• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    2024-02-19 12:03:14SenshanOuyangXiangLiuLeiLiuShangchaoWangBaichuanShaoandYangZhao

    Senshan Ouyang,Xiang Liu,Lei Liu,Shangchao Wang,Baichuan Shao and Yang Zhao,★

    1School of Mechanical Engineering,Northwestern Polytechnical University,Xi’an,China

    2Department of Process and Information Technology,Chengdu Aircraft Industrial(Group)Co.,Ltd.,Chengdu,China

    3School of Information and Software Engineering,The Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China,Chengdu,China

    ABSTRACT

    With the continuous expansion of the Industrial Internet of Things(IIoT),more and more organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.

    KEYWORDS

    Key-insulated;SM2 algorithm;digital signature;Industrial Internet of Things(IIoT);provable security

    1 Introduction

    In recent years,the Industrial Internet of Things(IIoT),a core subset of the Internet of Things(IoT) [1,2],has seen rapid development and has brought substantial and sustainable advancement to industries [3].The IIoT is a technology that connects sensors,smart devices and actuators to the existing “Internet” through Wireless Sensor Networks (WSNs) [4].In IIoT environment,all smart devices can monitor,transmit,collect,and analyze information automatically.Apparently,compared to traditional industries,IIoT achieves more efficient and sustainable production,significantly reducing operating costs and resource consumption[5].Consequently,the implementation of IIoT-centered smart industry plays a significant role in promoting the development of traditional manufacturing industry to smart manufacturing industry [6].However,despite IIoT brings plenty of benefits,it also faces thorny data processing issues.Of particular concern is the huge amount of data that is monitored and collected by IIoT smart devices.How to store and process the big data raise serious challenges [7].Fortunately,cloud computing can provide us with a solution to appropriately deal with the aforementioned problems [8].Cloud computing has broad network access and resource pooling,as well as formidable processing power and low cost advantages[9].In IIoT-cloud computing environment,the challenges of big data collection,storage and processing can be properly solved[10].

    Although the IIoT-cloud computing environment brings new ideas to solve the aforementioned problems,the authenticity and integrity of the data still need to be addressed urgently[5].Generally,the channel between the cloud server and the smart device is considered undependable[11].Therefore,ensuring that the authenticity of data is not maliciously intercepted and modified during transmission is a very difficult challenge.The digital signatures are a promising cryptographic primitive to address these challenges[12](We give an example of a digital signature in Fig.1).The data can be signed by the signer’s private key before it is sent from the smart devices to the cloud server.The recipient,in turn,can verify the integrity of the message by verifying the signature [4].Consequently,a series of public key infrastructure(PKI)signature protocols were progressively presented[13].

    Figure 1 :Digital signature

    In a PKI-based digital signature system,a trusted certification authority (CA) binds a user’s identity to a corresponding public key using an issued certificate.In 1976,the first digital signature scheme was proposed by Diffie et al.[14].It is through the paper [14] that the foundation of Public Key Cryptography (PKC) has been established for the first time.In the next decades,Public Key Infrastructure (PKI) is a popularly applied authentication architecture in traditional PKCbased schemes.Based on the aforementioned knowledge,the U.S.government has released a federal information processing standard: Digital Signature Standard (DSS).And the Chinese government adopts RSA digital signature scheme.

    With the development of cryptography and computer technology,the commonly used 1024-bit RSA algorithms are facing serious security threats.In 1987,the Elliptic Curve Cryptography(ECC),which performs better than traditional cryptosystem(such as RSA and DSA)in security and efficiency,was proposed for the first time [15].On December 17 2010,the public key cryptographic algorithm SM2,published by the Chinese State Cryptography Administration Office in 2010[16],is also an ECC.Noticeable,it has been standardized by ISO/IEC in ISO/IEC 14888-3:2016/DAMD 1[17].Since the algorithm is based on ECC,its signature speed and secret key generation speed are faster than RSA.Compared with RSA algorithm,256-bit SM2 password strength is already higher than 2048-bit RSA password strength.In order to demonstrate the advantages of SM2 over RSA more intuitively,we have made a comparison between the two dimensions of security and speed.The comparison results are listed in Tables 1 and 2.Thus,SM2 has better performance and security:high password complexity,fast processing speed,and less machine performance consumption.Now,SM2 algorithm is already widely executed in lots of fields,such as electronic authentication systems,ECommerce systems and E-Government systems.

    Table 1 : The comparison of security between SM2 and RSA

    Table 2 : The comparison of speed between SM2 and RSA

    Another inevitable thorny problem is the key exposure problem since the signature operations are often executed frequently on insecure smart devices.It is obvious that key exposure will lead to disastrous consequences.The primitive of key-insulated was given by Dodis et al.in 2002 [18] for the first time.This cryptographic primitive effectively deals with the problem of catastrophic key exposure.The signer’s temporary signing key completes the key evolution with the assistance of the helper.Without the helper providing an update message,the signer’s key cannot be updated from the last time period to the current time period.With the helper’s key secure,an adversary can only forge the signature scheme for the current time period rather than the next one.After that,A strong key-insulated signature scheme was proposed by Dodis et al.[19].Then,a number of well-designed key-insulated schemes were gradually constructed based on the work of Hanaoka et al.[20–22].It is worth noting that the scheme proposed by Zhou et al.[22] does not have the nature of strong keyinsulated.This means that an adversary can forge a signature as a legitimate user if the helper’s key is cracked.Therefore,Weng et al.[23]proposed a promising idea,namely secure key-updates.At present,this idea has been widely applied.

    Given the above analysis,it faces the key exposure issue when the SM2 digital signature algorithm is integrated into the IIoT-cloud computing environment.This problem has attracted widespread attention from domestic and international authors [24,25].In order to address the thorny issue of key exposure mentioned above,an efficient and provable secure key-insulated signature scheme based on SM2(SM2-KI-SIGN)is proposed by us in the IIoT-cloud environment now.Our scheme is inspired by the idea of secure key-updates[23].Our scheme also has the properties of strong key-insulated and secure key-updates.However,it is more efficient than the Weng et al.[23] due to the use of Elliptic Curve Cryptography(ECC).

    Our core contributions in this paper are as follows:

    1) Introduction of an efficient and secure key-insulated signature scheme based on the SM2 cryptosystem,termed SM2-KI-SIGN;

    2) Demonstration that SM2-KI-SIGN achieves EUF-CMA (existential unforgeability under chosen message attacks)and has the key-insulated property,thereby efficiently mitigating the key exposure issue;

    3) Empirical validation of the efficiency and applicability of SM2-KI-SIGN through specific experimental simulations and performance assessments.

    The organization is illustrated in this paragraph.In Section 2,we demonstrate some corresponding preliminaries such as elliptic curve,security assumption,and system framework.In Section 3,the concrete construction of SM2-KI-SIGN is provided.In Section 4,the associated security proof,the theoretical as well as experiment evaluation is demonstrated.Finally,Section 5 gives a summary of this paper.

    2 Preliminaries

    2.1 Elliptic Curve Discrete Logarithm(ECDL)Problem

    Set E(Fq)as an elliptic over FqwhereG∈E(Fq).There are two pointsP,Q∈E(Fq)of orderq.BesidesQis a multiplicity of points ofP.If there exists a positive integerl∈[0,q-1] that makesQ=l·P,then obtaining the value oflfromPandQis the ECDL problem.

    2.2 ECDLP Assumption

    There is a P.P.T algorithmAhas advantage at leastεto solve ECDL problem inE(Fq).

    Pr[A(P,Q)=l|Q=l·P,l∈Z*q]≥ε

    2.3 Bilinear Pairings

    Let G be an addictive group and GTbe a multiplicative group.G and GThas the equivalent prime orderq.Pis one of the generators of G.The bilinear mape: G × G →GTsatisfies the below properties:

    1) Bilinearity:?m,n∈Z*q,e:(mP,nP)=e:(P,P)mn.

    2) Non-degeneracy:e:(P,P)/=1.

    3) Computability:There exists an algorithm to calculate bilinear mape:G×G →GT.

    2.4 Elliptic Curve Cryptography

    In recent decades,Elliptic Curve Cryptography (ECC) has been widely studied and applied.In 1985,a mathematician named Victor Miller studied elliptic curves in cryptography and hypothesised that it was highly unlikely that exponential calculus methods would work for elliptic curves.ECC is a public key cryptography method based on the algebraic structure of elliptic curves over a finite field,allowing the use of smaller keys to provide equivalent security.Elliptic curves have now been applied to tasks such as key negotiation,digital signatures,pseudo-random generators.ECC utilises smaller keys,which reduces storage and transmission consumption.Thus,ECC can be better adapted to the IIoT-cloud environment.

    2.5 Notations

    The notations presented in the SM2-KI-SIGN scheme are defined in Table 3.

    Table 3 : Notations

    2.6 Outline of SM2-KI-SIGN

    The SM2-KI-SIGN scheme consists of six different algorithms described below:

    1) Setup:Input the security parameter k,the KGC produces params.

    2) KeyGen:Given params,time periodt,the user generates the public and private key(d,P)for him/her own as well as generates the public and private key for the helper(hk,HK).

    3) Upd*:Input params,time periodtiandtj,the helper output the partial temporary keyPSKi,j.

    4) Upd:Input params,ti,Tj,andPSKi,j,the helper outputTi.

    5) Sign:Input the params,ti,Ti,and the messagem,a signer generate a signatureφonm.

    6) Verify:Input the params,P,HK,and a message-signature pair(m,φ),a verifier output 1 when the signature is valid.

    3 Our Proposed SM2-KI-SIGN Scheme

    In this section,we further elaborate the detailed construction of SM2-KI-SIGN digital signature scheme we proposed.This scheme consists of six different algorithms as listed below.In these algorithms,Upd*and Upd are mainly designed for address the problem of key exposure.The flow of interaction between entities in the SM2-KI-SIGN is illustrated in Fig.2.

    1.Setup:Input the security parameter k,the administrator operates as follows:

    · Generate an elliptic curvey2=x3+ax+bover a finite field Fpas well as the discriminant≠4a3+27b2/=0.(p,a,b,q)are the parameters of the curve,wherepandqare two large prime numbers.pis the size of Fp.

    · SelectG∈RE(Fp)as one of the generators.Besides letqbe the order ofG.

    · Set the public parameters params=(p,a,b,q,G)and then output it.

    · Select three cryptographic hash functionsH1,H2,H3and describe them with details here:H1:{0,1}*→E(Fp),H2:{0,1}*→Z*q,andH3:{0,1}*→{0,1}256.

    2.KeyGen:Input params,the user operates as follows:

    · Selectd∈RZ*qas the private key.

    · CalculateP=d·Gand setPas the public key.

    · Output the pair of the private and public key(d,P).

    · Given the time periodt0,the helper for the user executes as follows.

    · Selecthk∈RZ*qas the private key for the helper.

    · Calculate the public key for the helperHK=hk·G.

    · Output(hk,HK).

    · Calculate initial time period keyT0=hk·X0and time period functionX0=H1(t0).

    3.Upd*:Input two time period indicestiandtj,the helper for the user executes as below:

    · CalculateXi,j=H1(ti)-H1(tj).

    · Calculate the partial temporary keyPSKi,j=hk·Li,j.

    · ReturnPSKi,j.

    4.Upd:Input a time period indexti,the partial temporary keyPSKi,jand the temporary keyTj,the signer obtains the temporary key for the time periodtias below:

    · SetTi=Tj+PSKi,j.

    · Return the temporary keyTi.

    5.Sign:Input params,the messagemto be signed,time period indexti,as well as the private keyd,the signer operates as follows:

    · CalculateZ=H3(ENTLID‖ID‖a‖b‖G‖x‖y).ENTLIDdenotes the length of a signer’sID.

    · Calculatee=H2(),where=Z‖m.

    · Selectk∈RZ*q,then calculateK=k·G.

    · CalculateK′=K+k·Ti=(x1,y1),r=x1+emodq.

    · Calculates=(1+d)-1·(k-r·d)modq.

    · Calculateφ=(1+hk)-1·(k-r·hk)modq.

    · Output the signatureσ=(r,s,φ).

    6.Verify: Input params,the public keyP=d·G,the public key of helperHK=hk·G,the messagemas well as the related signatureσ,and then the verifier operates as below:

    · CalculateZ=H2(ENTLID‖ID‖a‖b‖G‖x‖y).The definition ofENTLIDis the same as the aforementioned one.

    · Ifr/∈Z*q,the verification fails and then terminate the algorithm.

    · Ifs/∈Z*q,the verification fails and then terminate the algorithm.

    · Calculatet=(r+s)modq.Ift=0,the verification fails and terminate the algorithm.

    · Calculateψ=(r+φ)modq.Ifψ=0,the verification fails and terminate the algorithm.

    · Calculate(x1,y1)=s·G+t·P+φ·Xi+ψ·Ti.

    · CalculateR=(e+x1)modn,ifR=r,the signature is valid and the verification passes,otherwise the verification fails.

    7.Correctness

    (x1,y1)=s·G+t·P+φ·Xi+ψ·Ti

    =s·G+(r+s)·P+φ·Xi+(r+φ)·Ti

    =s·G+(r+s)·d·G+φ·Xi+(r+φ)·hk·Li

    =(1+d)·s·G+r·d·G

    +(1+hk)·φ·Xi+r·hk·Xi

    =(1+d)·(1+d)-1·(k-r·d)·G+r·d·G

    +(1+hk)·(1+hk)-1·(k-r·hk)·Xi+r·hk·Xi

    =(k-r·d)·G+r·d·G

    +(k-r·hk)·Xi+r·hk·Xi

    =k·G+k·Ti

    Figure 2 :Process of SM2-KI-SIGN scheme

    4 Analysis

    4.1 Security Proof

    1)Theorem 1.The SM2-KI-SIGN scheme we proposed is perfectly key-insulated against a P.P.T adversaryAinGame.

    Proof:Given an ECDL problem instance(P,P0),Bcomputesa∈RZ*q,such thatP0=a·P,wherePisGandBcontrols the stochastic prediction machine.

    Setup:First,BinitializesAwithPKGC=P0,then it sends the public parameters params=(p,a,b,q,G)and(P,PKGC)toA.

    Query:The interaction process between adversaryAandBis as follows.Acan execute queries adaptively.

    1)H1query:Bmanages the listL1with the tuple(ti,Xi).AfterAdelivered the(ti,Xi)query to theH1()oracle,Bretrieves the listL1at the beginning.IfL1includes(ti,Xi),Banswers toAwithXi.Otherwise,BselectsXi∈RZ*q,returnsXitoAand inserts the tuple(ti,Xi)intoL1.

    2)H2query:Bmanages the listL2with the tuple(e,).AfterAdelivered the(e,)query to theH2()oracle,Bretrieves the listL2at the beginning.IfL2includes(e,),Banswers toAwithe.Otherwise,Bselectse∈RZ*q,returnsetoAand inserts the tuple(e,)intoL2.

    3)H3query:Bmanages the listL3with the tuple (ID,Z).AfterAdelivered the (ID,Z)query to theH3()oracle,Bretrieves the listL3at the beginning.IfL3includes(ID,Z),Banswers toAwithZ.Otherwise,BselectsZ∈RZ*q,returnsZtoAand inserts a tuple(ID,Z)intoL3.

    4) Extract-Private-Key:Bmanages the listLpriwith the tuple (ID,d,hk,PSKi,j).After the identityIDis delivered to the oracle,thenBretrieves the listLpri.IfIDi=IDI,thenBterminate the simulation (EventE1).OtherwiseLpriincludes (ID,d,hk,PSKi,j),BgivesAanswers with (d,hk,PSKi,j); IfLpridoes not include (ID,d,hk,PSKi,j),Bchoosesdi,hki∈Z*qrandomly,and computesPSKi′,j=hki·Hi,j.ThenBinserts the tuple(ID,di,hki,)intoLpri.Lastly,Banswers toAwith(di,hki,PSKi′,j).

    5) Extract-Public-Key:Bmanages the listLpubwith the tuple(ID,P,HK).After the identityIDis provided to this oracle,Bretrieves the listLpub.IfLpubincludes(ID,P,HK),Banswers toAwith(ID,P,HK).OtherwiseLpubdoes not include(ID,P,HK),Bmakes queries toLpar,Lpriand computeP=d·GandHK=hk·Gas well as inserts the tuple(P,HK)into theLpub.Lastly,Banswers toAwith(ID,P,HK).

    6) Public-Key-Replace: AfterAmakes a query of (ID,P′,HK′),Bretrieves the listLpub.IfLpubdoes not include(ID,P,HK),Bfirst does a Extract-Public-Key query with identityID,and then,setsP=P′,HK=HK′.To respond the query,Bwill update the listLpubwith(P,HK).

    7) Signature query: AfterAmakes a query of (ID,M′),BBpicks a numbera∈Z*qat random,and setshk=a,φ=(1+hk)-1·(k-r·hk)modq.After that,Breturns a valid signatureθtoA.

    Forgery: After polynomially bounded queries,Aforges a signatureσ=(r1,s1,φ1) on message (ID*,M) with non-negligible probabilityε.IfID/=IDi/=IDI,the challenge ofBfails and stops (eventE2); otherwise,the forgery succeeds.Then,depending on the forking lemma,Arepeats the aforementioned query using different hash values,two more signature pairs(r2,s2,φ2)and(r3,s3,φ3)can be generated.

    (x1,y1)=sj·G+tj·P+φj·XI+ψj·TI,j=1,2,3

    Set (x1,y1)=c·G+c·Ti.BecauseP0=a·P·G,Ti′=v·P·Xi,we can obtainc=sj+a·P·G+φj+v·P·Xi.

    There are three unknown numbersc,a,vthat are linearly independent of each other.Combining the three equations can find the value ofa.Bsuccessfully solves anECDLPinstance using the capabilities ofA.To forge a pair of signatures successfully,the following three events need to be satisfied:

    1).π1represents that no partial private key query has been performed on it,i.e.,the eventE1does not occur,

    2).π2The signature forgery under the messageM*is valid.

    3).π3The forged signature is subject to ID-consistency,i.e.,the eventE2does not occur,Pr[π3|π1∧π2]≥

    Thus,Buses the ability ofAin polynomial time with non-negligible probabilityε′=Pr[π1∧π2∧π3]=Pr[π1]·Pr[π2|π2]·Pr[π3∧π2∧π1]≥successfully solves anECDLPinstance,which contradicts the ECDLP’s difficulty contradiction,so the scheme is able to resist the attacker’sAadaptive selection existential forgery under the choice message attack.

    2)Theorem 2.The proposed SM2-KI-SIGN is strong key-insulated secure against adversaryB.

    Proof:The adversaryBhas the non-negligible probabilityε′≥The proof is same as those ofTheorem 1,so we omit the proof here.

    3)Theorem 3.The SM2-KI-SIGN scheme we proposes in this paper has secure key updates.

    Proof: As to any period indicestiandtj,the update keyPSKi,jcan be evolved fromTiandTj.

    4)Theorem 4.The proposed SM2-KI-SIGN is secure against EUF-CMA.

    Proof:At first,assume that a P.P.T adversaryAcan exchange information with the signer.Thus,L,rands,φcan be viewed byAin the key-insulated signature generating step because ofs=(1+d)-1·(k-r·d)modqandφ=(1+hk)-1·(k-r·hk)modq.Aobtains the value ofr′.IfAwants to obtaindandhkfromsandφ,he/she must get the value ofk.AlthoughAknowsL=k·G+k·Ti,it is aECDLPto calculatekfromK.IfECDLPis difficult to solve,then the private key cannot be received byAwhen he/she exchanges information with the signer.In our proposed SM2-KI-SIGN signature scheme,the signing and verification equations we designed are consistent with the SM2 digital signature scheme.The SM2-KI-SIGN key-insulated signature scheme we proposed is unforgeable under the EUF-CMA attack,since the SM2 signature scheme satisfies EUFCMA.

    4.2 Performance Comparison

    To certify the efficiency and feasibility of the proposed SM2-KI-SIGN scheme,we compare it with the existing works in this subsection.The comparison results are demonstrated in figures and tables.

    In Table 4,we summarise and compare the properties between SM2-KI-SIGN scheme and other relevant schemes.We compare the existing schemes from three dimensions:strong key-insulated,secure key-updates and security assumption in Table 4.Here,it should be noted that the symbol “√” indicates that the scheme satisfies this corresponding property,as well as the symbol “×” means that this capability cannot be achieved by this scheme.Apparently,our proposed SM2-KI-SIGN scheme can satisfy all properties.And this can be proven secure under standardECDLPassumptions which is weaker than other security assumptions.

    Table 4 : The comparison of properties

    Then,a simulation experiment that runs on a Windows 10 computer equipped with an Intel Core i7-6700@2.60-GHz processor,as well as 8 GB,is given in this section.Then,it is implemented in IDEA with Java pairing-based cryptography (JPBC) library.To achieve the same security level as 1024-bit RSA,the super-singular curvey2=x3+x(modp)with an embedding degree of 2 is utilized,whereq=2159+217+1 is a 160-bit Solinas prime andp=12q·r-1 is a 512-bit prime.As to the ECCbased scheme,in order to offer the security with the equivalent level,we used the Koblitz elliptic curvey2=x3+a·x+bdefined on F2163providing the ECC group.In Table 5,a theoretical evaluation of the signature length,signing cost,as well as verification cost is given.Besides the notations of required signature length and cost of signing and verification are also enumerated in the footnote of Table 5.

    Table 5 : The performance comparison of different schemes

    Compared with the existing schemes especially the schemes listed here,our scheme has more advantages in cost.This advantage makes SM2-KI-SIGN scheme more suitable for untrusted channels in IIoT-cloud computing environment.At the same time,we show a cost comparison of SM2-KISIGN with other schemes[26–29]in Fig.3.

    5 Conclusions

    This paper presented the first key-insulated digital signature scheme SM2-KI-SIGN based on the SM2 algorithm.The proposed SM2-KI-SIGN scheme can effectively reduce the risk of key exposure due to untrusted channels in IIoT-cloud computing environment.We first gave a formal outline of the scheme.Following this,a concrete scheme and the formal security proof under theECDLPassumption in the random oracle model were given.Finally,according to the theoretical analysis and simulation experiments,the SM2-KI-SIGN scheme is more efficient and practical than other related key-insulated works.In the current research field,SM2-KI-SIGN introduces a method to make up for the key exposure defects of existing SM2 signature algorithms.On the other hand,our work can provide a new idea for future commercial digital signature schemes.

    Acknowledgement:We have already revised the Acknowledgement section in the manuscript.

    Funding Statement: This work was supported in part by the National Natural Science Foundation of China (Nos.62072074,62076054,62027827,62002047),the Sichuan Science and Technology Innovation Platform and Talent Plan (Nos.2020JDJQ0020,2022JDJQ0039),the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131),the YIBIN Science and Technology Support Plan (No.2021CG003),the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).

    Author Contributions: study conception and design: Senshan Ouyang,Baichuan Shao and Yang Zhao;analysis and interpretation of results:Xiang Liu,Lei Liu,Shangchao Wang;draft manuscript preparation:Senshan Ouyang and Baichuan Shao;figures and tables production:Baichuan Shao.

    Availability of Data and Materials:Our current research is limited to algorithm design and analysis,and has not yet applied it to practical scenarios,so we have not yet addressed the source and use of data and materials.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    色在线成人网| 欧美3d第一页| 精品国内亚洲2022精品成人| 精品一区二区三区视频在线观看免费| 香蕉av资源在线| 岛国在线免费视频观看| 99久国产av精品| 色综合婷婷激情| 国内精品美女久久久久久| 国产免费av片在线观看野外av| 免费观看人在逋| 国产中年淑女户外野战色| 日韩大尺度精品在线看网址| 国产精品一区二区性色av| 国产精品,欧美在线| 一区二区三区四区激情视频 | 超碰av人人做人人爽久久| 精品一区二区三区视频在线| 国产精品野战在线观看| 一进一出抽搐gif免费好疼| 精品乱码久久久久久99久播| 真人一进一出gif抽搐免费| 级片在线观看| 亚洲成人免费电影在线观看| 国产免费av片在线观看野外av| 欧美在线一区亚洲| 黄色丝袜av网址大全| 白带黄色成豆腐渣| 久久久久久久久大av| 免费人成视频x8x8入口观看| 蜜桃久久精品国产亚洲av| 日韩国内少妇激情av| 国产av在哪里看| a级毛片免费高清观看在线播放| 亚洲国产色片| 中文字幕av在线有码专区| 午夜福利在线观看免费完整高清在 | 国产色婷婷99| ponron亚洲| 长腿黑丝高跟| 无人区码免费观看不卡| 国产精品亚洲美女久久久| av在线观看视频网站免费| a级毛片免费高清观看在线播放| 乱系列少妇在线播放| 成人综合一区亚洲| 波多野结衣高清无吗| 色综合站精品国产| 成人鲁丝片一二三区免费| 中文资源天堂在线| 午夜福利欧美成人| 日韩高清综合在线| 国产探花在线观看一区二区| 国产三级中文精品| 国产黄色小视频在线观看| 日本黄色片子视频| 婷婷亚洲欧美| 亚洲av免费在线观看| 男插女下体视频免费在线播放| 天堂影院成人在线观看| 99久久久亚洲精品蜜臀av| 亚洲熟妇中文字幕五十中出| 国产麻豆成人av免费视频| 国产激情偷乱视频一区二区| 男人舔奶头视频| 久久久久久国产a免费观看| 麻豆成人午夜福利视频| 亚洲精华国产精华液的使用体验 | 在线观看免费视频日本深夜| 十八禁网站免费在线| 午夜精品在线福利| 老师上课跳d突然被开到最大视频| 国产av一区在线观看免费| 免费不卡的大黄色大毛片视频在线观看 | 国产日本99.免费观看| 久久久久九九精品影院| 熟女人妻精品中文字幕| 老司机福利观看| 啦啦啦观看免费观看视频高清| 国产精品电影一区二区三区| 一个人看的www免费观看视频| 大型黄色视频在线免费观看| 久久99热这里只有精品18| 99九九线精品视频在线观看视频| 亚洲无线在线观看| 两个人视频免费观看高清| 春色校园在线视频观看| 欧美色视频一区免费| 麻豆精品久久久久久蜜桃| 久久久久精品国产欧美久久久| 成人一区二区视频在线观看| 日本熟妇午夜| 国内精品美女久久久久久| 久久99热这里只有精品18| 国产精品日韩av在线免费观看| 亚洲七黄色美女视频| 久久久久性生活片| 99热这里只有精品一区| 国产探花在线观看一区二区| 成人国产一区最新在线观看| 一个人免费在线观看电影| 免费看日本二区| 亚洲国产精品合色在线| 97超视频在线观看视频| 午夜爱爱视频在线播放| 欧美日韩瑟瑟在线播放| 国产精品国产三级国产av玫瑰| 在现免费观看毛片| 看片在线看免费视频| 神马国产精品三级电影在线观看| 69av精品久久久久久| 国内久久婷婷六月综合欲色啪| 国产精品亚洲一级av第二区| 国国产精品蜜臀av免费| 色av中文字幕| 全区人妻精品视频| 亚洲精品国产成人久久av| 在线观看午夜福利视频| 亚洲欧美清纯卡通| 欧美色视频一区免费| 国产美女午夜福利| 国产成人a区在线观看| 成人高潮视频无遮挡免费网站| 久久精品人妻少妇| 精品国产三级普通话版| 国产精品三级大全| 最近最新免费中文字幕在线| 欧美色欧美亚洲另类二区| 观看免费一级毛片| 色5月婷婷丁香| 人妻夜夜爽99麻豆av| 国内揄拍国产精品人妻在线| a级毛片a级免费在线| 久久午夜福利片| 亚洲精品456在线播放app | 免费av毛片视频| 国产亚洲av嫩草精品影院| 国产精品电影一区二区三区| 午夜福利欧美成人| 精品人妻熟女av久视频| 网址你懂的国产日韩在线| 88av欧美| 国产日本99.免费观看| 欧美激情久久久久久爽电影| 香蕉av资源在线| 国产真实乱freesex| 91在线观看av| 久久久久久久久大av| 99在线视频只有这里精品首页| 成人精品一区二区免费| 丰满的人妻完整版| 欧美色视频一区免费| 中国美白少妇内射xxxbb| 欧美bdsm另类| 一进一出抽搐动态| 久久精品国产亚洲av涩爱 | 亚洲成人精品中文字幕电影| 春色校园在线视频观看| 欧美激情国产日韩精品一区| 亚洲国产欧洲综合997久久,| 成人亚洲精品av一区二区| 欧美三级亚洲精品| 一夜夜www| 中文在线观看免费www的网站| 日韩欧美 国产精品| 亚洲性夜色夜夜综合| 亚洲av电影不卡..在线观看| 日本黄色视频三级网站网址| 日本爱情动作片www.在线观看 | 国产视频一区二区在线看| 99在线人妻在线中文字幕| 国产亚洲欧美98| .国产精品久久| 亚洲内射少妇av| 成年免费大片在线观看| 国产一级毛片七仙女欲春2| 亚洲最大成人av| 免费黄网站久久成人精品| 一区二区三区激情视频| 91在线精品国自产拍蜜月| 国产精品一区二区免费欧美| 亚洲精品日韩av片在线观看| 99riav亚洲国产免费| 成人精品一区二区免费| 国产精品国产三级国产av玫瑰| x7x7x7水蜜桃| 熟女电影av网| 一区二区三区四区激情视频 | 内地一区二区视频在线| 日韩欧美 国产精品| 一夜夜www| 国产成人a区在线观看| 午夜影院日韩av| 亚洲精品久久国产高清桃花| 小蜜桃在线观看免费完整版高清| 他把我摸到了高潮在线观看| 欧美3d第一页| 日本免费一区二区三区高清不卡| 午夜福利在线观看吧| 天堂av国产一区二区熟女人妻| 五月伊人婷婷丁香| 真人一进一出gif抽搐免费| 国产免费男女视频| 国产一区二区激情短视频| 国产v大片淫在线免费观看| 欧美日韩黄片免| 我要搜黄色片| 亚洲av中文字字幕乱码综合| 99久久中文字幕三级久久日本| 99热6这里只有精品| 亚洲色图av天堂| 欧美日韩中文字幕国产精品一区二区三区| 国产大屁股一区二区在线视频| 国产精品久久久久久亚洲av鲁大| 两个人视频免费观看高清| 99热精品在线国产| 我的女老师完整版在线观看| 99久国产av精品| 我的老师免费观看完整版| 精品免费久久久久久久清纯| 国产精品人妻久久久久久| 他把我摸到了高潮在线观看| 91麻豆av在线| 99久久久亚洲精品蜜臀av| 99国产精品一区二区蜜桃av| 亚洲三级黄色毛片| 我的女老师完整版在线观看| 亚洲男人的天堂狠狠| 精品人妻偷拍中文字幕| 成年人黄色毛片网站| 一个人看视频在线观看www免费| 国产精品国产三级国产av玫瑰| 欧美丝袜亚洲另类 | 美女 人体艺术 gogo| 人人妻人人澡欧美一区二区| 国产成人影院久久av| 中文资源天堂在线| 国产一区二区激情短视频| 亚洲精品乱码久久久v下载方式| 亚洲精品亚洲一区二区| 亚洲最大成人手机在线| 亚洲精品一卡2卡三卡4卡5卡| 露出奶头的视频| 午夜久久久久精精品| 国产精品福利在线免费观看| 熟女人妻精品中文字幕| 欧美日韩黄片免| 91麻豆精品激情在线观看国产| 美女 人体艺术 gogo| 九九在线视频观看精品| 99国产精品一区二区蜜桃av| 特级一级黄色大片| or卡值多少钱| 淫妇啪啪啪对白视频| 欧美bdsm另类| 91精品国产九色| 身体一侧抽搐| 中亚洲国语对白在线视频| 亚洲精华国产精华液的使用体验 | 欧美+日韩+精品| 深夜精品福利| 别揉我奶头~嗯~啊~动态视频| 少妇的逼水好多| 国产精品一及| 国产久久久一区二区三区| 国产男靠女视频免费网站| 国产亚洲精品久久久com| 日韩精品中文字幕看吧| 噜噜噜噜噜久久久久久91| 又黄又爽又刺激的免费视频.| 亚洲成人中文字幕在线播放| 亚洲一区高清亚洲精品| 婷婷精品国产亚洲av在线| 国产亚洲精品久久久com| 欧美不卡视频在线免费观看| 日日干狠狠操夜夜爽| 小蜜桃在线观看免费完整版高清| 九色成人免费人妻av| 国产精品永久免费网站| 18禁黄网站禁片免费观看直播| 精品人妻熟女av久视频| 国产女主播在线喷水免费视频网站 | 国产精品久久视频播放| 伦理电影大哥的女人| 国产精品精品国产色婷婷| 亚洲在线自拍视频| 99久久中文字幕三级久久日本| 老司机福利观看| 国产av在哪里看| 麻豆成人午夜福利视频| av在线蜜桃| 国产精品久久视频播放| 国产精品1区2区在线观看.| 一级毛片久久久久久久久女| 国产亚洲精品av在线| 亚洲国产欧洲综合997久久,| 99热这里只有是精品50| 国产私拍福利视频在线观看| 色尼玛亚洲综合影院| 91av网一区二区| 很黄的视频免费| 一区二区三区高清视频在线| 免费搜索国产男女视频| 老师上课跳d突然被开到最大视频| 亚洲专区中文字幕在线| 天美传媒精品一区二区| 国产高清三级在线| 99久久精品热视频| 午夜福利成人在线免费观看| 成人三级黄色视频| 成年女人毛片免费观看观看9| 久久久午夜欧美精品| 简卡轻食公司| 两个人的视频大全免费| 1024手机看黄色片| 99久久久亚洲精品蜜臀av| 一本久久中文字幕| 熟女电影av网| 男插女下体视频免费在线播放| 婷婷精品国产亚洲av| 一夜夜www| 日日摸夜夜添夜夜添av毛片 | 国内精品一区二区在线观看| 亚洲狠狠婷婷综合久久图片| 在线国产一区二区在线| a级毛片免费高清观看在线播放| 黄色欧美视频在线观看| 久久精品影院6| 又黄又爽又刺激的免费视频.| 久久久成人免费电影| 婷婷丁香在线五月| 少妇丰满av| 99久国产av精品| 无遮挡黄片免费观看| 精品无人区乱码1区二区| 国产高潮美女av| 一本一本综合久久| 日本黄大片高清| 桃红色精品国产亚洲av| 国产极品精品免费视频能看的| 在线观看午夜福利视频| 日韩中文字幕欧美一区二区| 成年人黄色毛片网站| 一区二区三区激情视频| 日韩亚洲欧美综合| 亚洲成人久久性| 亚洲四区av| 国产精品亚洲一级av第二区| 禁无遮挡网站| 国产一区二区三区视频了| 禁无遮挡网站| 悠悠久久av| 麻豆国产av国片精品| 国产一区二区三区视频了| 毛片女人毛片| 国内精品美女久久久久久| 国产亚洲精品久久久com| 日韩中文字幕欧美一区二区| 在现免费观看毛片| 久久久久久九九精品二区国产| av女优亚洲男人天堂| 日本黄大片高清| 亚洲av免费高清在线观看| 国产午夜福利久久久久久| 国产亚洲av嫩草精品影院| 动漫黄色视频在线观看| 亚洲国产色片| 亚洲av中文av极速乱 | av国产免费在线观看| 免费看日本二区| 日本色播在线视频| 午夜福利成人在线免费观看| 久久99热这里只有精品18| 亚洲精品乱码久久久v下载方式| 日本 av在线| 亚洲久久久久久中文字幕| 午夜a级毛片| 九九爱精品视频在线观看| 国产精品av视频在线免费观看| 亚洲人成网站在线播| 少妇丰满av| 蜜桃久久精品国产亚洲av| 亚洲美女视频黄频| 国产色爽女视频免费观看| 久久中文看片网| 亚洲精品乱码久久久v下载方式| 97碰自拍视频| 一级毛片久久久久久久久女| 最近最新免费中文字幕在线| 日本三级黄在线观看| 国产女主播在线喷水免费视频网站 | 特级一级黄色大片| 亚洲国产欧洲综合997久久,| 国产大屁股一区二区在线视频| 国产一区二区在线观看日韩| 一进一出抽搐动态| 身体一侧抽搐| 日本 欧美在线| 国产亚洲精品综合一区在线观看| 亚州av有码| 极品教师在线视频| 男人舔奶头视频| 一夜夜www| 日日夜夜操网爽| 色吧在线观看| 精品日产1卡2卡| 久久精品人妻少妇| 毛片女人毛片| 波野结衣二区三区在线| 国产伦人伦偷精品视频| 日日夜夜操网爽| 国产私拍福利视频在线观看| 亚洲av不卡在线观看| 国产精品综合久久久久久久免费| 欧美黑人巨大hd| 91狼人影院| 精品久久国产蜜桃| 十八禁国产超污无遮挡网站| eeuss影院久久| 久久99热6这里只有精品| 国产精品综合久久久久久久免费| 性色avwww在线观看| 欧美日韩瑟瑟在线播放| 听说在线观看完整版免费高清| 免费人成在线观看视频色| 色综合亚洲欧美另类图片| 91麻豆av在线| 日本与韩国留学比较| 一进一出抽搐动态| 亚洲中文字幕一区二区三区有码在线看| 一个人观看的视频www高清免费观看| 国产午夜精品论理片| 色综合站精品国产| 人妻丰满熟妇av一区二区三区| 国产主播在线观看一区二区| 成年免费大片在线观看| 大型黄色视频在线免费观看| 国内精品宾馆在线| 九九在线视频观看精品| 久久亚洲真实| 亚洲欧美日韩东京热| 亚洲狠狠婷婷综合久久图片| av专区在线播放| 国产精品人妻久久久影院| 亚洲第一电影网av| 国产一区二区在线观看日韩| 女人被狂操c到高潮| 自拍偷自拍亚洲精品老妇| 亚洲成人久久爱视频| 麻豆久久精品国产亚洲av| 久久久久国内视频| 波野结衣二区三区在线| 深爱激情五月婷婷| 免费观看精品视频网站| 久久久久久久久大av| 亚洲国产精品久久男人天堂| 日韩欧美精品v在线| xxxwww97欧美| 人人妻,人人澡人人爽秒播| 男女啪啪激烈高潮av片| 日本免费a在线| 免费观看精品视频网站| 在线免费观看的www视频| 国产精品永久免费网站| 久久精品夜夜夜夜夜久久蜜豆| 国产v大片淫在线免费观看| 亚洲美女黄片视频| 一级黄片播放器| 国产精品综合久久久久久久免费| 精品人妻熟女av久视频| 搡老岳熟女国产| 亚洲天堂国产精品一区在线| 欧美性猛交黑人性爽| 两性午夜刺激爽爽歪歪视频在线观看| 日韩高清综合在线| 日韩欧美国产一区二区入口| 免费看日本二区| 亚洲av.av天堂| 日韩一区二区视频免费看| 午夜亚洲福利在线播放| 免费看光身美女| 91在线精品国自产拍蜜月| 免费看光身美女| 成年女人看的毛片在线观看| 亚洲国产欧洲综合997久久,| 国内久久婷婷六月综合欲色啪| 亚洲乱码一区二区免费版| 热99re8久久精品国产| 国产午夜福利久久久久久| 色播亚洲综合网| 在线播放无遮挡| 国产精品爽爽va在线观看网站| 欧美最黄视频在线播放免费| 国产91精品成人一区二区三区| 黄色丝袜av网址大全| 搡女人真爽免费视频火全软件 | 亚洲内射少妇av| 成人综合一区亚洲| 亚洲熟妇中文字幕五十中出| 久久久精品大字幕| 国产高清视频在线观看网站| 成人美女网站在线观看视频| 天堂动漫精品| 欧美一级a爱片免费观看看| 美女黄网站色视频| 国产色爽女视频免费观看| 美女黄网站色视频| 观看免费一级毛片| 国产成年人精品一区二区| 欧美一级a爱片免费观看看| 欧美性猛交╳xxx乱大交人| h日本视频在线播放| 国产人妻一区二区三区在| 美女大奶头视频| 亚洲人成网站高清观看| 欧美性感艳星| 看十八女毛片水多多多| 欧美成人一区二区免费高清观看| 国语自产精品视频在线第100页| 69av精品久久久久久| 国产亚洲精品av在线| 国产一区二区激情短视频| 精品久久久久久久久久久久久| 午夜福利欧美成人| 啦啦啦啦在线视频资源| 日本与韩国留学比较| 成年免费大片在线观看| 最好的美女福利视频网| 亚洲一区高清亚洲精品| 国产 一区精品| 男人狂女人下面高潮的视频| www日本黄色视频网| 欧美另类亚洲清纯唯美| 在线观看一区二区三区| 亚洲不卡免费看| 他把我摸到了高潮在线观看| 国产又黄又爽又无遮挡在线| 精品乱码久久久久久99久播| 亚洲av成人精品一区久久| 国产欧美日韩精品亚洲av| 日日摸夜夜添夜夜添小说| 久久久久久久午夜电影| 欧美高清成人免费视频www| 色综合站精品国产| 中国美白少妇内射xxxbb| 午夜亚洲福利在线播放| 欧美不卡视频在线免费观看| 欧美成人一区二区免费高清观看| av在线蜜桃| 女的被弄到高潮叫床怎么办 | 赤兔流量卡办理| 午夜福利在线观看吧| 久久久午夜欧美精品| 尤物成人国产欧美一区二区三区| 国产亚洲91精品色在线| 在线国产一区二区在线| 男女之事视频高清在线观看| 国产成人一区二区在线| 国产精品自产拍在线观看55亚洲| 中文字幕av在线有码专区| 亚洲性夜色夜夜综合| 亚洲欧美日韩东京热| 亚洲黑人精品在线| 看十八女毛片水多多多| 成人无遮挡网站| 99视频精品全部免费 在线| 国产亚洲精品久久久com| 两个人的视频大全免费| 在线免费观看不下载黄p国产 | 久久99热6这里只有精品| 亚洲精品日韩av片在线观看| 久久精品国产亚洲av天美| 国产成年人精品一区二区| 国产av麻豆久久久久久久| 亚洲狠狠婷婷综合久久图片| 日韩国内少妇激情av| 日本 欧美在线| 国产一级毛片七仙女欲春2| 久久精品影院6| 99久久精品一区二区三区| 一个人免费在线观看电影| 亚洲经典国产精华液单| 给我免费播放毛片高清在线观看| 亚洲精品成人久久久久久| 天堂av国产一区二区熟女人妻| 国模一区二区三区四区视频| 亚洲成人精品中文字幕电影| av黄色大香蕉| 欧美一区二区国产精品久久精品| 国产免费男女视频| 国产一区二区三区在线臀色熟女| 久久午夜福利片| 国产午夜福利久久久久久| 国产麻豆成人av免费视频| 国产真实伦视频高清在线观看 | 99视频精品全部免费 在线| 国产精品嫩草影院av在线观看 | 天堂√8在线中文| 91狼人影院| 久久久成人免费电影| 最近最新免费中文字幕在线| 在线天堂最新版资源| 简卡轻食公司| 日本免费一区二区三区高清不卡| 日本黄色片子视频| 国产蜜桃级精品一区二区三区| 天堂网av新在线| 久久久久久国产a免费观看| 尾随美女入室| 亚洲黑人精品在线| 欧美三级亚洲精品| 国产中年淑女户外野战色| 五月伊人婷婷丁香| 男女那种视频在线观看| 久久久久久大精品|