• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    2022-11-11 10:47:48GangXuYiboCaoShiyuanXuXinLiuXiuBoChenYiyingYuandXiaojunWang
    Computers Materials&Continua 2022年9期

    Gang Xu,Yibo Cao,Shiyuan Xu,Xin Liu,Xiu-Bo Chen,Yiying Yu and Xiaojun Wang

    1School of Information Science and Technology,North China University of Technology,Beijing,100144,China

    2School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,014010,China

    3Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,100876,China

    4School of Electronic Engineering,Dublin City University,Dublin,Ireland

    Abstract: With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search (PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further, the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly, we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result, which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least, through security analysis, our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.

    Keywords: Lattice cryptography; searchable encryption; blockchain; privacy protection;log system;information security;applied cryptography

    1 Introduction

    With the advancement of the big data period,more and more log files containing private data are being stored by data owners in the cloud,facing significant privacy threats and challenges.Searchable encryption is a technology for searching the log ciphertext based on keyword trapdoors.In this technology, data users can obtain the search trapdoors based on the searching keywords provided to the servicer.Then, the servicer executes a search algorithm to search for the matching ciphertext to correctly retrieve the data required by the user without recovering the plaintext,which significantly protects data privacy.At the beginning of the 21st century,Song et al.[1]put forward the new academic concept of searchable encryption for the first time.They completed the first research plan for the search problem of encrypted data.Further,searchable encryption can be divided into two categories,whether the encryption key and the decryption key are the same.The encryption key and decryption key of symmetric searchable encryption are the same,which cannot guarantee data security.Generally,it is only used when the owner and user of the log file are the same people,and it fails to satisfy most applications.

    In 2004, Boneh et al.[2] focused on searching for specific encrypted mailboxes to define the concept of Public-key Encryption with Keyword Search(PEKS)and gave a specific implementation.PEKS has different encryption and decryption keys, which can achieve the effect of sharing data information between data owners and data users so that searchable encryption can be applied to more practical scenarios.Many researchers have since improved and optimised the PEKS scheme to achieve faster search efficiency.Xu et al.[3] proposed Searchable Public Key Ciphertext with Hidden Structure(SPCHS),enabling the fastest possible search of keywords without compromising the encrypted keywords’contextual security.Cui et al.[4] proposed the concept of key aggregation searchable encryption and adopted the Key-Aggregate Searchable Encryption(KASE)scheme.In this scheme,the data owner is only required to issue a public key to the data users who share many files,which is helpful for the effective management of the key and makes this scheme easier to use in practical situations.Song et al.[5]proposed two searchable encryption schemes,FAST and FASTIO,to achieve forward privacy,dramatically improving I/O efficiency and reducing communication overhead.

    However, traditional PEKS faces the problem of the untrustworthiness of the servicer, which is fortunately solved to a certain extent by the emergence of blockchain technology.Blockchain,proposed by Nakamoto[6]in 2008,is a distributed public ledger that records all transactions into the block without third-party control and ensures the security and fairness of each transaction.At present,the vigorous development of blockchain technology is favoured by many researchers[7-16].Wang et al.[17] proposed a scheme that uses blockchain technology to store the hash value of users’private data and the attribute set of third-party applications,which realises secure one-to-many transmission of personal data.Xu et al.[18] avoided the intervention of third-party agencies through blockchain technology and established a multi-party security system.However,blockchain can solve the problem of the untrustworthiness of third-party organisations.Based on this idea, Li et al.[19] proposed a searchable encryption scheme (SSE-using-BC)based on blockchain technology, storing encrypted data on a decentralised blockchain.It avoids the intervention of centralised service providers and ensures the privacy of encrypted data.In 2019, Chen et al.[20] proposed a searchable encryption scheme for Electronic Health Records (EHR).Researchers used logical expressions to generate an EHR index and store it in the blockchain to ensure the EHR index’s immutability, integrity, and traceability.In 2020, Nie et al.[21] used searchable encryption to safeguard the privacy of data information and applied the Ethereum blockchain to solve the fairness problem in the search process.Chen et al.[22] designed a new Blockchain-based Searchable Public-key Encryption Scheme with Forward and Backward Privacy (BSPEFB), which largely avoids the adaptive leakage-exploiting attacks of searchable encryption technology in the Vehicle Social Network (VSN)and reflects the practicality of the scheme.

    Although the above scheme has improved the problem of the untrustworthiness of the service party in the searchable encryption process, with the rapid development of quantum computing[23], the Shor algorithm realises the rapid decomposition of large prime factors [24].As a result,malicious users with a quantum computer can launch a keyword guessing attack based on quantum computing,causing searchable encryption schemes based on traditional cryptography to lose security and privacy.As a result, more researchers have devoted themselves to proposing a post-quantum method.Nabil et al.[25] proposed that the traditional blockchain scheme is vulnerable to attacks by quantum adversaries.It designed the first post-quantum security signature scheme with public key re-randomisation by providing a deterministic wallet scheme with a post-quantum structure.However,lattice-based cryptography has the highest efficiency and low communication overhead among many post-quantum schemes,and is thus the most promising technology.

    In a nutshell,we propose a searchable encryption scheme based on lattice for log systems in the blockchain.Then,we describe our main contributions as follows:

    1.Firstly, we propose a searchable encryption scheme based on lattice cryptography to resist keyword guessing attacks under quantum computing.

    2.Secondly, blockchain technology is applied to replace the authoritative and trusted party in the scheme to ensure the honesty and credibility of the server.

    3.Finally, we conduct a security analysis of our scheme and compare it with other schemes,demonstrating its feasibility and efficiency.

    2 Preliminary

    Definition 1(Lattice)Suppose thata1,a2,...,am∈Rnaremlinearly independent vectors,then the set of linear combinations is called latticeL,denoted byL=L(A)={x1·a1+x2·a2+···+xm·am|xi∈Z},where the matrixA= {a1,a2,...,am} ∈Rn×mis called a basis ofL,mis called the rank ofL,andnis called the dimension ofL.Whenm=n,Lis called full rank.

    Definition 2(Dual Lattice)Suppose thatL(A) is the lattice composed of basesA∈Rn×m, then define the dual lattice as:L*={x∈Rn|〈x,y〉∈Z,?y∈L}.

    Definition 3(q-ary Lattice)Setqis a positive integer,given a matrixA∈Zn×mand vectoru∈Znq,we define:

    Obviously,Lq(A) andL⊥q (A) are dual lattices of each other, and(A) can be obtained by translation(A).

    Definition 4(Discrete Gaussian Distribution)Suppose thatDL,σ,cis a discrete Gaussian distribution defined on latticeLwith a vectorcas the center andσas a parameter,and the specific expression form is:such thatWhenc=0,it records asDL,σ.

    Lemma 1(TrapGen)[26]Supposeq≥2,andm≥2nlogq,TrapGen algorithm outputs a matrixA∈which is a statistically approximation to auniform distribution and the basisTA∈Zm×mof(A)satisfying‖TA‖≤O(nlogq)and

    Lemma 2(SamplePre)[27]SetTAis the basis of(A),the parametersand the vectoru∈,and then SamplePre algorithm outputs a vectorεthat is statistically close to,satisfyingAε=umodq.

    Lemma 3(SampleL)[28] Suppose a positive integerm >n,q >2, given a latticeL⊥q (A), setTAas the basis ofL⊥q (A), matrixB∈parameters, and vectoru∈Znq, then SampleL algorithm outputs a vectorε, which is statistically close toDL⊥q,s, satisfying(A|B)ε=umodq.

    Lemma 4(SampleR)[28] Suppose a positive integerm >n,q >2, given a lattice), setTBas the basis ofL⊥q (B), matrixA∈,R∈, parametersmax‖x‖=1‖Rx‖and vectoru∈Znq,then SampleR algorithm outputs a vectorεwhich is close tosatisfying(A|AR+B)ε=umodq.In particular,ifR∈{-1,1}m×m,then we obtain

    Lemma 5(Gaussian Sampling)[27] Knowing the centrec, parameterσ, and an implicit safety parameterpof a distribution,the algorithm randomly selects an integerx←Z ∩[c-σ·t,c+σ·t]and outputsxwith a certain probability andxis close toDZ,σ,c.

    Definition 5(ISIS problem)Suppose it is an integerq,matrixA∈,a real numberβ >0 and a vectorv,and there is a non-zero vectorεsatisfyingAε=vmodqand‖ε‖≤β.

    3 Design of Our Scheme

    3.1 Blockchain Architecture and Transaction Design

    The structure of the blockchain and transaction constructed in this paper is shown in Fig.1.The keyword ciphertext attribute and number attribute are added to the transaction.The keyword ciphertext attribute is formed by the data owner encrypting the keyword with the data user’s public key,and the number attribute records the number corresponding to the keyword.Based on this,the smart contract traverses the ciphertext of each keyword according to the search trapdoor uploaded by the data user and returns the number corresponding to the qualified keyword to the cloud storage platform.In this way,data owners and data users can share data.

    Figure 1:Blockchain and transaction structure

    3.2 Our Scheme Architecture

    The architecture of our scheme shows in Fig.2.The roles participating in this scheme include data owner,cloud storage platform,blockchain network,and data user.Their roles in the system are as follows:

    (1)Data owner.A data owner is the owner of the log file.He/she divides the log file,generates a number set,and extracts a valid keyword set to store the encrypted log file information in the cloud storage platform.In addition,he/she calculates the keyword ciphertext set corresponding to the log and then uploads the data index to the blockchain.The main problem faced by our scheme is that malicious users perform keyword guessing attacks under quantum computing on the keyword ciphertext,so our scheme focuses on the description of the encryption process of keywords.

    (2)Cloud storage platform.Cloud storage platform receives and stores the encrypted log file uploaded by the data owner.After getting the permission of the smart contract, the cloud storage platform returns the specific log file ciphertext to the data user.

    Figure 2:Scheme architecture

    (3)Blockchain network.By designing the algorithm in the smart contract,it receives the keyword ciphertext uploaded by the data owner and the trapdoor transmitted by the data user.After receiving a query request from a user, the query is performed according to a specific algorithm, and then the query result is returned to the cloud storage platform.The cloud storage platform is notified whether to send the ciphertext of the log file to the data user.

    (4)Data user.A data user is responsible for making a query request to the smart contract.Thus,he/she gets the ciphertext of the corresponding logfile from the cloud storage platform and obtains the plaintext of the log file after decryption.

    3.3 Related Algorithm Definition

    Definition 6The searchable encryption scheme based on lattice includes:

    (1)(p,pkown,skown,pkre,skre,$charge,$fund) ←Initialize(λ):We input the security parametersλof the architecture,output parametersp,the key held by the data owner(pkown,skown),the key held by the data user(pkre,skre),the single search price$charge of the blockchain,and the initial deposit value$fund of the data user.

    (2)(I,CF) ←Encrypt(F,pkown,skown,pkre): Firstly, the data owner generates a number setNand then takes the effective keywordsWi(1 ≤i≤n) in the log file under each number to generate a keyword setW= {W1,W2,...;,Wn}.Then, the data owner inputs the private keyskownand the public keypkreto encrypt the keyword set to obtain the ciphertextCW.Furthermore,we combineCWandNto get the data indexI,and the data index performs the chain operation.Finally,the log file is encrypted with the data user’s public keypkre,and the ciphertextFis obtained and uploaded to the cloud storage platform.

    (3)T←TrapGenerate(pkre,Wi):The algorithm takes the keywordWito be searched as well as the data user’s public keypkreas input.Then,the data user calculates and outputs the corresponding trapdoor T and uploads it to the blockchain network.

    (4)NW←Verify(I,T): The algorithm is executed by the smart contract in the blockchain.According to the indexItransmitted to the blockchain and the trapdoorTgenerated by the data user,the smart contract executes theVerifyalgorithm to search for the keyword ciphertext that matches the trapdoorT.If the corresponding ciphertext is found,the numberNWof the ciphertext will be returned to the cloud storage platform.

    4 Detailed Description of Our Scheme

    4.1 Initialise(λ)

    Initialise algorithm includes system initialisation, key initialisation, and blockchain network initialisation.In this algorithm, the system sets a series of parameters required for execution and distributes keys to the main participants of the system.The specific processInitialise(λ) is defined as follows:

    (1)System initialisation.A series of system parameters(n,m,q)are specified,where q is a prime number, and the system runs the initialisation program to generate the system parametersp.In this process, the system uses the input parameters to construct Znqand, selects a random vectorvfrom the Znq, and randomly selects two matricesM1andM2from the.Then, it sets the hash functionsrequired by the system and outputsp={n,m,q,v,M1,M2,H1,H2}.

    (2)Key initialisation.The system inputs the parameter p, Lemma 1 outputs the matrixMand the basisTof the latticeL(M) and satisfiesandMT= 0modq.Then, the system obtains the public-private key pair(pk,sk): =(M,T).Through the above process, the key(pkown,skown): =(Mown,Town)of the data owner and the key(pkre,skre): =(Mre,Tre)of the data user can be obtained,and then the system will transmit the generated key to the data owner and data user securely and confidentially.

    (3)Blockchain network initialisation.The data owner initialises the single search cost$charge on the blockchain network.The data user uses a unique identity ID to register an identity account on the blockchain network and set the deposit$fund of ID.

    4.2 Encrypt(F,pkown,skown,pkre)

    Encrypt algorithm includes log file encryption and keyword encryption.At this stage,this paper mainly studies the process of keyword encryption.The specific stepsEncrypt(F,pkown,skown,pkre)are as follows:

    (1)Preparation stage.The data owner will divide the log fileF,namelyF=(b1,b2,...,bn).After that, each division is numbered to generate a number setN=(1,2,...,n).Fori= 1,2,...,n,each keywordWiare extracted from each divisionbi.Finally, we obtain a keyword setW=(W1,W2,...,Wn).

    (2)Log file encryption.The data owner uses the public keypkreof the data used to encrypt each division of the log file and generates the corresponding log file ciphertextCbito form the ciphertext setThen,the data owner uploadsCFto the cloud storage platform.

    (3)Keyword encryption.The data owner randomly samples a vectorrand a noise vectoryin Znq.Then,for anyWi∈W,the data owner calculates:whereR∈{-1,1}.It is known that is the hash functionH1set by the system during the initialisation process.Then,the data owner randomly chooses a bitω∈{0,1}and calculates the corresponding hash valueAccording to Lemma 2,the data owner can obtain a vectorε,which satisfiesMownε=modq.In addition,the data owner calculates a parameter·ωfor each keyword ciphertext.The ciphertext corresponding to,and each division in the ciphertext corresponds to the number set to generate a ciphertext index

    (4)Keyword ciphertext uploading.The data owner uses the private key to generate a digital signature for the hash valueof each keyword ciphertext, generates the corresponding transaction,and submits the transaction to the master node.Then all nodes in the blockchain execute the consensus algorithm.The master node packs the transaction in a period together to form a block and then sends it to the slave node,which receives the block delivery by the master node and verifies the transaction in it.The verification process is as follows:the slave node extractspkownstored in the transaction from the node to decrypt and obtain the hash valueof the keyword ciphertext.Ifthe slave node announces that the verification is successful.Otherwise,the data may have been tampered with,and the slave node returns this transaction to the data owner.Assuming that the maximum number of malicious nodes that can exist in the consensus algorithm isf,if the number of verifications isNT >f+1,each node on the blockchain will store the block.

    4.3 TrapGenerate(pkre,Wi)

    The data user inputs their public keypkreand keywordWiintoTrapGenerate(pkre,Wi).According to Lemma 3,the algorithm generates a vectorTsatisfying(Mre|M1+M2·Wi)T=vmodq.Then,Twill be outputted as a trapdoor and sent to the consensus node on the blockchain.

    4.4 Verify(I,T)

    Before runningVerify(I,T), the smart contract will compare the value of the deposit$fund of data user ID and the single search cost $charge.If $fund<$charge, It returnsto the data user that the cost is insufficient.If $fund ≥$charge, the smart contract automatically executesVerifyto search for the keyword ciphertext and its number that match the user trapdoor in the data index set.Verifytakes data indexand trapdoorTas input.First,the algorithm enumerates the keyword ciphertextCWi (1 ≤i≤n)inI.For each ciphertext,calculate:then it can be concludedω= 1, otherwiseω= 0.Then the algorithm calculates the hash value, if it existsj∈[1,n] and satisfiesMreεj=modq,cWj′is the target keyword ciphertext corresponding to the trapdoorT.Finally,the numberNW=jof the keyword ciphertext is returned by the algorithm to the cloud storage platform.

    The cloud storage platform finds the ciphertext of the corresponding log file according to the index value and transmits it to the data user.To obtain the plaintext of the log file,the data user decrypts the ciphertext.

    Proof:For the method of restoring the value during the search and verification process,we give the proof as follow:

    5 Security Analysis

    5.1 Credibility

    This solution is based on the blockchain network,which can ensure the honesty and credibility of search results and primarily resist malicious attacks by illegal users on the server.The keyword search process does not involve any third parties in the decentralised blockchain network, and the nodes conduct open and transparent interactions based on transactions.All transactions and operations are recorded on the block.The characteristics of traceability and non-tampering can ensure the fairness and credibility of each search operation.In addition, each transaction initiated in the blockchain network requires the payment of a particular cost, which effectively avoids the possibility of illegal users undermining the program’s regular operation through malicious and exhaustive means.

    5.2 Unforgeability of Keyword Ciphertext

    In this scheme, the keyword ciphertext of the log file is unforgeable, its security can be reduced to ISIS hardness,and it effectively resists keyword guessing attacks initiated by illegal users equipped with quantum computers,thereby ensuring privacy of the plaintext.

    Theorem 1For any adversary A in polynomial time, the difficulty of forging the ciphertext of a keyword is equal to the difficulty of solving the difficult problem of ISIS currently.

    Proof:Assuming that adversary A cracks the unforgeability of the ciphertext with a non-negligible probability,it is equivalent to constructing a challenger C capable of solving ISIS problems.

    (1)Initialisation.Suppose adversary A initiates a keyword guessing attack on the system by forging the keyword ciphertext.In that case,challenger C executes the Setup algorithm to generate a series of parameters required by the system and sends the parameterspto adversary A.Then, C initiates an inquiry to the random prophecy and obtains the parametersMown*, which will be used as the public key of the data owner.Finally,C randomly selects a matrix∈as the data user’s public key and simultaneously dispatches two public keys to A.

    (2)Inquiry phase 1.For any ciphertextCWiwith differentω∈ {0,1} keywords, ifCWi=andw=w*, the challenger C calculatesH1(cW,ω) and returns it to adversary A, and addsto the list.Otherwise,C randomly obtainsεwhich obeys(Mown*),σaccording to Lemma 5,then calculatesH1(cW,ω)=Mown*εmodqand adds(CW,ω,H1(cW,ω))to the list.

    (3)Inquiry phase 2.For the keywordWi(1 ≤i≤n) that adversary A initiates an inquiry,challenger C calculatesand generates the first partcWiof the ciphertext.After obtainingεwhich obeysaccording to Lemma 5, challenger C will sendto adversary A.

    (4)Forgery phase.In this phase, adversary A will forge a ciphertextrelated to the keywordWi*(1 ≤i≤n).To begin with, A gets a trapdoorT*through Lemma 2 and sends it to challenger C.Then C calculates,thenω*=1,otherwiseω*=0,and returns a second partε*of the ciphertext of the key set forged by A.In this process,C cannot obtain information related to this ciphertext by asking a random oracle.Therefore,the keyword ciphertextis forged by A,which is a solution to ISIS hardness.

    Analysis:Assuming thatε*is a part of the effective keyword ciphertextCWi, and satisfyingmodq.If adversary A forges the keyword ciphertextwith probabilityp, it notices thatNis the number of times which the Inquiry phase 1 is executed in polynomial time.So, we obtain the probability that C successfully obtains the satisfying conditionis at least.Therefore,in the current situation,Challenger C has at least the advantageto break the assumption of ISIS hardness.In summary, the difficulty of adversary A forging the correct keyword ciphertext can be reduced to the difficulty of solving the ISIS hardness.

    6 Comprehensive Evaluation Analysis

    Our paper proposes a searchable encryption scheme based on lattice for log systems combined with blockchain.The test environment is a 64-bit Windows system with 16GB of memory.And the experimental process is completed by the local virtual machine Ubuntu 16.04.6.As shown in Tab.1,we compare the scheme in this paper with the schemes[30,31]in terms of methodology and hardness assumptions.

    Table 1: Comparison of methodologies and hardness assumption

    Through comparison,the common point between the literature[30]and our scheme is that they both use searchable encryption to ensure the fairness and credibility of the system environment.However, our scheme still provides the security of keyword ciphertexts facing quantum computing attacks.Consequently,the privacy of log files is well protected.

    After that, in order to compare the differences between the literature [31] and our proposed scheme in the trapdoor cost, verify algorithm cost, ciphertext size, and trapdoor size, Tab.2 defines the acronyms used in the experimental process,and Tab.3 shows the performance comparison results.

    Table 2: Glossary

    Table 3: Performance comparison

    Since our scheme uses the trapdoor generation algorithm based on lattice theory and mainly relies on the addition and multiplication of vectors, the overall efficiency of our scheme is superior to traditional cryptography.

    Fig.3 shows the changing trend of the keyword search time under not introducing the blockchain and introducing the blockchain.Since the search operation in the blockchain requires more cost for on-chain transactions,the keyword search time is increased,but the credibility and traceability of the search results can be guaranteed.However,with the linear growth in the number of keywords,the time spent in the blockchain transaction will become insignificant compared to the time used to search for keywords,so the time is less and less affected by the blockchain transaction time.

    Figure 3:Comparison of schemes

    7 Conclusion

    To solve the keyword guessing attacks launched by quantum attackers and the untrustworthiness of service providers,this paper designs and proposes a searchable encryption scheme based on lattice for log systems in the blockchain.The application of a lattice-based encryption algorithm makes the scheme resist quantum computing and ensures the security of the keyword ciphertext.At the same time, blockchain technology is employed to separate the keyword ciphertext search from the log file storage.Due to the keyword search is performed by designing a smart contract that ensures the reliability of the search results when the credibility of the servicer is unknown.According to the security analysis and experimental simulation, our scheme is secure in quantum attacks while being highly efficient.In the future,we will introduce forward security and optimize computational cost.

    Funding Statement:This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202101),NSFC(Grant Nos.62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology,the Natural Science Foundation of Inner Mongolia(2021MS06006),Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品无人区乱码1区二区| 成人毛片a级毛片在线播放| 听说在线观看完整版免费高清| 国产成人福利小说| 热99在线观看视频| 少妇高潮的动态图| 久久人妻av系列| 日韩一区二区视频免费看| 国产成人一区二区在线| 天美传媒精品一区二区| 欧美激情在线99| 看非洲黑人一级黄片| 久久久久久久久中文| 天美传媒精品一区二区| 久久人人爽人人爽人人片va| 亚洲国产欧美在线一区| 变态另类丝袜制服| or卡值多少钱| 我要搜黄色片| 日韩欧美三级三区| 日韩精品有码人妻一区| 午夜日本视频在线| 日韩,欧美,国产一区二区三区 | 全区人妻精品视频| 国产伦一二天堂av在线观看| 男人狂女人下面高潮的视频| 亚洲四区av| 国产亚洲最大av| 中文精品一卡2卡3卡4更新| av天堂中文字幕网| 麻豆一二三区av精品| 亚洲久久久久久中文字幕| 啦啦啦啦在线视频资源| 久久精品国产自在天天线| 亚洲经典国产精华液单| 国产精品麻豆人妻色哟哟久久 | 国产精品精品国产色婷婷| 欧美日韩精品成人综合77777| 小说图片视频综合网站| 亚洲三级黄色毛片| 亚洲一区高清亚洲精品| 最近中文字幕高清免费大全6| 亚洲av成人精品一二三区| 美女被艹到高潮喷水动态| 午夜激情福利司机影院| 舔av片在线| 国产伦精品一区二区三区视频9| 一区二区三区高清视频在线| 精品久久久久久成人av| 国产老妇伦熟女老妇高清| 视频中文字幕在线观看| 国产69精品久久久久777片| 日韩av在线大香蕉| 亚洲综合色惰| 久久久久久久久大av| 精品国产三级普通话版| 波多野结衣高清无吗| av福利片在线观看| 日本熟妇午夜| 三级经典国产精品| av天堂中文字幕网| 色网站视频免费| 国产高清不卡午夜福利| 久久久久国产网址| 国产淫语在线视频| 国产乱人偷精品视频| 啦啦啦韩国在线观看视频| 亚洲av成人精品一区久久| 成年免费大片在线观看| 精品欧美国产一区二区三| 国产高清有码在线观看视频| 综合色av麻豆| 色哟哟·www| 色哟哟·www| 久久久久久久国产电影| 插阴视频在线观看视频| 一本久久精品| 国产精品熟女久久久久浪| 国模一区二区三区四区视频| 国产私拍福利视频在线观看| 精品人妻偷拍中文字幕| 日韩成人伦理影院| 亚洲av不卡在线观看| 简卡轻食公司| 成人午夜精彩视频在线观看| 国内揄拍国产精品人妻在线| 久久久久久久亚洲中文字幕| 中文字幕熟女人妻在线| 日韩,欧美,国产一区二区三区 | 国产精品一区www在线观看| 久久久午夜欧美精品| 成人亚洲精品av一区二区| 久久久久久久久大av| 国产精品野战在线观看| 日本免费a在线| 国产免费一级a男人的天堂| 久久久久久久久久久免费av| 亚洲人成网站在线观看播放| 亚洲丝袜综合中文字幕| 免费观看精品视频网站| 精品久久久噜噜| 免费在线观看成人毛片| av在线播放精品| 亚洲精品乱久久久久久| 精品久久久久久久久亚洲| 午夜福利高清视频| 中文亚洲av片在线观看爽| 国产探花极品一区二区| 中文字幕久久专区| 女的被弄到高潮叫床怎么办| 男人狂女人下面高潮的视频| 丝袜喷水一区| 97超碰精品成人国产| 人人妻人人看人人澡| 免费一级毛片在线播放高清视频| 成年免费大片在线观看| 青春草国产在线视频| 99在线视频只有这里精品首页| 丝袜美腿在线中文| 国模一区二区三区四区视频| 超碰av人人做人人爽久久| 亚洲内射少妇av| 噜噜噜噜噜久久久久久91| 国产成人91sexporn| 亚洲欧美成人综合另类久久久 | 观看美女的网站| 亚洲av电影在线观看一区二区三区 | 久久久久久久久久成人| 亚洲无线观看免费| www.av在线官网国产| 久久亚洲国产成人精品v| 内地一区二区视频在线| 熟女人妻精品中文字幕| videossex国产| 超碰av人人做人人爽久久| 国产高清国产精品国产三级 | 亚洲精品,欧美精品| 男的添女的下面高潮视频| 三级男女做爰猛烈吃奶摸视频| 别揉我奶头 嗯啊视频| 蜜桃久久精品国产亚洲av| 高清毛片免费看| 亚洲在线观看片| 亚洲在线观看片| 亚洲人成网站在线播| 欧美另类亚洲清纯唯美| 亚洲av不卡在线观看| 韩国av在线不卡| 欧美丝袜亚洲另类| 久久国内精品自在自线图片| 欧美zozozo另类| 亚洲va在线va天堂va国产| 一夜夜www| 日韩强制内射视频| 欧美激情在线99| 中文乱码字字幕精品一区二区三区 | 成年版毛片免费区| av福利片在线观看| 欧美精品一区二区大全| 国产午夜精品论理片| 可以在线观看毛片的网站| 国产大屁股一区二区在线视频| 男人狂女人下面高潮的视频| 欧美xxxx性猛交bbbb| 2021少妇久久久久久久久久久| 性插视频无遮挡在线免费观看| 国产精品女同一区二区软件| 日本猛色少妇xxxxx猛交久久| 美女cb高潮喷水在线观看| 亚洲婷婷狠狠爱综合网| 久久6这里有精品| 精品免费久久久久久久清纯| 狂野欧美激情性xxxx在线观看| 国产一区二区在线av高清观看| 国产精品一区二区三区四区久久| 久久婷婷人人爽人人干人人爱| 免费观看a级毛片全部| 久久99精品国语久久久| 中文字幕av成人在线电影| 精品国产露脸久久av麻豆 | 国产精品美女特级片免费视频播放器| 久久久久性生活片| 少妇人妻精品综合一区二区| 欧美xxxx性猛交bbbb| 午夜福利成人在线免费观看| 国产高清三级在线| a级一级毛片免费在线观看| a级一级毛片免费在线观看| 日本一本二区三区精品| 国产 一区 欧美 日韩| 国产亚洲av片在线观看秒播厂 | 中国国产av一级| 免费大片18禁| 最近中文字幕高清免费大全6| 色播亚洲综合网| 亚洲国产精品成人综合色| 国产精品女同一区二区软件| 美女内射精品一级片tv| 狂野欧美白嫩少妇大欣赏| 三级国产精品片| 青春草国产在线视频| 99热这里只有精品一区| 亚洲丝袜综合中文字幕| 成人综合一区亚洲| 成人美女网站在线观看视频| 亚洲人成网站在线播| 免费观看性生交大片5| 日本wwww免费看| 午夜福利高清视频| 99久久精品一区二区三区| 成人二区视频| 久久久久网色| 色哟哟·www| 一边摸一边抽搐一进一小说| 亚洲精品日韩av片在线观看| 欧美不卡视频在线免费观看| 内射极品少妇av片p| 国产探花极品一区二区| 黄色一级大片看看| 一级黄色大片毛片| 日本免费在线观看一区| 寂寞人妻少妇视频99o| 午夜福利网站1000一区二区三区| 午夜福利高清视频| 中文欧美无线码| 黄片wwwwww| 久久亚洲精品不卡| 国产精品久久久久久精品电影| 免费av毛片视频| 国产高清视频在线观看网站| 有码 亚洲区| 国产精品精品国产色婷婷| 搡老妇女老女人老熟妇| 亚洲aⅴ乱码一区二区在线播放| 亚洲五月天丁香| 禁无遮挡网站| 欧美成人免费av一区二区三区| 如何舔出高潮| 亚洲美女搞黄在线观看| 日韩视频在线欧美| 看十八女毛片水多多多| 久久精品人妻少妇| 亚洲伊人久久精品综合 | 国产男人的电影天堂91| av卡一久久| 亚洲最大成人手机在线| 蜜桃亚洲精品一区二区三区| 成人综合一区亚洲| 人体艺术视频欧美日本| 黄片无遮挡物在线观看| 少妇丰满av| 亚洲国产精品sss在线观看| 黑人高潮一二区| 天美传媒精品一区二区| 亚洲精品影视一区二区三区av| 最后的刺客免费高清国语| 成人av在线播放网站| 欧美性感艳星| 直男gayav资源| 久久人人爽人人片av| 午夜精品在线福利| 观看美女的网站| 精品久久久久久久久av| 99在线人妻在线中文字幕| 国产亚洲91精品色在线| 国产精品人妻久久久影院| 午夜a级毛片| 三级国产精品欧美在线观看| 麻豆一二三区av精品| 亚洲欧美精品综合久久99| 午夜福利视频1000在线观看| 97在线视频观看| 国产一区二区在线观看日韩| 欧美精品一区二区大全| 精品国产一区二区三区久久久樱花 | 不卡视频在线观看欧美| 成人亚洲欧美一区二区av| 欧美最新免费一区二区三区| 午夜福利网站1000一区二区三区| 亚洲乱码一区二区免费版| av免费在线看不卡| 色哟哟·www| 免费搜索国产男女视频| 毛片女人毛片| 一级av片app| 啦啦啦观看免费观看视频高清| 亚洲最大成人中文| 天堂中文最新版在线下载 | 淫秽高清视频在线观看| 一区二区三区免费毛片| 久久久国产成人免费| 精品人妻一区二区三区麻豆| 一个人看视频在线观看www免费| av天堂中文字幕网| 22中文网久久字幕| 爱豆传媒免费全集在线观看| 我要看日韩黄色一级片| 日韩欧美精品免费久久| 啦啦啦啦在线视频资源| 波多野结衣巨乳人妻| 久久精品国产亚洲av涩爱| 午夜福利高清视频| 亚洲国产欧美在线一区| 一级二级三级毛片免费看| av国产久精品久网站免费入址| 日本黄色片子视频| 免费人成在线观看视频色| 国产精品乱码一区二三区的特点| 国内少妇人妻偷人精品xxx网站| 亚洲精品色激情综合| 亚洲高清免费不卡视频| 国产久久久一区二区三区| 国产成人a区在线观看| 美女被艹到高潮喷水动态| 99久久九九国产精品国产免费| 成人毛片60女人毛片免费| 国产一区二区三区av在线| 日韩三级伦理在线观看| 国产黄色小视频在线观看| 最近手机中文字幕大全| 干丝袜人妻中文字幕| 成人一区二区视频在线观看| 亚洲欧美日韩东京热| 在线a可以看的网站| 免费观看a级毛片全部| 嫩草影院精品99| 一级黄片播放器| 久久久久久久国产电影| 老师上课跳d突然被开到最大视频| 亚洲无线观看免费| 免费看a级黄色片| 丰满乱子伦码专区| 国产淫片久久久久久久久| av黄色大香蕉| 国产成人一区二区在线| 亚洲自拍偷在线| av在线天堂中文字幕| 最后的刺客免费高清国语| 日本黄色片子视频| 九九爱精品视频在线观看| 亚洲av中文字字幕乱码综合| 美女被艹到高潮喷水动态| 国产在视频线在精品| 尤物成人国产欧美一区二区三区| 99热这里只有是精品50| 亚洲久久久久久中文字幕| 国产单亲对白刺激| 久热久热在线精品观看| 免费在线观看成人毛片| 国产精品蜜桃在线观看| 尤物成人国产欧美一区二区三区| 日韩视频在线欧美| 18+在线观看网站| 日本熟妇午夜| 内射极品少妇av片p| 91狼人影院| 国产午夜精品论理片| 久久久久免费精品人妻一区二区| 亚洲成av人片在线播放无| 日本黄大片高清| 亚洲五月天丁香| 国产免费又黄又爽又色| 国产精品久久久久久久电影| 国产精品99久久久久久久久| 少妇被粗大猛烈的视频| 国产麻豆成人av免费视频| 国产精品乱码一区二三区的特点| 国产一区二区在线av高清观看| 亚洲精品乱码久久久v下载方式| 国产av码专区亚洲av| 91久久精品国产一区二区三区| 亚洲av不卡在线观看| 日韩av不卡免费在线播放| 一区二区三区免费毛片| 亚洲国产精品国产精品| av国产免费在线观看| 好男人在线观看高清免费视频| 日韩成人伦理影院| 黄片wwwwww| 我要看日韩黄色一级片| 国产伦精品一区二区三区视频9| 观看美女的网站| 麻豆精品久久久久久蜜桃| a级一级毛片免费在线观看| 日本黄大片高清| 亚洲一级一片aⅴ在线观看| 久久午夜福利片| 精品人妻一区二区三区麻豆| 亚洲成色77777| 精品国产三级普通话版| 狠狠狠狠99中文字幕| 超碰97精品在线观看| 人人妻人人看人人澡| 男人舔奶头视频| 久久久久久久午夜电影| 亚洲国产色片| 精品久久久噜噜| 大话2 男鬼变身卡| 日韩三级伦理在线观看| 春色校园在线视频观看| 免费人成在线观看视频色| 精品人妻偷拍中文字幕| 色综合站精品国产| 国产精品国产三级国产专区5o | 午夜福利高清视频| 噜噜噜噜噜久久久久久91| 91精品国产九色| 精品国产一区二区三区久久久樱花 | 日韩亚洲欧美综合| 99热这里只有是精品50| 日本黄色视频三级网站网址| 99久久精品热视频| 六月丁香七月| 乱码一卡2卡4卡精品| 精品熟女少妇av免费看| 亚洲av成人av| 久久精品夜色国产| 国产伦在线观看视频一区| 日本午夜av视频| 亚洲精品影视一区二区三区av| 尤物成人国产欧美一区二区三区| 国产午夜福利久久久久久| 国产成人精品婷婷| 麻豆av噜噜一区二区三区| 18+在线观看网站| 黄片wwwwww| 日韩亚洲欧美综合| 欧美日韩国产亚洲二区| 亚洲欧洲国产日韩| 亚洲国产色片| 国产探花在线观看一区二区| 男人舔奶头视频| 乱人视频在线观看| 久久久a久久爽久久v久久| av在线蜜桃| АⅤ资源中文在线天堂| 日韩 亚洲 欧美在线| 在线观看66精品国产| 又粗又硬又长又爽又黄的视频| 在线免费观看不下载黄p国产| 国产成人午夜福利电影在线观看| 免费观看a级毛片全部| 最近手机中文字幕大全| 亚洲丝袜综合中文字幕| 午夜福利在线在线| 国产高清有码在线观看视频| 丝袜喷水一区| 午夜福利在线在线| 观看美女的网站| 中文字幕人妻熟人妻熟丝袜美| 欧美又色又爽又黄视频| 亚洲国产最新在线播放| 综合色av麻豆| 日产精品乱码卡一卡2卡三| 国产精品,欧美在线| 最近2019中文字幕mv第一页| 成人亚洲精品av一区二区| 国产精品不卡视频一区二区| 亚洲欧洲国产日韩| 亚洲综合精品二区| av专区在线播放| 国产一级毛片七仙女欲春2| 欧美性感艳星| 成年免费大片在线观看| 久久久精品大字幕| 成人三级黄色视频| 狠狠狠狠99中文字幕| av在线老鸭窝| 日本免费一区二区三区高清不卡| 亚洲国产精品成人综合色| 国产探花在线观看一区二区| 久久精品国产自在天天线| 老司机影院成人| 女人久久www免费人成看片 | 人妻少妇偷人精品九色| 欧美不卡视频在线免费观看| 亚洲av男天堂| 亚洲人与动物交配视频| 国产精品一区二区三区四区免费观看| 国产精品一区二区三区四区久久| 极品教师在线视频| 人体艺术视频欧美日本| 国产亚洲最大av| 国产在视频线在精品| 亚洲精品久久久久久婷婷小说 | 熟女人妻精品中文字幕| 黄色一级大片看看| 有码 亚洲区| 国产乱人偷精品视频| 汤姆久久久久久久影院中文字幕 | 精品人妻偷拍中文字幕| 一个人观看的视频www高清免费观看| 51国产日韩欧美| 免费观看的影片在线观看| 亚洲国产精品成人久久小说| 一级av片app| 日产精品乱码卡一卡2卡三| 亚洲四区av| 久久久久久久久久久免费av| 欧美zozozo另类| 国产午夜精品论理片| 中文字幕熟女人妻在线| 秋霞伦理黄片| 床上黄色一级片| 国产精品电影一区二区三区| 午夜日本视频在线| 汤姆久久久久久久影院中文字幕 | 人人妻人人澡欧美一区二区| 97热精品久久久久久| 天堂影院成人在线观看| 99热精品在线国产| 日日撸夜夜添| 99热这里只有精品一区| 亚洲国产精品sss在线观看| 99热6这里只有精品| 2021少妇久久久久久久久久久| 亚洲欧美精品专区久久| 一本久久精品| 亚洲av二区三区四区| 亚洲国产欧美人成| kizo精华| 国产伦精品一区二区三区视频9| 国产综合懂色| 国产黄a三级三级三级人| 国产午夜精品一二区理论片| 日韩大片免费观看网站 | 欧美另类亚洲清纯唯美| 国产91av在线免费观看| 亚洲经典国产精华液单| 免费看美女性在线毛片视频| 97超碰精品成人国产| 成人特级av手机在线观看| 高清在线视频一区二区三区 | 只有这里有精品99| 亚洲欧美中文字幕日韩二区| 精品熟女少妇av免费看| 少妇猛男粗大的猛烈进出视频 | 汤姆久久久久久久影院中文字幕 | 亚洲精品日韩在线中文字幕| 插阴视频在线观看视频| 欧美人与善性xxx| 国产成人精品婷婷| 中文字幕人妻熟人妻熟丝袜美| 国产一区二区三区av在线| 国产一级毛片在线| 成人三级黄色视频| 午夜激情欧美在线| 小说图片视频综合网站| 六月丁香七月| 赤兔流量卡办理| 久久久午夜欧美精品| 亚洲av免费高清在线观看| 黄色一级大片看看| 岛国在线免费视频观看| 内射极品少妇av片p| 有码 亚洲区| 夜夜爽夜夜爽视频| 国产午夜精品久久久久久一区二区三区| 能在线免费看毛片的网站| 国产成人一区二区在线| 99在线人妻在线中文字幕| 别揉我奶头 嗯啊视频| 日日啪夜夜撸| 午夜福利视频1000在线观看| 熟女电影av网| 亚洲欧美日韩高清专用| 男的添女的下面高潮视频| 国产人妻一区二区三区在| 亚洲精品亚洲一区二区| 一区二区三区乱码不卡18| 久久久久久大精品| 麻豆av噜噜一区二区三区| 久久精品91蜜桃| av在线播放精品| 国产精品人妻久久久久久| 亚洲一级一片aⅴ在线观看| 成人鲁丝片一二三区免费| 亚洲av日韩在线播放| 一个人观看的视频www高清免费观看| a级一级毛片免费在线观看| 国产精品久久久久久精品电影| 99热全是精品| 午夜福利高清视频| 免费观看人在逋| 青春草视频在线免费观看| 久久精品夜夜夜夜夜久久蜜豆| 三级毛片av免费| 国产白丝娇喘喷水9色精品| 成人特级av手机在线观看| 中文在线观看免费www的网站| 久久久久久九九精品二区国产| 99久国产av精品国产电影| 精品熟女少妇av免费看| 99久国产av精品国产电影| 国内精品美女久久久久久| 日韩亚洲欧美综合| 亚洲国产高清在线一区二区三| 亚洲四区av| 亚洲精品乱码久久久久久按摩| 少妇人妻精品综合一区二区| 国产高潮美女av| 亚洲四区av| 亚洲av中文av极速乱| 国产真实乱freesex| 在线观看av片永久免费下载| 国产精品国产三级国产专区5o | videossex国产| 国产成人精品久久久久久| 国产亚洲av嫩草精品影院| 我的老师免费观看完整版| 少妇熟女欧美另类| 精品人妻视频免费看| 99久国产av精品| 亚洲欧美成人综合另类久久久 | 菩萨蛮人人尽说江南好唐韦庄 |