• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantum homomorphic broadcast multi-signature based on homomorphic aggregation

    2023-09-05 08:47:18XinXu徐鑫andAiHanYin殷愛菡
    Chinese Physics B 2023年7期

    Xin Xu(徐鑫) and Ai-Han Yin(殷愛菡)

    Department of Information Engineering,East China JiaoTong University,Nanchang 330013,China

    Keywords: quantum signature,homomorphic aggregation,homomorphic multi-signature,Bell state

    1.Introduction

    As an extension of handwritten signatures in the digital field,digital signatures are now used in daily life.Since modern computers cannot solve such problems in polynomial time,the security of signatures relies on mathematically complex puzzles in classical cryptography.However, since the Shor quantum parallel algorithm[1]solved RSA encryption problem in a limited time in 1994,the security of digital signatures has begun to shake.In order to improve the security of digital signatures,many researchers have begun to use quantum properties to study how to ensure signature security,which opens the door of quantum signature.

    In 1984,Bennett and Brassard[2]proposed the first quantum key distribution protocol.Quantum key distribution is the premise of other quantum protocols,one of which is quantum signature.Its purpose is to enable communication parties to generate a secure key for processing messages.Although the research of quantum key distribution set up early, there are still many scholars to enrich the content of this field now.For example,Wanget al.[3]proposed twin-field quantum key distribution over 830-km fibre and made a breakthrough in the establishment of ground-based quantum security networks on a scale of 1000 km,and Fan-Yuanet al.[4,5]proposed that all contributes to the development of quantum cryptography.

    Quantum signature is an important research direction in quantum cryptography.One of its important characteristics is that its security completely changes the traditional digital signature’s dependence on difficult mathematical assumptions,that is,the security of quantum signature depends on the basic principles of quantum mechanics, such as uncertainty principle and non-cloning theorem.So,in theory,a secure quantum signature could deal with a quantum computer attack.Because of these security characteristics of quantum signature,the related research has received much attention.[6–8]In recent years, the research on quantum signature has made new progress, such as efficient quantum digital signatures without symmetrization step proposed by Luet al.,[9]which improves the signature rate of the protocol; secure and practical multiparty quantum digital signatures proposed by Wenget al.,[10]which improves the data utilization rate; and experimental quantum secure network with digital signatures and encryption proposed by Yinet al.,[11]which combines quantum signature with network and expands the research scope of quantum signature.

    Quantum multi-signature is a branch of quantum signature, which is widely used in e-commerce, property division,fund management and other scenarios.[12–14]It is characterized by multiple signers signing the same message, and according to the different signature orders that can be divided into ordered signature and broadcast signature: these two modes have their own advantages and disadvantages.Both models have advantages and disadvantages.In 2007, Wenet al.[15]firstly proposed a realizable quantum ordered multiple digital signature scheme based on classical multiple signatures, which relies on quantum key distribution and one-time pad algorithm to ensure the security of the protocol.Then,they[16]proposed a quantum digital multi-signature using controlled quantum teleportation for multi-signature and does not rely on an arbitrator to verify the signature.In the same year, Wenet al.[17]proposed two quantum broadcast multisignature protocols, one for classical digital message, which uses quantum unidirectional function to realize signature and verification, and the other for quantum message, which uses quantum teleportation technology.In 2016, Duet al.[18]proposed an efficient quantum ordered multi-signature protocol,which also uses quantum key distribution and one-time pad algorithm,but only needs to perform unitary operations on single particles to complete the signature instead of multi-particle entangled state.In 2019, Jianget al.[19]proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states, which ensures information security with fewer decoy particles during transmission.In 2021, Heet al.[20]analyzed the security of some quantum multi-signature protocols that have been used so far and proposed related improvements.This shows that the research on quantum multi-signature is slow but still ingoing.[21,22]

    Quantum multi-signature protocols are also often combined with other signature protocols.In 2019, Qinet al.[23]proposed an efficient quantum multi-proxy signature protocol,in which the rights of the original signer are assigned to multiple proxy signers, that is, a single signature becomes multiple proxy signatures.In the same year, Zhanget al.[24]proposed a novel quantum broadcasting multiple blind signature scheme based on partial entanglement of multiple particles.With the deepening of the research,the research on the application in the signature protocol is also conducted.In 2017,Shaoet al.[25]proposed an electronic payment protocol based in quantum multi-agent blind signature.In 2018,Niuet al.[26]improved the Shaoet al.’s protocol and proposed a practical quantum multi-agent blind signature electronic payment protocol.

    Quantum homomorphic signature has been proposed in recent year, which is the extension of homomorphic signature in quantum field.In 2015, Shanget al.[27]proposed a quantum homomorphic signature protocol for the first time,which uses entanglement swapping to complete signature aggregation.This protocol solves the problem of multi-stream identity authentication in quantum signature, effectively ensures the security of key,and verifies the identities of different data sources in quantum network.In 2016,Luoet al.[28]also proposed a quantum homomorphic signature protocol.Unlike Shang’s protocol,this protocol is based on signature aggregation of Bell state measurement.In 2017, Liet al.[29]thought of a new idea from the spectral characteristics, and proposed a quantum homomorphic signature scheme by using the continuous variable part of the quantum spectrum.This scheme uses continuous-variable quantum information and transmits more information at lower cost.In 2019, Shanget al.[30]introduced a serial verification model and a parallel verification model,and proposed a new quantum homomorphic signature protocol with repeatable verification.The serial model handles the signature verification problem,and the parallel verification model handles the signature repetition problem.This protocol is beneficial to signature verification in general scenarios.

    These quantum homomorphic signatures are based on the signature model proposed by Shanget al.[27]In this model,the message holder and the signer are played by the same person, which can authenticate the identities of different data sources.However,this setting also limits the application scenarios of quantum homomorphic signatures.To broaden its application scope,we introduce quantum multi signatures,and also improve the shortcomings of traditional quantum multi signatures through quantum homomorphic signatures.Quantum multi signature is a common signature.It needs to convert classical messages into quantum sequences.Therefore,it needs to prepare multiple quantum states,leading to a long initialization phase.In addition,in the verification phase,it only relies on the classical bit key.If the key is stolen,it is easy to forge the signature and pass the verification.

    In this paper, we apply homomorphic aggregation to quantum multi-signature, and propose a quantum homomorphic multi-signature protocol,which uses homomorphic property to complete the generation and verification of signature.This method not only broadens the application scope of quantum homomorphic signature,but also improves quantum multi signature,so that it only needs to prepare a quantum state,reducing the preparation time,and requires quantum sequences and classical keys when verifying signatures, making attackers unable to pass the verification when they only have the key.We mainly introduce the following aspects.First, we introduce the basic knowledge related to quantum signatures,then we introduce the proposed scheme in detail, and finally analyze the proposed scheme.

    2.Related works

    2.1.Quantum homomorphic signature

    Quantum homomorphic signature is a quantum signature with homomorphic properties, or an extension of a homomorphic signature in a quantum field, and the generation and verification of signatures are realized by using the homomorphic properties.From the calculation method, we can divide homomorphism into additive homomorphism and multiplicative homomorphism.Suppose that there are two inputsY1andY2, if there is a functionfthat satisfiesρ(Y1+Y2)=f(ρ(Y1),ρ(Y2)), then the functionρwill be additively homomorphic.Similarly, the functionρis multiplicative homomorphic when the functionfconforms toρ(Y1×Y2) =f(ρ(Y1),ρ(Y2)).

    Homomorphic signature schemes are mainly divided into five types: linear homomorphism,polynomial function homomorphism, full homomorphism, homomorphic aggregation,and multi-key homomorphism.[31,32]Among them,homomorphic aggregation is different from other schemes,it can solve multi-user application scenarios.In this type of scenario, the generated signatures are aggregated from the signatures corresponding to different messages,which are signed by different users,and each user has its own secret key.

    Fig.1.Homomorphic aggregation.

    Entanglement swapping is a property of quantum state,[33–35]it can be used to achieve homomorphic aggregation in the field of quantum signatures.Assume that there are two Bell states,|φ+〉12and|φ+〉34.The Bell state measurement is performed on particle 1 and particle 3,so that the two particles that are not originally entangled are entangled together,becoming Bell state|?〉13,and the other two particles collapse into|?〉24.The specific quantum states of these two pairs of new Bell states are as follows:

    Here is just one of entanglement swapping of Bell state.

    2.2.Quantum multi-signature

    Quantum multi-signature can be divided into two types according to the signature order of the signers, namely quantum broadcast multi-signature and quantum ordered multisignature.

    In quantum broadcast multi-signature,[36]the issuer sends the message to be signed to each signer out of order; each signer sends the message and corresponding signature to the collector after completing the signature; the collector verifies each individual signature and then aggregates them into a multi-signature and sends it to the verifier; finally, the verifier verifies the validity of the multi-signature.The advantage of this is that the signers will not contact each other’s information, and the signature does not need to wait.After the signature is completed,it can be directly sent to the collector.However, the disadvantage is that the multi signature work is completed by one node, which needs to have high credibility and strong processing capability.

    Fig.2.Quantum broadcast multi-signature.

    In an ordered multi-signature scheme,[37,38]the issuer specifies the order of the signers’signature,and then sends the message to the first signer.Except the first signer,each signer verifies the validity of the previous signature after receiving it, if the signature is valid, the signer continues to sign, and then sends the signature to the next signer;otherwise,it would reject the signature and terminates the entire process.Until all signers complete the signing operation,the signed message is sent to the verifier.Finally, the verifier verifies the validity of the multi-signature.The advantage of this approach is that when problems occur in the signature,they can be found in a timely manner and will not accumulate errors to the final verifier.However, the disadvantage is that previous signature will be received by the subsequent signers, which may cause attacks between signers.In addition, the subsequent signers need to wait for the previous signer to complete the signature before signing,resulting in a long overall time.

    It can be seen that quantum homomorphic signature and quantum broadcast multi signature have a high degree of consistency in the signature model.

    Fig.3.Quantum ordered multi-signature.

    3.Proposed protocol

    In this section, we propose a quantum homomorphic multi-signature scheme based on homomorphic aggregation in detail.The scheme consists of four stages, namely initialization, signing, aggregation and verification.There are four kinds of participants, namely Alice who holds the message to be signed, Bob who is responsible for signing, Dace who aggregates signatures,and Charlie who verifies the signature.The flow chart of this scheme is shown in Fig.4.

    Fig.4.Scheme flow chart.

    (i)Initialization

    Step 1Alice converts the message to be signed into a binary sequence.Here, we limit the length of the binary sequence to 2, which is a special value in order to better introduce the details of the scheme and avoid the redundancy of content.It does not affect the universality of the scheme.The resulting binary sequence is namedXand send to Charlie in advance.

    Step 2According to the length of the binary sequenceXowned by Alice,Charlie prepares three classical bits of the same length (denoted asKi), and shares them with Bobiby quantum key distribution protocol,these are secret keys shared between Bobiand Charlie,hereKi ∈{00,01,10,11}.

    Step 3Dave prepares three EPR entangled pairs:

    (ii)Signing

    Step 1Dave takes one particle from each of the three entangled EPR pairs, here we choose particle 2, particle 4 and particle 6, which can be denoted as|?〉2,|?〉4,|?〉6, respectively.Then Dave sends these particles to Bob1, Bob2, and Bob3respectively.At the same time, Alice also sends the binary sequenceXto Bobi.

    Step 2After Bobireceives the binary sequenceXand particles from Alice, he performs an exclusive OR operation on the binary sequenceXand the secret keyKihe holds,and the resultX ⊕Kiis used to sign the received particle 2i.

    Here, the unitary operator used in the particle signature corresponds to the exclusive OR resultX ⊕Ki,and the corresponding relationship is as follows:

    Step 3Bobisends the transformed particle 2i, namely|?′〉2i, and the exclusive OR resultX ⊕Kito Dave.Here, the superscript(′)indicates that the particle or quantum state completes the signature operation.

    (iii)Aggregation

    After Bobicompletes the signature of particle 2iwith the exclusive OR resultX ⊕Ki, the original three EPR entangled pairs would change, the states of these would be|?′〉12=U(X ⊕K1)(2)·|φ+〉12,|?′〉34=U(X ⊕K2)(4)·|φ+〉34,|?′〉56=U(X ⊕K3)(6)·|φ+〉56.These transformed EPR entangled pairs are Bobi’s signatures.

    Then, Dave combines these individual signatures|?′〉(2i?1)(2i)received from Bobito generate an aggregated signature.The generation process of the aggregated signature is as follows.

    Step 1Dave would aggregate the signature of Bob2and Bob3.The way to aggregate is to perform an entanglement swapping on quantum states|?′〉34and|?′〉56.First, Dave performs a Bell state measurement on particle 3 and particle 5 in these two quantum states, then, we obtain an entangled pair|?′′〉35.This measurement enables two unentangled particles to become entangled.According to the entanglement exchange principle,the remaining non-entangled particles 4 and 6 would collapse into a pair of entangled states|?′′〉46.Here,|?′′〉46would be the combined signature of Bob2and Bob3,and the superscript (′′) indicates that the particle or quantum state completes the two operations of signature and entanglement swapping.

    Step 2Dave performs an entanglement swapping on|?′〉12and|?′′〉46to connect the combined signature of Bob2and Bob3and the signature of Bob1.According to the procedure in Step 1,we can easily obtain the state of particle 1 and particle 4 after measurement which is|?′′〉14.Similarly, the state of the particles 2 and 6 would collapse into|?′′〉26.The|?′′〉26would be the signature of Dave.

    Step 3Dave performs exclusive OR operation on each signer’s signature informationX ⊕Ki,and obtains(X ⊕K1)⊕(X ⊕K2)⊕(X ⊕K3).

    Step 4Dave sends the signature information(X ⊕K1)⊕(X ⊕K2)⊕(X ⊕K3)and|?′′〉26to Charlie.

    (iv)Verification

    Charlie receives quantum states|?′′〉26and (X ⊕K1)⊕(X ⊕K2)⊕(X ⊕K3)from Dave,and can use this information to verify the signature.The verification process is as follows.

    Step 1After Charlie receives quantum state|?′′〉26from Dave, he performs a Bell state measurement on the particles in|?′′〉26to obtain the state of the quantum state|?′′〉26, and then compares the measurement result|?′′〉26with the initial quantum state|?〉26in order to find an operator that satisfies the formula|?′′〉26=c(Z)U(Z)6·|?〉26.In the formula, the subscript“6”means operating on particle 6,and|c(Z)|=1.

    Step 2Charlie compares(X ⊕K1)⊕(X ⊕K2)⊕(X ⊕K3)withZ.If(X ⊕K1)⊕(X ⊕K2)⊕(X ⊕K3)=Z,Charlie would confirm that|?′′〉26is the signature of Dave.Otherwise,Charlie would deny the signature.

    4.Scheme analysis

    In this section, we analyze the proposed protocol from three aspects,namely homomorphic properties,security analysis and comparison.

    4.1.Homomorphic property

    We refer to two proven lemmas in Ref.[27] to demonstrate the homomorphic properties of our proposed scheme.The representation of these lemmas is as follows.

    Lemma 1U(Y1)·U(Y2)·|?〉=c(Y1,Y2)·U(Y1⊕Y2)·|?〉,whereY1,Y2∈{00,01,10,11}|c(Y1,Y2)|=1.

    Note thatU(Y1) andU(Y2) represent the unitary operators corresponding to secret keysY1andY2,and|c(Y1,Y2)|=1 is a factor that only affects the phase,so it can be ignored after the Bell state measurement.

    Bringing Lemma 2 into the above formula, the resulting equation is obtained as follows:

    Then bring Lemma 1 into the above formula.the resulting equation is below:

    Comparing the above formula with

    we can see that|?′′〉3456is obtained by the unitary operation on particle 6 in|φ+〉35⊕|φ+〉46.Therefore, we obtain that|?′′〉46=c(Z)U(Z)6|?〉46, whereZ=X ⊕K2⊕X ⊕K3,c(Z)=cjc(U2U3).is a phase factor.|?′′〉46is the aggregate signature of Bob2and Bob3.

    Similarly, Dave performs the same operation on|φ+〉12and|?′′〉46, and we obtain easily that|?′′〉26=c(Z)U(Z)6|?〉26,wherec(Z)=cjc(U1,U2,U3),Z=X ⊕K1⊕X ⊕K2⊕X ⊕K3,is a phase factor and|?′′〉26is the aggregate signature of Bob1,Bob2,and Bob3.

    Here,we define that the function offas the operation of entanglement swapping and the function Sign as the operation of signature.

    Thus, the signatures of the signers can be written as follows:

    Then,collector aggregates these signatures through entanglement swapping,and the result can be written as follows:

    In the above formula,

    If the aggregated signature is generated by the informationXi ⊕Yi,then

    Thus,

    Compared with the additive homomorphic modelρ(Y1+Y2)=f(ρ(Y1)ρ(Y2)), our signature scheme satisfies the additive homomorphism property.

    4.2.Security analysis

    We analyze the security of the proposed quantum signature protocol from the following three aspects: verifiability,non-repudiation, and unforgeability.To simplify the model,the participants in the protocol are assumed to be honest.

    (I)Verifiability: The verifier can verify the validity of the signature of the corresponding signer through the shared secret key.

    In our scheme, there are two signature processes: one is the individual signature generated by the signer and the other is the aggregated signature generated by the collector,and the verifier can verify the validity of both signatures.After the verifier receives the signature sent by the collector, an equation|?′′〉A(chǔ)B=c(Z)U(Z)B|?〉A(chǔ)Bwith the initial quantum state is formed, and thenZin the equation is compared with the secret keyXito verify the validity of the signer’s signature.Then, the verifier can ask the collector to send it the quantum state after the entanglement swapping, and can calculate whether the aggregate signature generated by the collector is valid through initial quantum state.

    Non-repudiation and unforgeability are important security requirements in a signature scheme.For convenience,we use the examples in this work to illustrate the above two properties.

    (II)Non-repudiation: The secret key held by the signer is not only a tool for signing,but also the signer’s identity label,so it cannot deny its own signature.

    No signer can deny their signatures.The verifier compares the received aggregated signature|?′′〉26with the initial quantum state,and forms an equation that satisfies the formula|?′′〉26=c(Z)U(Z)6·|?〉26.Assuming that the verifier performs exclusive OR operation onZandK2⊕K3,and the result isK1,it can prove that the signer Bob1has indeed signed and the signature cannot be denied.Here,K1is equivalent to a signed label.Note that the verifier needs to processZaccording to the number of signers in the above step,if the number is odd,Zis processed asZ ⊕X;if it is even,Zis not operated.

    (III) Unforgeability: The signer’s secret key is obtained from the verifier through the BB84 protocol which proves to be unconditionally secure, and no one else can forge the signature.

    The signature cannot be forged.In a signature protocol,the secret keyKiis an important factor in generating the signature, so enhancing the security of the secret key transmission is to enhance the security of the signature.In our signature scheme,the secret keyKiis distributed by the BB84 protocol and the secret keyKican be safely shared by Bobiand Charlie,because the key distribution protocol proves to be unconditionally secure.On the other hand,the secret keyKicannot be calculated from the message and the corresponding signature.Suppose that the Eve steals both particle 2 andX ⊕K1in the process of the signer sending the information to the collector,he cannot calculate|?′〉12without particle 1 or the unitary operationU(X ⊕K1) with only particle 2.Therefore, attackers cannot steal the secret keyKiof the protocol with only particles 2iandX ⊕Kiso that the signature cannot be forged.

    4.3.Comparisons

    Although quantum multi-signature has been studied for a long time, its research direction is mainly its applications in different signature scenarios,or its combination with other signature protocols.Here,we refer to previous signature protocols related to quantum multi-signature as traditional quantum multi-signature and compare it with our proposed quantum homomorphic multi-signature.We mainly compare the following three aspects,as shown in Table 1.

    Table 1.Comparisons of proposed protocol with traditional protocols.

    In the traditional quantum multi-signature scheme, the message holder first converts the message to be signed into a binary sequence,and then converts it into a quantum sequence.Taking the Bell state used in our paper for example,the message holder needs to prepare four different Bell states.But in our proposed signature scheme,the message holder only needs to convert the message to be signed into a binary sequence,the Bell state is prepared by the collector,and only one Bell state needs to be prepared,which can significantly improve the efficiency of Bell state preparation.

    In the signature stage, in the traditional quantum multisignature scheme, the signer’s secret key is used to perform multiple unitary operations on the same quantum state.If the quantum state and related keys are stolen by Eve, the signature may be forged.In our scheme,the signer uses the unitary operation to sign different quantum states, and then uses the entanglement exchange to complete the aggregation of the signatures.Even if Eve steals the relevant information,he cannot obtain the key to forge the signature.

    In the verification phase, the verifier only has the secret key shared with the signer.In the traditional multi-signature scheme, it can only verify whether the signer’s key is used correctly,but cannot judge whether the signed message is correct.In our scheme, the verifier not only shares the key of the signer,but also has the binary sequence of the message to be signed,which can verify the correctness of the key and the authenticity of the message signed by the signer.

    4.4.Tolerable number of dishonest users

    In our scheme,the aggregator and the verifier are two important nodes that must be trusted,so dishonesty is assumed to occur to the signer.In the signature scheme, the signer owns the original message and the original key,so there may be two dishonest behaviors: one is to modify the original message,and the other is to modify the original key.

    In both cases, we use the same method to find dishonest users.When the authentication fails, the verifier asks the aggregator for the signature key sent by each signer.Since the signature key is the result of the exclusive OR (XOR) of the original message and the original key,the aggregator cannot know the details, but the verifier can, so it can verify the aggregated key.Therefore, in theory, the number of faithless users that the scheme can tolerate is equal to the total number of signers,but this is an ideal situation,and it still requires trust in aggregators and validators.

    4.5.Influence of quantum key distribution

    In quantum key distribution, there is a definition called Plob boundary, which reflects the ability of the protocol to distribute the key.It can be expressed asR=?log2(1?η),whereRrepresents the key rate andηdenotes the channel transmittance between users.In general, the key rate should

    Owing to the large number of photons lost in the channel,i.e.,the low transmittance of the channel,the key rate of most quantum key distribution protocols is limited by the key capacity of the protocol.Some protocols overcome the key capacity through single photon interference to improve the key rate,and can make the transmission distance lengthen to a staggering 830 km, but the phase tracking and phase locking technology are needed to compensate for the related fluctuation problems, which will increase the complexity of the experiment,and may cause related security risks.Some protocols[39]did not need phase tracking or phase locking technology, but used two-photon interference, through the time multiplexing and post-matching methods to break through the key capacity,but the transmission distance would decrease.In the same environment, a transmission range of 450 km can be achieved without phase tracking, and 270 km can be achieved further without phase locking technology.It weighs practicality and performance.

    4.6.Quantum memory device

    As the core of quantum repeater, quantum memory can capture and store entangled quantum,but up to now only 4 entangled quantum operation have been realized, so the related protocol relying on quantum memory is really not practical.In our scheme,the aggregator prepares quantum states according to the number of signers, and needs to conduct entanglement exchange of the signed quantum states,so it needs to store the quantum states it has, and with the increase of the number of signers and message length,the number of quantum states that need to be stored will increase, so this protocol cannot eliminate the quantum memory.It will take a long time for the protocol to move from theory to experiment.

    5.Conclusions

    In this work, we proposed a quantum homomorphic multi-signature scheme based on homomorphic aggregation,which reduces the dependence on the classical key,making it impossible for any attacker to forgery attack only by stealing the secret key and quantum state.In our scheme,the collector is able to aggregate multiple individual signatures consisting of quantum states into a new multi-signature, and the signature process conforms to additive homomorphism.According to the security analysis, the scheme is safe.Our scheme can produce fewer kinds of quantum states,higher signature complexity, and more kinds of verifiable information than traditional quantum multi-signature schemes.

    Acknowledgement

    Project supported by the National Natural Science Foundation of China(Grant No.61762039).

    日本av免费视频播放| 丝袜美腿诱惑在线| 日韩av在线免费看完整版不卡| 久久久精品国产亚洲av高清涩受| 制服人妻中文乱码| 五月天丁香电影| 亚洲精品国产区一区二| 欧美黑人精品巨大| 天天添夜夜摸| 国产欧美日韩综合在线一区二区| 国产激情久久老熟女| 欧美人与性动交α欧美软件| 国产亚洲av片在线观看秒播厂| 久久鲁丝午夜福利片| 只有这里有精品99| 中文精品一卡2卡3卡4更新| 午夜91福利影院| 国产精品蜜桃在线观看| 深夜精品福利| 亚洲精品自拍成人| 色吧在线观看| 中文字幕最新亚洲高清| 成人18禁高潮啪啪吃奶动态图| 日本爱情动作片www.在线观看| 最近最新中文字幕免费大全7| av免费观看日本| 亚洲av日韩精品久久久久久密 | 一区二区三区精品91| 可以免费在线观看a视频的电影网站 | 美女国产高潮福利片在线看| 亚洲美女搞黄在线观看| 亚洲国产精品999| 肉色欧美久久久久久久蜜桃| 欧美日韩一级在线毛片| 久久ye,这里只有精品| av不卡在线播放| 嫩草影视91久久| 人妻一区二区av| 交换朋友夫妻互换小说| 操美女的视频在线观看| 最近中文字幕高清免费大全6| 狂野欧美激情性bbbbbb| 日本欧美视频一区| 国产成人精品在线电影| 香蕉国产在线看| 欧美另类一区| 丝袜脚勾引网站| 精品视频人人做人人爽| 国产成人精品久久二区二区91 | 午夜精品国产一区二区电影| 精品少妇黑人巨大在线播放| 街头女战士在线观看网站| 中文字幕最新亚洲高清| 日韩一区二区三区影片| 考比视频在线观看| 美女大奶头黄色视频| 久久久国产一区二区| 不卡av一区二区三区| 午夜福利视频在线观看免费| 最近中文字幕2019免费版| 日韩制服骚丝袜av| 精品少妇内射三级| 天天躁夜夜躁狠狠躁躁| 大香蕉久久网| 欧美日韩一级在线毛片| 中文字幕av电影在线播放| 婷婷色av中文字幕| 人人妻人人爽人人添夜夜欢视频| 如日韩欧美国产精品一区二区三区| 91老司机精品| 亚洲精品在线美女| 国产成人一区二区在线| 青草久久国产| 人人澡人人妻人| 在线观看www视频免费| 久久亚洲国产成人精品v| 免费人妻精品一区二区三区视频| 在线观看国产h片| 国产精品国产三级国产专区5o| 亚洲精华国产精华液的使用体验| 满18在线观看网站| 国产极品天堂在线| 国产av码专区亚洲av| 老鸭窝网址在线观看| 男女床上黄色一级片免费看| 欧美激情极品国产一区二区三区| 久久久久精品人妻al黑| 考比视频在线观看| 欧美在线黄色| 美女中出高潮动态图| 国产xxxxx性猛交| 日韩 欧美 亚洲 中文字幕| 巨乳人妻的诱惑在线观看| 国产精品香港三级国产av潘金莲 | 黄网站色视频无遮挡免费观看| 亚洲欧美一区二区三区国产| 国产无遮挡羞羞视频在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 在线精品无人区一区二区三| 亚洲国产欧美一区二区综合| 欧美精品一区二区免费开放| 欧美精品一区二区免费开放| 亚洲激情五月婷婷啪啪| 欧美精品一区二区免费开放| 国产成人91sexporn| 国产国语露脸激情在线看| 国产精品偷伦视频观看了| 91aial.com中文字幕在线观看| 日本色播在线视频| 成人国产av品久久久| 中文字幕最新亚洲高清| 日日摸夜夜添夜夜爱| 国产精品99久久99久久久不卡 | 别揉我奶头~嗯~啊~动态视频 | 成人亚洲精品一区在线观看| 精品一区二区免费观看| 免费在线观看视频国产中文字幕亚洲 | 久久韩国三级中文字幕| 午夜激情av网站| 青春草视频在线免费观看| 久久天躁狠狠躁夜夜2o2o | 日韩中文字幕欧美一区二区 | 国产av精品麻豆| 国产精品亚洲av一区麻豆 | 如日韩欧美国产精品一区二区三区| 中文字幕av电影在线播放| 日日啪夜夜爽| 国产免费福利视频在线观看| 亚洲欧洲日产国产| 国产亚洲一区二区精品| 捣出白浆h1v1| 精品国产一区二区久久| 亚洲综合精品二区| 男人添女人高潮全过程视频| 午夜日本视频在线| 亚洲av电影在线观看一区二区三区| 欧美日韩av久久| 18禁国产床啪视频网站| 如日韩欧美国产精品一区二区三区| 高清不卡的av网站| 精品亚洲乱码少妇综合久久| 久久国产精品大桥未久av| 精品国产露脸久久av麻豆| 精品国产超薄肉色丝袜足j| 精品亚洲成a人片在线观看| 搡老岳熟女国产| 国产午夜精品一二区理论片| 女人久久www免费人成看片| 亚洲欧美精品自产自拍| 午夜老司机福利片| 久久热在线av| 黄色视频在线播放观看不卡| 中文字幕亚洲精品专区| avwww免费| 性高湖久久久久久久久免费观看| 大香蕉久久成人网| 十分钟在线观看高清视频www| 中国国产av一级| 亚洲精品第二区| 国产又色又爽无遮挡免| 免费观看a级毛片全部| 丝袜美足系列| tube8黄色片| 日韩大码丰满熟妇| 日日摸夜夜添夜夜爱| 国产日韩欧美在线精品| 在线观看免费日韩欧美大片| 久久韩国三级中文字幕| 男人添女人高潮全过程视频| 日本av免费视频播放| 一级毛片我不卡| 精品一品国产午夜福利视频| 日本色播在线视频| 欧美 亚洲 国产 日韩一| 国产精品久久久人人做人人爽| 国产一区二区三区av在线| 精品卡一卡二卡四卡免费| 国产色婷婷99| 婷婷色麻豆天堂久久| 在线观看免费高清a一片| 国产精品麻豆人妻色哟哟久久| 亚洲精品日韩在线中文字幕| 卡戴珊不雅视频在线播放| 美女午夜性视频免费| 大香蕉久久成人网| 欧美乱码精品一区二区三区| 久久天堂一区二区三区四区| 亚洲欧美成人综合另类久久久| 国产精品嫩草影院av在线观看| 亚洲男人天堂网一区| 亚洲伊人久久精品综合| 国产精品免费视频内射| 岛国毛片在线播放| 国产男人的电影天堂91| 老司机靠b影院| 中文字幕人妻丝袜制服| 国产视频首页在线观看| 韩国精品一区二区三区| 日韩一本色道免费dvd| 亚洲色图综合在线观看| 天天影视国产精品| 国产黄频视频在线观看| 亚洲国产最新在线播放| 国产不卡av网站在线观看| 美女主播在线视频| 国产片特级美女逼逼视频| 国产一区二区三区综合在线观看| 国产成人欧美在线观看 | 国产乱人偷精品视频| 母亲3免费完整高清在线观看| 啦啦啦视频在线资源免费观看| 久久国产精品男人的天堂亚洲| 日本av免费视频播放| av不卡在线播放| 国产探花极品一区二区| 可以免费在线观看a视频的电影网站 | 最近中文字幕2019免费版| 久久久久人妻精品一区果冻| 精品亚洲乱码少妇综合久久| 一区二区三区精品91| 一本大道久久a久久精品| 宅男免费午夜| e午夜精品久久久久久久| 一级黄片播放器| 人人妻人人澡人人爽人人夜夜| 激情五月婷婷亚洲| 亚洲图色成人| 一区二区三区精品91| 老司机深夜福利视频在线观看 | kizo精华| 七月丁香在线播放| 国产精品久久久久久精品古装| 欧美激情高清一区二区三区 | 肉色欧美久久久久久久蜜桃| 久久久久久久精品精品| 精品视频人人做人人爽| 精品国产一区二区久久| 黄网站色视频无遮挡免费观看| 免费观看人在逋| 欧美久久黑人一区二区| 午夜影院在线不卡| 免费在线观看黄色视频的| 国产 精品1| 久久女婷五月综合色啪小说| 国产一区二区 视频在线| 丁香六月天网| 国产一区二区三区av在线| 亚洲一区中文字幕在线| 性高湖久久久久久久久免费观看| 国产人伦9x9x在线观看| 国产一区有黄有色的免费视频| 男人操女人黄网站| www日本在线高清视频| 九草在线视频观看| 免费av中文字幕在线| 国产伦人伦偷精品视频| 国产精品一区二区在线不卡| 国产日韩欧美亚洲二区| 午夜av观看不卡| 国产片特级美女逼逼视频| 亚洲成色77777| 成人影院久久| 国产精品麻豆人妻色哟哟久久| 少妇被粗大猛烈的视频| 久久人人爽人人片av| 免费观看人在逋| 久久国产亚洲av麻豆专区| av视频免费观看在线观看| 亚洲av男天堂| 亚洲国产成人一精品久久久| 男女边摸边吃奶| 美国免费a级毛片| 91精品三级在线观看| 2018国产大陆天天弄谢| 国产乱人偷精品视频| 国产 一区精品| 最近2019中文字幕mv第一页| 国产av码专区亚洲av| 高清不卡的av网站| 亚洲第一青青草原| 日本猛色少妇xxxxx猛交久久| 新久久久久国产一级毛片| 波多野结衣一区麻豆| 国产 精品1| 免费观看av网站的网址| 国产1区2区3区精品| 蜜桃在线观看..| av网站在线播放免费| www.自偷自拍.com| 久久性视频一级片| 九色亚洲精品在线播放| 欧美日韩一区二区视频在线观看视频在线| 久久韩国三级中文字幕| 欧美人与善性xxx| 日本猛色少妇xxxxx猛交久久| 国产亚洲av片在线观看秒播厂| 99热国产这里只有精品6| 秋霞在线观看毛片| 中文天堂在线官网| 欧美 亚洲 国产 日韩一| 波野结衣二区三区在线| 校园人妻丝袜中文字幕| 亚洲成人国产一区在线观看 | 日韩 亚洲 欧美在线| 久久人妻熟女aⅴ| 好男人视频免费观看在线| 成年人免费黄色播放视频| 久久午夜综合久久蜜桃| 精品人妻在线不人妻| xxx大片免费视频| 乱人伦中国视频| 在线观看免费日韩欧美大片| 最近的中文字幕免费完整| 天堂中文最新版在线下载| 99九九在线精品视频| 国产一区二区三区综合在线观看| 精品第一国产精品| 国产成人一区二区在线| 亚洲美女视频黄频| svipshipincom国产片| 美女大奶头黄色视频| 自拍欧美九色日韩亚洲蝌蚪91| 色视频在线一区二区三区| 亚洲国产欧美日韩在线播放| 国产男女超爽视频在线观看| 国产亚洲午夜精品一区二区久久| 国产精品一二三区在线看| 19禁男女啪啪无遮挡网站| 桃花免费在线播放| 欧美日韩精品网址| 十八禁网站网址无遮挡| 十分钟在线观看高清视频www| 久久久久国产精品人妻一区二区| 日韩,欧美,国产一区二区三区| 少妇的丰满在线观看| 亚洲欧美激情在线| 亚洲中文av在线| 国产成人啪精品午夜网站| 中文字幕制服av| 午夜福利网站1000一区二区三区| 国产精品女同一区二区软件| 新久久久久国产一级毛片| 亚洲精品自拍成人| 国产成人免费无遮挡视频| 久久毛片免费看一区二区三区| 免费久久久久久久精品成人欧美视频| 欧美精品高潮呻吟av久久| 少妇人妻久久综合中文| 成年av动漫网址| 一区在线观看完整版| 日韩中文字幕欧美一区二区 | 操美女的视频在线观看| 国产乱人偷精品视频| 少妇人妻 视频| 狠狠精品人妻久久久久久综合| 成人黄色视频免费在线看| 国产亚洲一区二区精品| 街头女战士在线观看网站| 国产亚洲一区二区精品| 亚洲国产精品一区二区三区在线| 91老司机精品| 少妇精品久久久久久久| 香蕉丝袜av| 国产亚洲最大av| 久久精品国产a三级三级三级| a级毛片在线看网站| 黄色毛片三级朝国网站| 亚洲精品久久成人aⅴ小说| 亚洲天堂av无毛| 夜夜骑夜夜射夜夜干| 欧美激情极品国产一区二区三区| 啦啦啦在线观看免费高清www| 在线亚洲精品国产二区图片欧美| 国产女主播在线喷水免费视频网站| 看免费av毛片| 国产乱人偷精品视频| 亚洲精品视频女| 亚洲国产最新在线播放| 久久天堂一区二区三区四区| 欧美人与性动交α欧美精品济南到| 成年人午夜在线观看视频| 国产成人精品福利久久| 国产精品免费大片| 美女视频免费永久观看网站| 免费女性裸体啪啪无遮挡网站| 人人妻人人添人人爽欧美一区卜| 国产免费又黄又爽又色| 免费观看a级毛片全部| av女优亚洲男人天堂| 90打野战视频偷拍视频| 欧美精品av麻豆av| videos熟女内射| 国产精品偷伦视频观看了| 亚洲精品日本国产第一区| 久久女婷五月综合色啪小说| 青青草视频在线视频观看| 日本欧美视频一区| 精品一区二区三区四区五区乱码 | 多毛熟女@视频| 亚洲少妇的诱惑av| 久久性视频一级片| 国产老妇伦熟女老妇高清| 午夜福利免费观看在线| 9色porny在线观看| 国产色婷婷99| 欧美日韩一级在线毛片| 久热爱精品视频在线9| 国产精品一区二区在线观看99| 一级毛片电影观看| 女人高潮潮喷娇喘18禁视频| 男人操女人黄网站| 久热爱精品视频在线9| 国产熟女欧美一区二区| 啦啦啦中文免费视频观看日本| 少妇被粗大的猛进出69影院| 最新在线观看一区二区三区 | 久久女婷五月综合色啪小说| 制服人妻中文乱码| 欧美97在线视频| 免费不卡黄色视频| 97人妻天天添夜夜摸| 在线天堂中文资源库| 亚洲精品国产一区二区精华液| 日韩一区二区三区影片| 黄频高清免费视频| 高清不卡的av网站| a级片在线免费高清观看视频| 国产精品人妻久久久影院| 嫩草影视91久久| 制服诱惑二区| 97精品久久久久久久久久精品| 男女之事视频高清在线观看 | 国产精品三级大全| 一个人免费看片子| 日韩制服骚丝袜av| 老司机靠b影院| 汤姆久久久久久久影院中文字幕| 日本欧美国产在线视频| 午夜福利免费观看在线| 看免费av毛片| 国产毛片在线视频| 欧美中文综合在线视频| 日韩欧美一区视频在线观看| 欧美精品av麻豆av| www.av在线官网国产| 午夜日韩欧美国产| 满18在线观看网站| 亚洲熟女毛片儿| 哪个播放器可以免费观看大片| 韩国精品一区二区三区| 亚洲av福利一区| 国产成人午夜福利电影在线观看| 一区二区三区四区激情视频| 丝袜美腿诱惑在线| 2021少妇久久久久久久久久久| 亚洲精品美女久久av网站| 亚洲精品国产一区二区精华液| 涩涩av久久男人的天堂| 日本av免费视频播放| 女性被躁到高潮视频| 美女脱内裤让男人舔精品视频| 卡戴珊不雅视频在线播放| 在线天堂中文资源库| 久久99热这里只频精品6学生| 亚洲,欧美精品.| 亚洲av男天堂| 18禁动态无遮挡网站| 十八禁人妻一区二区| 水蜜桃什么品种好| 纵有疾风起免费观看全集完整版| 一本久久精品| 看免费成人av毛片| 色婷婷av一区二区三区视频| 久久久久久久大尺度免费视频| 国产精品偷伦视频观看了| 水蜜桃什么品种好| 人体艺术视频欧美日本| 好男人视频免费观看在线| 久久鲁丝午夜福利片| 亚洲情色 制服丝袜| 欧美变态另类bdsm刘玥| 久久久久国产一级毛片高清牌| 妹子高潮喷水视频| 十八禁人妻一区二区| 美女国产高潮福利片在线看| 久久天躁狠狠躁夜夜2o2o | 成年人免费黄色播放视频| 日韩免费高清中文字幕av| 亚洲av欧美aⅴ国产| 婷婷成人精品国产| 99热网站在线观看| 国产又色又爽无遮挡免| 精品少妇内射三级| 亚洲国产欧美一区二区综合| 国产欧美日韩一区二区三区在线| 色综合欧美亚洲国产小说| 亚洲精华国产精华液的使用体验| 99久久综合免费| 人成视频在线观看免费观看| 晚上一个人看的免费电影| 爱豆传媒免费全集在线观看| 人妻一区二区av| 午夜91福利影院| 久久久亚洲精品成人影院| 久久久久久人人人人人| 在线观看三级黄色| 精品少妇黑人巨大在线播放| 咕卡用的链子| 免费女性裸体啪啪无遮挡网站| 久久精品亚洲熟妇少妇任你| 国产伦人伦偷精品视频| 夜夜骑夜夜射夜夜干| 人体艺术视频欧美日本| 亚洲欧美一区二区三区久久| 国产av精品麻豆| 欧美乱码精品一区二区三区| 肉色欧美久久久久久久蜜桃| 老司机深夜福利视频在线观看 | 亚洲图色成人| 国产精品欧美亚洲77777| 国产在线免费精品| 久久久久精品性色| 亚洲一卡2卡3卡4卡5卡精品中文| 青春草视频在线免费观看| 最近中文字幕高清免费大全6| 欧美xxⅹ黑人| 美女视频免费永久观看网站| 国产男人的电影天堂91| 老汉色av国产亚洲站长工具| 2021少妇久久久久久久久久久| 亚洲美女黄色视频免费看| 极品少妇高潮喷水抽搐| 亚洲精品国产色婷婷电影| 久久女婷五月综合色啪小说| 精品少妇一区二区三区视频日本电影 | 精品一区二区三区四区五区乱码 | 在线精品无人区一区二区三| 中文字幕精品免费在线观看视频| 久久99精品国语久久久| av在线app专区| 国产视频首页在线观看| 国产精品av久久久久免费| 99热全是精品| 中国三级夫妇交换| 亚洲,欧美,日韩| 国产在视频线精品| 国产一区二区三区av在线| 波多野结衣av一区二区av| 天堂8中文在线网| 欧美日韩一区二区视频在线观看视频在线| 久久久久久免费高清国产稀缺| 日韩中文字幕视频在线看片| 在线天堂中文资源库| 9热在线视频观看99| 精品国产乱码久久久久久小说| 欧美黑人精品巨大| 精品卡一卡二卡四卡免费| 最新的欧美精品一区二区| 人人妻,人人澡人人爽秒播 | 美女福利国产在线| 一级片免费观看大全| 久久精品国产a三级三级三级| 成人影院久久| av.在线天堂| 国产精品久久久久久久久免| 日本猛色少妇xxxxx猛交久久| 色94色欧美一区二区| 韩国av在线不卡| 操美女的视频在线观看| 深夜精品福利| 久久精品亚洲熟妇少妇任你| 操出白浆在线播放| 人妻 亚洲 视频| 王馨瑶露胸无遮挡在线观看| 国产精品成人在线| 国产又爽黄色视频| 国产av国产精品国产| a级毛片在线看网站| 精品人妻一区二区三区麻豆| 天堂8中文在线网| 午夜福利网站1000一区二区三区| 日韩制服丝袜自拍偷拍| 国产亚洲最大av| 中文字幕人妻丝袜制服| 国产精品蜜桃在线观看| 男女国产视频网站| 中文字幕另类日韩欧美亚洲嫩草| 欧美 日韩 精品 国产| 国产精品免费大片| 成人亚洲欧美一区二区av| 久久久久久免费高清国产稀缺| 大片电影免费在线观看免费| 人人妻人人澡人人爽人人夜夜| 天堂俺去俺来也www色官网| 中文精品一卡2卡3卡4更新| 黄色视频不卡| 亚洲精品第二区| 可以免费在线观看a视频的电影网站 | 国产精品欧美亚洲77777| 99国产综合亚洲精品| 另类精品久久| 日韩av免费高清视频| 亚洲成人av在线免费| 亚洲精品中文字幕在线视频| 两性夫妻黄色片| 美女中出高潮动态图| netflix在线观看网站| 亚洲色图 男人天堂 中文字幕| h视频一区二区三区| 精品久久久精品久久久| 婷婷色综合大香蕉| 国产不卡av网站在线观看| 欧美国产精品va在线观看不卡| 视频区图区小说| 人人妻人人爽人人添夜夜欢视频|