在线看| 在线 av 中文字幕| h视频一区二区三区| 欧美日韩视频精品一区| 欧美乱码精品一区二区三区| 国产不卡一卡二| 精品国产乱码久久久久久小说| 亚洲av片天天在线观看| 丝袜喷水一区| 午夜福利在线观看吧| 黄色a级毛片大全视频| av线在线观看网站| av网站免费在线观看视频| 国精品久久久久久国模美| 欧美+亚洲+日韩+国产| 国产成人精品久久二区二区91| 午夜免费鲁丝| 波多野结衣av一区二区av| 免费看十八禁软件| 脱女人内裤的视频| 婷婷成人精品国产| cao死你这个sao货| 丰满迷人的少妇在线观看| 久久久久久久国产电影| 另类亚洲欧美激情| 麻豆国产av国片精品| 无限看片的www在线观看| 欧美黑人欧美精品刺激| 老司机午夜十八禁免费视频| 香蕉久久夜色| 久久精品aⅴ一区二区三区四区| 久9热在线精品视频| 超碰成人久久| 宅男免费午夜| 在线av久久热| 黑人巨大精品欧美一区二区蜜桃| a在线观看视频网站| 精品国产国语对白av| 日韩视频在线欧美| 精品熟女少妇八av免费久了| 日韩一区二区三区影片| 亚洲欧美一区二区三区黑人| 黄色丝袜av网址大全| 亚洲 国产 在线| 51午夜福利影视在线观看| 国产精品秋霞免费鲁丝片| 国产精品 国内视频| 国产高清videossex| 97在线人人人人妻| 肉色欧美久久久久久久蜜桃| 国产99久久九九免费精品| 欧美变态另类bdsm刘玥| 中文字幕人妻熟女乱码| 久久精品亚洲熟妇少妇任你| 亚洲久久久国产精品| 欧美一级毛片孕妇| videos熟女内射| 中文字幕人妻熟女乱码| 777久久人妻少妇嫩草av网站| 美女高潮到喷水免费观看| 免费久久久久久久精品成人欧美视频| 亚洲精品国产区一区二| 1024视频免费在线观看| 丰满迷人的少妇在线观看| 日韩欧美一区二区三区在线观看 | av有码第一页| 免费久久久久久久精品成人欧美视频| 999精品在线视频| cao死你这个sao货| 啦啦啦中文免费视频观看日本| 久久久欧美国产精品| 久久精品国产99精品国产亚洲性色 | 精品久久蜜臀av无| 中文亚洲av片在线观看爽 | 亚洲精华国产精华精| 在线av久久热| 纯流量卡能插随身wifi吗| 黄片大片在线免费观看| 欧美 亚洲 国产 日韩一| 亚洲久久久国产精品| 午夜激情久久久久久久| 国产高清视频在线播放一区| 亚洲av国产av综合av卡| 色老头精品视频在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 人妻一区二区av| 国产精品偷伦视频观看了| 九色亚洲精品在线播放| 久久久久精品人妻al黑| 国产人伦9x9x在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产黄频视频在线观看| 国产在视频线精品| 久久久久精品人妻al黑| 搡老乐熟女国产| 精品视频人人做人人爽| 色综合欧美亚洲国产小说| 成人影院久久| 欧美在线一区亚洲| 丰满少妇做爰视频| 大香蕉久久网| 国产成人av教育| 黑人巨大精品欧美一区二区蜜桃| 日本av免费视频播放| 亚洲色图av天堂| 久久中文字幕人妻熟女| 搡老乐熟女国产| 亚洲第一av免费看| 亚洲伊人久久精品综合| 在线亚洲精品国产二区图片欧美| 欧美成狂野欧美在线观看| 色老头精品视频在线观看| 国产精品久久久久久人妻精品电影 | 欧美激情极品国产一区二区三区| 亚洲成a人片在线一区二区| 国产在线一区二区三区精| 精品国产乱码久久久久久小说| 悠悠久久av| 亚洲av欧美aⅴ国产| 国产成人免费无遮挡视频| tube8黄色片| 亚洲成国产人片在线观看| 久久久国产欧美日韩av| 欧美黄色淫秽网站| 天天躁狠狠躁夜夜躁狠狠躁| 国产极品粉嫩免费观看在线| 国产无遮挡羞羞视频在线观看| 91av网站免费观看| 真人做人爱边吃奶动态| 午夜福利,免费看| 午夜久久久在线观看| 欧美av亚洲av综合av国产av| 99热国产这里只有精品6| 亚洲精品中文字幕在线视频| 亚洲av国产av综合av卡| 亚洲色图av天堂| 亚洲精华国产精华精| 成年人午夜在线观看视频| 国产免费福利视频在线观看| 超碰成人久久| 国产一区二区激情短视频| 亚洲av日韩在线播放| 亚洲专区字幕在线| 五月开心婷婷网| 亚洲av片天天在线观看| 少妇裸体淫交视频免费看高清 | 亚洲精品久久成人aⅴ小说| 国产激情久久老熟女| 国产又色又爽无遮挡免费看| 亚洲国产欧美在线一区| 精品亚洲成国产av| 别揉我奶头~嗯~啊~动态视频| 激情视频va一区二区三区| 亚洲人成电影观看| 亚洲精品成人av观看孕妇| 久久久久国内视频| 午夜两性在线视频| 午夜福利在线观看吧| 成人特级黄色片久久久久久久 | 亚洲色图综合在线观看| 亚洲色图av天堂| 捣出白浆h1v1| 欧美人与性动交α欧美精品济南到| 丝袜在线中文字幕| 老司机午夜十八禁免费视频| 国产精品久久久av美女十八| 亚洲欧洲日产国产| 国产精品久久久人人做人人爽| 久久人妻av系列| 久久中文看片网| 国精品久久久久久国模美| 老司机影院毛片| 国产精品久久久久成人av| 久久久久精品人妻al黑| 久久 成人 亚洲| 国产一区二区三区在线臀色熟女 | 女人久久www免费人成看片| 咕卡用的链子| 男女免费视频国产| 曰老女人黄片| 免费人妻精品一区二区三区视频| 亚洲国产欧美日韩在线播放| 极品人妻少妇av视频| 极品少妇高潮喷水抽搐| 高清av免费在线| 日韩精品免费视频一区二区三区| 在线播放国产精品三级| 80岁老熟妇乱子伦牲交| 夫妻午夜视频| 日本精品一区二区三区蜜桃| 亚洲精品av麻豆狂野| 国产一区二区三区在线臀色熟女 | 久久这里只有精品19| 99国产极品粉嫩在线观看| 久久精品国产99精品国产亚洲性色 | 狠狠狠狠99中文字幕| 亚洲精品一卡2卡三卡4卡5卡| 午夜福利在线观看吧| 不卡一级毛片| 免费女性裸体啪啪无遮挡网站| 国产老妇伦熟女老妇高清| 精品免费久久久久久久清纯 | 99精品在免费线老司机午夜| 日韩欧美一区二区三区在线观看 | 侵犯人妻中文字幕一二三四区| 日韩欧美三级三区| 淫妇啪啪啪对白视频| 亚洲久久久国产精品| 国产麻豆69| 手机成人av网站| 啪啪无遮挡十八禁网站| 麻豆乱淫一区二区| 国产精品成人在线| 久久人人97超碰香蕉20202| 最新在线观看一区二区三区| 天天影视国产精品| 精品第一国产精品| 视频区欧美日本亚洲| 757午夜福利合集在线观看| 高清黄色对白视频在线免费看| 精品少妇一区二区三区视频日本电影| 亚洲熟女精品中文字幕| 91成人精品电影| 狂野欧美激情性xxxx| 男女无遮挡免费网站观看| 欧美黄色片欧美黄色片| 多毛熟女@视频| 一进一出好大好爽视频| 成人影院久久| 亚洲精品美女久久av网站| 中文字幕av电影在线播放| 日韩视频一区二区在线观看| 亚洲成人手机| 一二三四社区在线视频社区8| 国产成人欧美在线观看 | 免费在线观看影片大全网站| 老鸭窝网址在线观看| 少妇 在线观看| 女警被强在线播放| 日韩视频在线欧美| 精品第一国产精品| 亚洲精品国产精品久久久不卡| 咕卡用的链子| 久久亚洲真实| 亚洲中文字幕日韩| 欧美成狂野欧美在线观看| 极品少妇高潮喷水抽搐| 午夜久久久在线观看| 欧美日本中文国产一区发布| 在线观看免费高清a一片| 在线天堂中文资源库| netflix在线观看网站| 俄罗斯特黄特色一大片| 国产精品免费大片| 亚洲精品成人av观看孕妇| 91精品三级在线观看| 天天躁日日躁夜夜躁夜夜| 交换朋友夫妻互换小说| 999久久久精品免费观看国产| 国产欧美日韩综合在线一区二区| 国产男靠女视频免费网站| 法律面前人人平等表现在哪些方面| 亚洲精品粉嫩美女一区|