• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identity-Based Encryption from Lattices with Small Cipher Size

    2022-12-04 07:40:10WANGZiqingTANGDianhuaandLIFagen
    電子科技大學學報 2022年6期

    WANG Ziqing, TANG Dianhua,2*, and LI Fagen

    (1. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 611731;2. The 30th Research Institute of China Electronic Technology Group Corporation Chengdu 610041)

    Abstract Identity-based encryption (IBE) is very attractive because it does not have certificate management issues. However, the IBEs based on the bilinear Diffie-Hellman problem cannot resist quantum attacks. In order to ensure security under quantum attacks, lattice-based IBE is proposed. However, the existing lattice-based IBEs usually not only have a large ciphertext size but also can only encrypt a few bits of plaintext information in one ciphertext. In this paper, we propose a new lattice-based IBE scheme based on learning with errors (LWE) and its ring version. For the setting l=n, our scheme can encrypt the plaintext twice long of other schemes in one ciphertext. Then we prove that our scheme can achieve the indistinguishability of ciphertexts against adaptively chosen identity and chosen plaintext attack (IND-ID-CPA) in the random oracle.

    Key words IBE; lattice-based cryptography; LWE; ring LWE Received date: 2022 - 01 - 04; Revised date: 2022 - 03 - 01

    Identity-Based encryption (IBE) was first proposed by Shamir[1]in 1985. Compared with public key infrastructure (PKI), the public keys of users in IBE schemes are derived directly from identities like e-mail addresses or phone numbers instead of being generated by users. The private keys are generated and distributed to users by a trusted authority (TA) who has a master key. As TA will guarantee that the private keys are sent to the users with the corresponding identities, IBE does not have certificate management problems. The IBE schemes based on the bilinear Diffe-Hellman problem may face the threat of quantum attacks. However, since there is no quantum algorithm that can effectively solve the hard problems of lattice, the lattice-based IBE schemes are considered to be able to maintain the security under quantum attacks. In 2008, Ref. [2] proposed the first latticebased IBE named GPV, which is based on learning with errors (LWE) problem[3]. The scheme achieves indistinguishability of ciphertexts against adaptively chosen identity and chosen plaintext attack (IND-IDCPA) under random oracle. The random oracle model assumes that the adversary can not attack the hash function and the standard oracle doesnot have this assumption, which means that the standard model has better security. In 2010, Ref. [4] proposed the first lattice-based IBE scheme under the standard model.However, the IBE schemes under the standard model have larger size of parameters and ciphertext than the IBE schemes under the random oracle. In the same year, Ref. [5-6] proposed some more efficient latticebased IBE schemes under the standard model. The above schemes use the trapdoor generation algorithm to generate a uniformly random matrix and a short basis. The trapdoor generation algorithm was proposed by Ref. [7] in 1999 and then improved by Ref. [8] in 2009. In 2012, Ref. [9] gave a new method to generate trapdoors for lattices. The size of the output matrix of their algorithm is smaller than that of previous work.They also gave the trapdoor generation algorithm that can be used for ring. To reduce the size of public parameter and ciphertext, in 2016, Ref. [10] proposed an IBE scheme based on RLWE. In 2018, Ref. [11]proposed another RLWE-based IBE scheme with smaller ciphertext size than Katsumata’s[10]. Ref. [12]proposed a RLWE-based IBE with short parameters in 2020. The encryption of the above schemes can be seen as a variant of dual Regev PKE[2], which makes these schemes have large ciphertexts.

    In this paper, we propose a new LWE-based IBE scheme with a small size of ciphertext. We also give the ring version of our scheme. The proposed scheme is IND-ID-CPA secure under the random oracle.Compared with GPV[2], if we set the parameterl=n,the length of the plaintext that our scheme can encrypt is twice of GPV’s[2]without the increase of ciphertext size.

    1 Preliminaries

    1.1 Notation

    The base of logarithmic used in this paper is always 2. We use Zqto represent Z∩[0,q) whenqis a positive integer. ■r■ represents the nearest integer of the real numberr. When the value ofris the middle value of the two nearest integers, it is rounded up.■r」represents round down operation. We use lowercase bold letters to represent column vectors, such as a.Specifically, 0 represents the zero vector. We use |r| to represent the absolute value of the numberr. The dot product operation of vectors is represented as 〈·,·〉.x←Dmeans thatxis sampled from the distributionD. WhenDis a finite set, it means being uniformly sampled fromD. In particular, we useDZq,σto represent a discrete gaussian distribution with the parameter σ on Zq. We use capital bold letters to denote matrices. | |·||∞r(nóng)epresents the infinite norm and||·||represents the Euclidean norm. The Gram-Schmidt order orthogonalization of matrixAis denoted byA?. We useRqto represent Zq[x]/(xn+1).

    1.2 Lattices and Hard Problems

    It has been proved that the decision LWE problem is as hard as some worst-case hard problems onn-dimensional lattices under a quantum reduction.

    Ref. [15] proved that whens←DZnq,αq, the LWE problem is still hard. This form of LWE is called normal form LWE.

    Definition 4[16](ring learning with errors(RLWE)) For integersn≥1,q≥2, a real number α ∈(0,1), a uniformly random elements∈Rq, we can define a distribution R LWEn,q,αoverRq×Rqas this:

    wherea←Rqande←DRq,αq.

    The RLWE problem and its normal form have also been proved as hard as some worst-case hard problems on lattices under a quantum reduction.

    1.3 Algorithms

    The paper introduces some algorithms for lattices which are important for building a encryption scheme.

    Lemma 4[18]There exists a PPT algorithm SamplePre(a,Ta,u,σ) that can output a vectorx∈Rmqwhich satisfiesaTx=uand follows a discrete gaussian distribution of parameter σ.TAis the trapdoor ofa.

    2 The IBE Scheme

    The IBE scheme uses the TrapGen and SamplePre algorithms to generate the master public key, master secret key and users' secret keys, which is similar with other LWE-based IBE schemes. The main difference between our scheme and others is in the encryption. Compared with other LWE-based schemes, the first part of ciphertexts of our scheme can also encrypt messages. While other schemes only encrypt the message in the second part of ciphertexts.This makes our scheme encrypt more bits than other schemes. To encrypt messages, our scheme uses LWE instances to mask the plaintext. As the LWE instances(A,As+e)are indistinguishable from uniformly random,As+e+ΔmandAs+e+AΔmwill also be indistinguishable from uniformly random vector,where Δ isq/2.

    2.1 Construction Based on LWE

    Our IBE scheme is described as follows:

    Setup(1λ): The PKG chooses an odd prime numberq>2, positive integersn,m,l,k, a real number σand a hash functionsH:{0,1}k→Znq×n×Znq×l, wherekis the length of an identity andlis the length of the second part of message. The first part of the output ofHis an invertible matrix. Then it runs TrapGen(n,m,q)to generate a uniformly random matrixA∈Znq×mand a short basisTA∈Zmq×mof the lattice Λ⊥q(A). The PKG sets the master public key mpk=Aand master secret key msk=TA. Finally, the PKG publishes the parameters p aram=(n,m,l,q,σ,A,H).

    2.2 Correctness

    Theorem 1 The decrypt algorithm can recover the message from ciphertext correctly if the following inequations are hold.

    2.3 Security

    We first give the definition of IND-ID-CPA.Then we prove that our scheme can achieve IND-IDCPA security.

    Definition 5 For a IBE scheme P(Setup,Extract, Enc, Dec), a challengerCand an adversaryA,the IND-ID-CPA game is described as follows.

    SetupCruns the Setup algorithm to generate the public parameters param, master public keympk and master secret key msk, then sends param andmpk toA.

    Phase 1Acan make secret key extraction queries for any identity id. The challengerCruns Extract(p aram,id,msk ) to generate the secret keysk and sends it toA.

    ChallengeAselects an identity id*which has not been queried in phase 1 and two different messagesm0,m1and sends them toC.Crunsc←Enc(p aram,id*,mb) and responsesctoA, wherebis a uniformly random bit.

    Phase 2Acan repeat Phase 1. The only restriction is that he can’t query the secret key of i d*.

    GuessAoutputs a bitb′.

    If there does not exist any polynomial adversaryAthat achieves non-negligibleAdv(A)=|Pr[b′=b]-Pr[b′≠b]|, we say thatPis IND-ID-CPA secure. If the target identity is submitted before the setup, the game is named indistinguishability of ciphertexts against selectively chosen identity and chosen plaintext attack(IND-sID-CPA).

    Theorem 2 If there exists a polynomial adversaryAthat can break the IND-ID-CPA secure of the scheme described in section 3.1 in the random oracle model, then there exists a polynomial algorithm that can solve the normal form decision-LWE problem.

    Proof We show that how to use the adversaryAto construct an algorithmCthat can answer the normal form LWE oracleO. We setCto be the challenger of the IND-ID-CPA game. First,Cqueries the oracleOand getsm+linstances (ai,bi)∈Znq×Zq. ThenCuses these instances to combine two matricesA1∈Zmq×n,A2∈Zlq×nand two vectorsb1∈Zmq,b2∈Zlq,where every row of matrices isaiand every component of vectors isbi. The rank of the matrixA1must ben. If not,Ccan repeat the query until he gets a ranknmatrix. After this,Cperforms the game withAas follows.

    SetupCgenerates the public params of the IBE scheme as follows.

    Secret key queries WhenAqueries the secret key for an id,Csearches the saved tuple (Q,id,U1id,U2id,S1id,S2id) from the history of the hash oracle query. (We assume that every id has been queried in hash query before secret key query.) IfS1id=⊥ andS2id=⊥,Caborts and outputs a random bit. Else,Creturns (S1id,S2id) toA.

    If the instances returned byOare uniformly random vectors, the challenge ciphertext is uniformly random and completely hides the information ofb. If the instances returned byOare normal LWE instances,then the challenge ciphertext will be a valid encryption of mbfor identity i d*.

    Acan make more secret key queries after the challenge phase with the restriction that it can’t make the secret key query for identity id*. After that,Aoutputs a bitb′toC. Ifb′=b,Coutputs 1, elseCoutputs 0.

    IfCdose not abort, the interaction between oracleO, algorithmCand adversaryAwill be as shown in Figure 1.

    By a standard argument,Cwill not abort during the game with the probability 1/QH. IfCdoes not abort, it means that the target identity submitted byAis the identity queried by theI-th hash query. In this case, if the challenge ciphertext is uniformly random,the probabilityb′=bis 1/2. (Which means that the instances returned byOare uniformly random.) If the challenge ciphertext is a valid encryption, the probabilityb′=bis 1/2+Adv(A). (Which means that the instances returned byOare LWE instances.) So the advantage thatCcan distinguish LWE instances from uniformly random vectors is Adv(A)/QH. Thus, ifAhas an non-negligible advantage to break the IND-IDCPA security, thenChas a non-negligible advantage to solve decision normal LWE problem.

    Fig. 1 The interaction between O,C and A.

    2.4 Construction Based on RLWE

    Our ring version IBE scheme is described as follows:

    Setup(1λ): The PKG chooses positive integersn,m,q,k,l, two real number σ,θ and a hash functionsH:{0,1}l→Rq×Rq, wherelis the length of an identity. The first part of the output ofHis an invertible element ofRq. Then PKG runs TrapGen(n,m,q,θ) to generate a random vectora∈Rmqand a short basisTa∈R(qm-k)×kof the lattice Λ⊥q(a). The PKG sets the master public key mpk=aand master secret key msk=Ta. Finally, the PKG publishes the parametersparam=(n,m,l,q,k,σ,θ,a,H).

    The proof is similar as that in section 3.2, so we omit it.

    Assume that the decision-RLWE problem is hard,the ring version IBE is IND-ID-CPA secure. The proof of the security of the ring version IBE is similar as that in section 2.3, so we omit it.

    3 Comparison

    We compare the correctness conditions for our scheme with the conditions for GPV[2]and ABB[5]. The security model and the error term in the decryption results of our scheme, GPV[2]and ABB[5]are listed in Table 1. (The schemes used for comparison are multi bits encryption version.)

    Table 1 Correctness condition of three schemes

    The correctness condition of our scheme is similar with GPV[2]. The difference between GPV[2]and our scheme is that our scheme needs to guarantee the second inequation. As we can set the distribution parameters of secret random vectore1to be the same as the distribution parameters ofe2, the second inequation will always hold as long as the first inequation holds. Thus, the parameter setting of GPV[2]can be used for our scheme without losing correctness and security. ABB[5]has more decryption noise because of the standard model. The length of the error term used in ABB's[5]encryption is 2m. The distribution of the outputs of S ampleLeft is the same as the outputs of S amplePre except the length of outputs.Therefore, the parameter setting that guarantee the correctness of ABB[5]can also guarantee the correctness of our scheme.

    Compared with other lattice-based IBE schemes,our scheme can encrypt more bits in a ciphertext,which means that our scheme can achieve smaller ciphertext size than other lattice-based IBE schemes when the length of the plaintext is fixed. To encrypt more bits, the size of secret key of our IBE scheme is bigger than that of other schemes. However, the ratio of the size of secret key to the size of plaintext is not greater than that of other schemes. The comparison of the ciphertext size, secret key size and plaintext size is shown by Table 2. To encryptklbits, one can just divide it intokpieces and encrypt each piece to getkciphertexts. However, the ratio of the ciphertext size to the plaintext size of each scheme will not be changed,as every ciphertext only corresponds to a piece of plaintext withlbits.

    Table 2 Comparison of ciphertext size, secret key size and plaintext size

    When the parametersn,m,l,qof schemes are chosen, our scheme can encryptl+nbits in a ciphertext whose size is (m+l)logq, while other LWEbased schemes can only encryptlbits in a ciphertext with the same ciphertext size. Ifl=n, the length of message that our scheme can encrypt is twice of other schemes, and the size of the ciphertext is not bigger than that of other schemes.

    The disadvantage of our scheme is the computation cost. Our scheme needs to perform one more discrete gaussian sampling and vector addition in encryption than other schemes. In decryption, our scheme needs to perform two more matrix multiplications, and one more vector subtraction.However, as our scheme is able to transmitnmore bits, we think the performance penalty of adding these computations is acceptable.

    4 Conclusion

    In this paper, we propose an IBE scheme and its ring version based on LWE/RLWE problem and prove that our schemes is IND-ID-CPA secure under the random oracle model. Compared with previous latticebased IBE schemes, the computation cost of encryption and decryption of the proposed schemes is more than others, but our schemes can encrypt more message without increasing the size of ciphertext.

    亚洲欧美日韩另类电影网站| 这个男人来自地球电影免费观看| 久久婷婷成人综合色麻豆| 午夜激情久久久久久久| 国产在线视频一区二区| 女人被躁到高潮嗷嗷叫费观| 真人做人爱边吃奶动态| 亚洲国产av影院在线观看| 亚洲九九香蕉| 午夜福利一区二区在线看| 侵犯人妻中文字幕一二三四区| 亚洲欧美一区二区三区久久| 美女扒开内裤让男人捅视频| 精品国产一区二区久久| 国产成人精品久久二区二区91| 国产精品香港三级国产av潘金莲| 国产精品熟女久久久久浪| 国产亚洲午夜精品一区二区久久| 午夜福利在线观看吧| 欧美变态另类bdsm刘玥| 亚洲成人免费电影在线观看| 高潮久久久久久久久久久不卡| 69精品国产乱码久久久| 性高湖久久久久久久久免费观看| 国产男靠女视频免费网站| 中文字幕精品免费在线观看视频| 欧美黄色淫秽网站| 国产精品偷伦视频观看了| 亚洲精品美女久久av网站| 亚洲成人免费av在线播放| 婷婷成人精品国产| 国产精品99久久99久久久不卡| 国产人伦9x9x在线观看| 黄频高清免费视频| 啦啦啦免费观看视频1| 超碰97精品在线观看| 在线观看免费高清a一片| 极品人妻少妇av视频| 久久天躁狠狠躁夜夜2o2o| 欧美日本中文国产一区发布| 日韩视频在线欧美| 国产在线观看jvid| 欧美在线黄色| 1024香蕉在线观看| 日韩制服丝袜自拍偷拍| 一本大道久久a久久精品| 亚洲国产欧美网| 日韩大片免费观看网站| 在线观看免费日韩欧美大片| 日韩人妻精品一区2区三区| 精品福利永久在线观看| 在线看a的网站| 一个人免费看片子| 在线 av 中文字幕| 国产精品一区二区在线不卡| 国产精品偷伦视频观看了| 免费高清在线观看日韩| 一二三四社区在线视频社区8| 久久久精品免费免费高清| 不卡一级毛片| 亚洲av片天天在线观看| 亚洲avbb在线观看| 精品国产乱码久久久久久小说| 精品久久久久久久毛片微露脸| 亚洲,欧美精品.| 热99久久久久精品小说推荐| 另类亚洲欧美激情| 在线观看免费视频日本深夜| 国产高清国产精品国产三级| 欧美精品一区二区免费开放| 国产亚洲精品久久久久5区| 男女床上黄色一级片免费看| 无遮挡黄片免费观看| 国产成人欧美| 热99国产精品久久久久久7| 天堂8中文在线网| www.熟女人妻精品国产| 人人妻人人澡人人看| 亚洲一码二码三码区别大吗| 亚洲成av片中文字幕在线观看| 亚洲国产毛片av蜜桃av| 建设人人有责人人尽责人人享有的| 大片免费播放器 马上看| 夫妻午夜视频| 极品人妻少妇av视频| 丝袜人妻中文字幕| 天天添夜夜摸| 亚洲视频免费观看视频| 精品亚洲成a人片在线观看| 日韩中文字幕欧美一区二区| 不卡av一区二区三区| 亚洲欧美一区二区三区久久| 男女高潮啪啪啪动态图| 欧美一级毛片孕妇| 99热网站在线观看| 日本vs欧美在线观看视频| 首页视频小说图片口味搜索| 久久免费观看电影| 国产伦人伦偷精品视频| 国产精品 国内视频| 国产欧美亚洲国产| 一区福利在线观看| 极品少妇高潮喷水抽搐| 999久久久精品免费观看国产| 两性午夜刺激爽爽歪歪视频在线观看 | 高清视频免费观看一区二区| 色在线成人网| 纯流量卡能插随身wifi吗| 成年版毛片免费区| 99九九在线精品视频| 亚洲情色 制服丝袜| 国产男女内射视频| 日本一区二区免费在线视频| 最近最新免费中文字幕在线| 天天添夜夜摸| 91成年电影在线观看| 国产真人三级小视频在线观看| 午夜福利欧美成人| 欧美在线黄色| 亚洲男人天堂网一区| 99re6热这里在线精品视频| h视频一区二区三区| av天堂在线播放| 久久久精品区二区三区| 岛国在线观看网站| 亚洲成人手机| 日日摸夜夜添夜夜添小说| 久久影院123| 中文字幕最新亚洲高清| 成人国产av品久久久| 久久久国产一区二区| 免费久久久久久久精品成人欧美视频| 久久久精品94久久精品| 亚洲国产av影院在线观看| 亚洲人成电影免费在线| tocl精华| 欧美日韩福利视频一区二区| aaaaa片日本免费| 欧美日韩亚洲国产一区二区在线观看 | svipshipincom国产片| 国产欧美日韩综合在线一区二区| 国产成人影院久久av| 午夜老司机福利片| 国产97色在线日韩免费| 亚洲国产av新网站| 一区在线观看完整版| 国产精品亚洲av一区麻豆| 大片电影免费在线观看免费| 亚洲 欧美一区二区三区| 超碰成人久久| 日韩中文字幕欧美一区二区| av不卡在线播放| 一级毛片精品| 久久人人爽av亚洲精品天堂| 久久人妻av系列| 黑人欧美特级aaaaaa片| 久久人妻av系列| 久久久久久久久免费视频了| 久久人人爽av亚洲精品天堂| 国产成人免费无遮挡视频| 女人爽到高潮嗷嗷叫在线视频| 国产精品熟女久久久久浪| 激情视频va一区二区三区| 亚洲欧美激情在线| 变态另类成人亚洲欧美熟女 | 成人18禁在线播放| 国产精品久久电影中文字幕 | 欧美日韩中文字幕国产精品一区二区三区 | 最近最新免费中文字幕在线| 纵有疾风起免费观看全集完整版| 天天添夜夜摸| 国产有黄有色有爽视频| av网站免费在线观看视频| 男女下面插进去视频免费观看| 国产精品.久久久| 成人免费观看视频高清| 国产男女超爽视频在线观看| 人成视频在线观看免费观看| 麻豆国产av国片精品| 亚洲一区二区三区欧美精品| 交换朋友夫妻互换小说| 久久九九热精品免费| tocl精华| 免费观看a级毛片全部| 欧美乱妇无乱码| 国产欧美日韩一区二区精品| 一区在线观看完整版| 别揉我奶头~嗯~啊~动态视频| av福利片在线| 69精品国产乱码久久久| 欧美成狂野欧美在线观看| 国产精品偷伦视频观看了| 国产精品偷伦视频观看了| 91国产中文字幕| 国产精品偷伦视频观看了| 国产精品成人在线| 日本vs欧美在线观看视频| 女人精品久久久久毛片| 操美女的视频在线观看| 人妻久久中文字幕网| 高潮久久久久久久久久久不卡| 99国产精品一区二区三区| av不卡在线播放| 天天躁日日躁夜夜躁夜夜| 成人永久免费在线观看视频 | 欧美午夜高清在线| 日本精品一区二区三区蜜桃| 一二三四社区在线视频社区8| 亚洲av日韩精品久久久久久密| 交换朋友夫妻互换小说| 18禁黄网站禁片午夜丰满| 国产高清videossex| 久久精品国产综合久久久| 国产亚洲精品一区二区www | 国精品久久久久久国模美| 国产高清videossex| 老司机福利观看| 精品午夜福利视频在线观看一区 | 久久 成人 亚洲| 亚洲精品一卡2卡三卡4卡5卡| 一本大道久久a久久精品| 中文字幕精品免费在线观看视频| a级毛片黄视频| 亚洲欧美精品综合一区二区三区| 日韩免费av在线播放| 黑人巨大精品欧美一区二区蜜桃| 国产不卡一卡二| 午夜福利在线免费观看网站| 国产成人影院久久av| 亚洲国产欧美在线一区| 伦理电影免费视频| 黄色怎么调成土黄色| 久久国产亚洲av麻豆专区| 一本综合久久免费| 成年版毛片免费区| 自线自在国产av| av欧美777| 90打野战视频偷拍视频| 男女之事视频高清在线观看| 一边摸一边抽搐一进一小说 | 99国产精品一区二区蜜桃av | 狠狠婷婷综合久久久久久88av| 天天操日日干夜夜撸| 久久精品亚洲av国产电影网| 国产成人av教育| 午夜激情久久久久久久| 成人18禁高潮啪啪吃奶动态图| 免费一级毛片在线播放高清视频 | xxxhd国产人妻xxx| 午夜日韩欧美国产| www日本在线高清视频| 麻豆成人av在线观看| 少妇粗大呻吟视频| 丁香欧美五月| 免费在线观看完整版高清| 90打野战视频偷拍视频| 桃红色精品国产亚洲av| 国产成人一区二区三区免费视频网站| 高清av免费在线| 色播在线永久视频| 女同久久另类99精品国产91| 久久久国产欧美日韩av| 老汉色av国产亚洲站长工具| 精品免费久久久久久久清纯 | 一夜夜www| 日本a在线网址| 又大又爽又粗| 国产麻豆69| 亚洲精品国产一区二区精华液| 精品第一国产精品| 国产欧美日韩一区二区三区在线| 人人妻人人爽人人添夜夜欢视频| 91国产中文字幕| xxxhd国产人妻xxx| 狠狠精品人妻久久久久久综合| 在线天堂中文资源库| 国产国语露脸激情在线看| 亚洲精品国产一区二区精华液| 国产精品1区2区在线观看. | 亚洲精品在线美女| 1024香蕉在线观看| 两性夫妻黄色片| 成人18禁高潮啪啪吃奶动态图| 亚洲熟女毛片儿| 国产精品久久久人人做人人爽| a在线观看视频网站| av天堂久久9| 国产亚洲一区二区精品| 日本精品一区二区三区蜜桃| 国产熟女午夜一区二区三区| 日日摸夜夜添夜夜添小说| 国产野战对白在线观看| 亚洲国产精品一区二区三区在线| www.熟女人妻精品国产| 天天影视国产精品| 性少妇av在线| 成人国产一区最新在线观看| 波多野结衣一区麻豆| 欧美精品亚洲一区二区| 性色av乱码一区二区三区2| 怎么达到女性高潮| 一本一本久久a久久精品综合妖精| 成年女人毛片免费观看观看9 | 亚洲第一av免费看| 两人在一起打扑克的视频| 超碰97精品在线观看| 亚洲av第一区精品v没综合| 日日爽夜夜爽网站| 高清视频免费观看一区二区| 久久热在线av| 一进一出好大好爽视频| 老司机福利观看| 亚洲少妇的诱惑av| 菩萨蛮人人尽说江南好唐韦庄| 精品国产超薄肉色丝袜足j| 在线看a的网站| 久久精品国产综合久久久| 国产在线视频一区二区| 高潮久久久久久久久久久不卡| 人妻 亚洲 视频| 成年女人毛片免费观看观看9 | 国产不卡一卡二| e午夜精品久久久久久久| 亚洲精品中文字幕在线视频| 日韩大码丰满熟妇| 在线观看免费视频日本深夜| 亚洲一区二区三区欧美精品| 变态另类成人亚洲欧美熟女 | 变态另类成人亚洲欧美熟女 | 亚洲熟女毛片儿| 亚洲av欧美aⅴ国产| 夜夜骑夜夜射夜夜干| 成人亚洲精品一区在线观看| 我的亚洲天堂| 国产伦理片在线播放av一区| 最近最新中文字幕大全电影3 | 午夜福利乱码中文字幕| 欧美一级毛片孕妇| 亚洲 国产 在线| 狠狠狠狠99中文字幕| 啦啦啦视频在线资源免费观看| 亚洲久久久国产精品| 国产高清国产精品国产三级| 久久中文看片网| 在线播放国产精品三级| 欧美午夜高清在线| 91大片在线观看| 久久毛片免费看一区二区三区| 2018国产大陆天天弄谢| 亚洲精品久久成人aⅴ小说| 欧美成人免费av一区二区三区 | 国产精品国产av在线观看| 高清av免费在线| 丁香欧美五月| 欧美成人免费av一区二区三区 | 他把我摸到了高潮在线观看 | 啦啦啦 在线观看视频| 成人18禁高潮啪啪吃奶动态图| 久久久精品免费免费高清| 国产精品亚洲av一区麻豆| 亚洲国产成人一精品久久久| 国产极品粉嫩免费观看在线| 丝瓜视频免费看黄片| 日本一区二区免费在线视频| 伊人久久大香线蕉亚洲五| 免费观看a级毛片全部| 亚洲精品国产区一区二| 亚洲色图 男人天堂 中文字幕| 日本黄色视频三级网站网址 | 黄色丝袜av网址大全| 午夜福利欧美成人| 国产成人啪精品午夜网站| 免费少妇av软件| 国产97色在线日韩免费| 亚洲欧美色中文字幕在线| 99久久精品国产亚洲精品| 好男人电影高清在线观看| 在线观看免费午夜福利视频| 韩国精品一区二区三区| 免费在线观看黄色视频的| 久久婷婷成人综合色麻豆| 制服诱惑二区| 18禁观看日本| 99热网站在线观看| 国产成人系列免费观看| 亚洲精品国产一区二区精华液| av在线播放免费不卡| 亚洲第一欧美日韩一区二区三区 | 国产国语露脸激情在线看| 日韩免费av在线播放| 99热国产这里只有精品6| 悠悠久久av| 午夜精品久久久久久毛片777| 国产成人欧美| av福利片在线| 午夜免费成人在线视频| 最新在线观看一区二区三区| 国产真人三级小视频在线观看| 成人三级做爰电影| 精品视频人人做人人爽| 欧美精品av麻豆av| 亚洲成av片中文字幕在线观看| 人人妻人人添人人爽欧美一区卜| 亚洲熟妇熟女久久| 精品卡一卡二卡四卡免费| 色94色欧美一区二区| 99九九在线精品视频| 久久中文字幕一级| 成年人午夜在线观看视频| 满18在线观看网站| 又紧又爽又黄一区二区| 桃红色精品国产亚洲av| 成人av一区二区三区在线看| 日韩有码中文字幕| 国产在线一区二区三区精| 国产成人免费观看mmmm| 在线观看一区二区三区激情| 欧美另类亚洲清纯唯美| 亚洲成人国产一区在线观看| 99精品在免费线老司机午夜| 国产男女超爽视频在线观看| 免费日韩欧美在线观看| 麻豆av在线久日| 少妇 在线观看| 免费人妻精品一区二区三区视频| 欧美 日韩 精品 国产| 最黄视频免费看| 好男人电影高清在线观看| 性少妇av在线| 午夜福利欧美成人| 欧美大码av| 99国产综合亚洲精品| 女人爽到高潮嗷嗷叫在线视频| 国产伦人伦偷精品视频| 9热在线视频观看99| 亚洲精品自拍成人| 老司机靠b影院| 在线观看免费午夜福利视频| 涩涩av久久男人的天堂| 精品午夜福利视频在线观看一区 | 成人国语在线视频| 精品视频人人做人人爽| 久久热在线av| 色94色欧美一区二区| 午夜福利影视在线免费观看| 久久久久久久久久久久大奶| 另类精品久久| 国产成人一区二区三区免费视频网站| 亚洲国产欧美在线一区| 久久精品国产a三级三级三级| 最新在线观看一区二区三区| 久热这里只有精品99| 久久热在线av| 90打野战视频偷拍视频| 老司机亚洲免费影院| 最近最新免费中文字幕在线| 老汉色∧v一级毛片| 精品国产一区二区久久| 精品一区二区三卡| 黑人欧美特级aaaaaa片| 人人妻人人澡人人爽人人夜夜| 亚洲自偷自拍图片 自拍| 亚洲欧美一区二区三区黑人| 欧美成人午夜精品| 久9热在线精品视频| 男人舔女人的私密视频| 老司机午夜福利在线观看视频 | 18禁裸乳无遮挡动漫免费视频| 亚洲国产看品久久| 国产精品一区二区免费欧美| 一个人免费在线观看的高清视频| 欧美激情久久久久久爽电影 | 飞空精品影院首页| 亚洲免费av在线视频| avwww免费| 亚洲情色 制服丝袜| videosex国产| 亚洲午夜精品一区,二区,三区| 免费人妻精品一区二区三区视频| 亚洲 国产 在线| 成年女人毛片免费观看观看9 | 大香蕉久久网| 日韩免费高清中文字幕av| 久久亚洲真实| 12—13女人毛片做爰片一| 夜夜夜夜夜久久久久| 午夜福利欧美成人| 黄色a级毛片大全视频| 日韩视频一区二区在线观看| 国产精品国产高清国产av | 制服人妻中文乱码| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲中文字幕日韩| 一进一出抽搐动态| 极品少妇高潮喷水抽搐| 高清在线国产一区| 亚洲成av片中文字幕在线观看| 色播在线永久视频| 亚洲av欧美aⅴ国产| 妹子高潮喷水视频| 夜夜夜夜夜久久久久| 80岁老熟妇乱子伦牲交| 国精品久久久久久国模美| 中文字幕人妻丝袜制服| 色婷婷久久久亚洲欧美| 男女下面插进去视频免费观看| 在线十欧美十亚洲十日本专区| 国产伦人伦偷精品视频| 老司机亚洲免费影院| 亚洲欧美一区二区三区黑人| 国产老妇伦熟女老妇高清| 男女免费视频国产| 欧美国产精品va在线观看不卡| 精品免费久久久久久久清纯 | 亚洲专区国产一区二区| 午夜福利在线观看吧| 亚洲午夜精品一区,二区,三区| 大型av网站在线播放| 欧美国产精品va在线观看不卡| 国产免费福利视频在线观看| 女性被躁到高潮视频| 在线看a的网站| 亚洲午夜精品一区,二区,三区| 欧美精品一区二区大全| 久热爱精品视频在线9| 又大又爽又粗| 亚洲精品中文字幕在线视频| 99精品久久久久人妻精品| 亚洲国产成人一精品久久久| 女人精品久久久久毛片| 亚洲,欧美精品.| 女人爽到高潮嗷嗷叫在线视频| 亚洲av国产av综合av卡| 久久精品国产a三级三级三级| 一级毛片电影观看| 精品久久久久久久毛片微露脸| 9热在线视频观看99| 操出白浆在线播放| 男女无遮挡免费网站观看| 亚洲 欧美一区二区三区| 久久99一区二区三区| 成人av一区二区三区在线看| 熟女少妇亚洲综合色aaa.| 久久久水蜜桃国产精品网| 757午夜福利合集在线观看| 亚洲天堂av无毛| 美女午夜性视频免费| 亚洲色图综合在线观看| av网站免费在线观看视频| 亚洲专区中文字幕在线| 国产精品久久电影中文字幕 | 大型av网站在线播放| 欧美日韩亚洲高清精品| 欧美中文综合在线视频| 国产成人精品在线电影| 欧美成人午夜精品| 亚洲成国产人片在线观看| 天堂动漫精品| 亚洲一区中文字幕在线| 国产精品美女特级片免费视频播放器 | 91国产中文字幕| tube8黄色片| 午夜免费鲁丝| cao死你这个sao货| www.自偷自拍.com| 久久午夜综合久久蜜桃| 狠狠婷婷综合久久久久久88av| 久久国产精品影院| 桃花免费在线播放| 99国产精品免费福利视频| 99国产精品一区二区三区| 午夜精品久久久久久毛片777| h视频一区二区三区| 色综合婷婷激情| 免费看十八禁软件| av天堂在线播放| 久久国产精品人妻蜜桃| 51午夜福利影视在线观看| 老熟妇仑乱视频hdxx| 黑人猛操日本美女一级片| 亚洲人成77777在线视频| 日韩中文字幕欧美一区二区| 精品欧美一区二区三区在线| 国产精品九九99| 97人妻天天添夜夜摸| 国产精品秋霞免费鲁丝片| 午夜福利一区二区在线看| 精品久久久精品久久久| 成人黄色视频免费在线看| 亚洲精品久久成人aⅴ小说| 亚洲午夜理论影院| 欧美成狂野欧美在线观看| 精品视频人人做人人爽| 王馨瑶露胸无遮挡在线观看| 亚洲人成电影观看| 免费黄频网站在线观看国产| 亚洲 欧美一区二区三区| 日韩人妻精品一区2区三区| 国产日韩欧美亚洲二区| 久久久久久久久免费视频了| 纵有疾风起免费观看全集完整版| 久久精品国产a三级三级三级| 国产精品一区二区免费欧美| 天天操日日干夜夜撸| 午夜免费成人在线视频| 亚洲欧美日韩高清在线视频 | 国产欧美日韩一区二区三区在线| 在线播放国产精品三级| 黄频高清免费视频| 91字幕亚洲| 国产精品一区二区免费欧美| 亚洲黑人精品在线| 国产野战对白在线观看| 日日夜夜操网爽| 这个男人来自地球电影免费观看|