• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    2024-02-19 12:03:16JinqiuHouChanggenPengWeijieTanandHongfaDing

    Jinqiu Hou,Changgen Peng,★,Weijie Tan,2 and Hongfa Ding

    1State Key Laboratory of Public Big Data,College of Computer Science and Technology,Guizhou University,Guiyang,550025,China

    2Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,Guizhou University,Guiyang,550025,China

    3College of Information,Guizhou University of Finance and Economics,Guiyang,550025,China

    ABSTRACT

    Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.

    KEYWORDS

    Lattice;learning with errors;attribute-based proxy re-encryption;linear secret sharing schemes

    1 Introduction

    It is worth noting that sensitive data is being shared and held increasingly in the third party,such as AWS,AliCloud,iCloud,etc.In the current era of cloud computing and data protection,finegrained access management of encrypted data is a crucial requirement.While sharing data in an open,complicated network environment,there is a chance that personal information will be compromised.For example,in telemedicine system,patients have to store the medical data to the cloud server of the hospital,so that medical service personnel can better analyze the health status of patients after downloading from the cloud.While sharing medical data brings about much convenience to patients and medical service personnel in the system,it also causes new privacy and security issues.Medical data usually contains patients’sensitive information,thus,it is extremely important for patients.In addition,patients would only like the medical data to be obtained by authorized medical service personnel.In an ideal situation,people hope to encrypt data to a semi-trusted cloud service provider for privacy protection purposes.At the same time,the encrypted data can realize data access control and ciphertext selection calculation as well.In other words,a cryptographic mechanism is needed to make sure “who” can access the encrypted data,and that they can get “what” from the encrypted data.

    Proxy re-encryption (PRE) [1] is regarded as a particular primitive in public key cryptography that can give flexible data access authorization for encrypted data in accordance with user needs.Additionally,due to the capability of PRE to securely convert ciphertext,this technology has undergone extensive research and has proven to be quite useful in the cloud context.Currently,PRE is widely employed in many areas of the cloud computing environment,including access control,distributed file systems,encrypted mail forwarding systems,spam filtering systems,etc.ABPRE provides a good solution for the above scenarios.A semi-trusted proxy in an ABPRE system having access to a re-encryption key (created by a delegator) can convert ciphertext that satisfies an access policy into another ciphertext for a delegatee that complies with a new access policy.This greatly reduces the overhead of the data encryption process,enhances non-interactive fine-grained access control,and significantly improves efficiency.Users can share or access data securely,and reliably through a semi-trusted cloud computing service provider.It should be noted that in this process,the proxy is unable to obtain anything about the plaintext.Users achieve the goal of sharing data file safely and efficiently in this way.Due to its characteristics,ABPRE is very suitable for cloud storage environment.

    1.1 Related Works

    In 2011,Boneh et al.[2]put forth the idea of functional encryption(FE),which broke the deadlock of the original “all or nothing” access mode.FE can not only accomplish the objective of fine-grained access control (only users who meet certain policies can decrypt),but also can select ciphertext.Compared with traditional public-key cryptography(PKC),FE has stronger expression ability.Later,the fuzzy identity-based encryption was constructed by Sahai et al.[3],which was also regarded as the original form of attribute-based encryption (ABE).Especially,ABE is a special FE.In an ABE system,the ciphertext and the secrect key correspond to the attribute set and access policy respectively.The user can decode and access the ciphertext via the secret key after the attribute set of the ciphertext fulfills the access policy.

    Lattice cryptography is a kind of PKC,which is widely considered to not be threatened by quantum computing.What’s more,the security of lattice cryptography is based on the difficulty of solving lattice problems in the average case.Based on this superior feature,scholars began to focus on the design of the FE schemes on lattice.Boyen [4] realized FE for access structures based on the LWE hardness assumptions in 2013.More specifically,the key-policy attribute-based encryption(KP-ABE)scheme with monotonic access structure was the first ABE scheme on lattice that supported general Boolean expressions.In 2018,Dai et al.[5] first reported their implementation of a lattice-based KP-ABE scheme,which used short secret keys.What’s more,the homomorphism of the public key and the ciphertext was considered in their proposed scheme as well.In 2019,Tsabary [6] constructed a fully secure ciphertext-policy attribute-based encryption (CP-ABE) for t-CNF from LWE.Varri et al.[7]presented a CP-ABE scheme from the lattice.It is noteworthy that their scheme only allowed valid users of the access policy to conduct keyword searches on the encrypted index,but users who were not in the access policy could not obtain documents in the ciphertext.Recently,to realize attribute revocation,Zhao et al.[8] presented a revocable ABE scheme,which can expediently renew users’attributes to revoke or grant their access rights.Besides,Fu et al.[9] put forward an offline/online CP-ABE,which had better computational performance for mobile device scenario.In the same year,Fu et al.[10]comprehensively summarized various kinds of ABE schemes from the lattice in terms of complexity assumptions,expressiveness,security,efficiency.In addition,they discussed ABE schemes on lattices which were deserving further research.

    With the rapid development of cloud storage technology,the problems of data security and sharing have received extensive attention from industry and academia.PRE is an encryption method that can safely convert ciphertext.It allows that a non-completely trusted third party can directly convert the user Alice’s ciphertext into other users’ciphertext without decryption,which guarantees the privacy and security of the data left with the third party.

    The following desired characteristics should be met by a pretty PRE scheme:

    · Proxy transparency: In the transparent PRE scheme,neither the delegator nor the delegatee knows the existence of the proxy,meanings that the ciphertext sent to the delegatee after reencryption is indistinguishable from the ciphertext originally sent to the delegatee;

    · Non-interactivity:The delegator does not require the assistance of the delegatee or any other third party for the generation of the proxy re-encryption key;

    · Unidirectionality:The non-reliable proxy can only change the ciphertext of the delegator into the ciphertext of the delegatee;Conversely,it cannot change the delegatee’s ciphertext;

    · Multi-use:The non-reliable proxy can also repeatedly re-encrypt the ciphertext that has already been re-encrypted in the unidirectional PRE,as shown in Fig.1.

    Figure 1 :Schematic of multi-use PRE

    The initial proposal for a lattice-based multi-bit encryption,unidirectional,and multi-use PRE scheme was made by Jiang et al.[11].They improved the encryption efficiency.Besides,they proved that in the standard model under LWE,the scheme achieved CPA security.In 2016,PRE with multiple properties was put forward by Kim et al.[12].What’s more,the scheme was key optimality,noninteractivity,unidirectional,invisibility,collusion-resistant and non-transferability.But unfortunately,only in the random oracle model was it demonstrated to be secure.In 2021,Dutta et al.[13]presented the concrete constructions identity-based PRE,which proved both selective and adaptive security.Furthermore,the scheme they came up with satisfied the nature of unidirectionality and anti-collusion.However,fine-grained access control was not supported by the proposed scheme.Therefore,the subsequent research work was aimed at designing a new cryptographic primitive combining ABE and PRE[14,15]in order to meet the requirements.

    The ABPRE scheme combines ABE with PRE.This not only ensures that the new encryption scheme has the special conversion property of PRE,but also enables accessing the encrypted data of users who satisfy the access structure.This is achieved by setting up a corresponding access structure.The owner of the data has total authority over the data,while ensuring data confidentiality.Nowadays,ABPRE is widely used in distributed file systems,electronic medical systems,cloud storage services and other scenarios.Li et al.[16]constructed a key-policy attribute-based proxy re-encryption(KPABPRE)scheme based on the matrix access structure,but it was difficult to resist quantum attacks.Although lattice-based ABE and PRE schemes have been realized with the continuous development of lattice theory,the ABPRE schemes against quantum attacks have been realized only in the last few years.Therefore,there is less relevant literature about lattice-based ABPRE.Li et al.[17] designed the first ciphertext-policy ABPRE under the LWE assumption.Their scheme only supported the access structure of the AND gate,and the access policy’s expressiveness was relatively weak.To be able to control the proxy’s ability to re-encrypt the original ciphertext,Liang et al.[18] constructed the conditional ABPRE from lattice firstly,which met the requirements of more fine-grained data sharing.However,the schemes of[17]and[18]only satisfied the nature of single-use.This limited the practicality of the scheme.In addition,Susilo et al.[19] constructed an ABPRE that is honest and secure against re-encryption attacks,improving the security of ABPRE.To illustrate the potential of our research,we compare the existing(attribute-based)PRE schemes with our put forward scheme in Table 1.

    Table 1 : Qualitative comparison of(attribute-based)PRE schemes

    From the Table 1,we can see that the existing PRE schemes generally have the following obvious problems:

    · The majority of the assumptions underlying current ABPRE scheme research come from traditional number theory.However,these traditional encryption schemes can not resist quantum attacks;

    · The feasibility of the existing PRE schemes is somewhat hampered by the fact that they only meet two or three characteristics.Besides,the proxy is regarded as a semi-trusted party,but there are few restrictive measures to check the legitimacy on the malicious proxy’s activities;

    · At present,most ABPRE schemes expression strategies are limited,which seriously hinders the feasibility of the ABPRE schemes in practical applications.

    In summary,it is crucial to create a powerful ABPRE scheme to withstand quantum attacks in cryptography.Fortunately,the lattice-based cryptosystems can effectively resist quantum attacks.Consequently,constructing lattice-based ABPRE schemes with multiple properties has important theoretical significance and broad application prospects.

    1.2 Our Contributions

    Designing a post-quantum secure ABPRE scheme with a variety of properties under the standard model is a very meaningful research project.Therefore,we constructed an ABPRE scheme based on key-policy with re-encryption verifiability in the research(named KPAB-VPRE):

    · LSSS matrix is adopted to obtain a KP-ABPRE scheme that supports any monotonic policies.The delegator can formulate the corresponding attribute sets and encrypt the message on these attribute sets.Only when the attribute sets on the ciphertext meet the delegatee’s access policy can the ciphertext be decrypted.Our KP-ABPRE scheme uses the access structure constructed by the attribute sets to control the delegatee that can realize the flexible PRE.The delegatee can be one person,one organization or multiple organizations;

    · Taking the activities of corrupt proxy into consideration,the scheme is combined with homomorphic signature technology to realize the verifiability of re-encryption.In other words,during the re-encryption process,our KP-ABPRE with re-encryption verifiability (KPAB-VPRE)scheme can be verified whether the proxy performed an honest re-encryption operation.This property greatly enhances the security of the PRE;

    · In general,few ABPRE schemes can satisfy three or more properties.While,we design a multifeature KPAB-VPRE scheme with proxy transparency,non-interactivity,unidirectionality multi-use and anti-quantum attack,which can greatly enhance the practicability of the program.What’s more,under the standard model,our KPAB-VPRE scheme is proven to be selectively IND-CPA secure.

    1.3 Organization

    In order to better obtain an understanding of this article,we introduce the relevant notations in the next Section 2,and briefly discuss some basic knowledge that we use.The definition and security model of the KPAB-VPRE scheme are described in the part of Section 3.Then,we construct a KPABVPRE scheme with various properties based on LWE.Besides,the security and properties of KPABVPRE are analyzed in Section 4.Furthermore,we also assess the effectiveness of the KPAB-VPRE in comparison to relevant literature in Subsection 4.5.Finally,Section 5 presents the conclusions.

    2 Preliminaries

    2.1 Notations

    In this paper,we apply some initial symbols,as shown in the Table 2.Z and R represent the sets of integers and real numbers,respectively.For a matrix A ∈Rn×m,we adopt ATto mark the transposed matrix.What’s more,we shorten algorithm names.For example,ReEncrypt is recorded as re-encryption algorithm.

    Table 2 : Symbol description

    2.2 Preliminaries

    We give the following useful definitions and lemmas according to literature[4,24–27],consisting of lattice,some algorithms,decision LWE,LSSS and HS.

    2.2.1Lattice

    Definition 2.1.Given an×mmatrix A=[a1,a2,...,am]∈Rn×mwith linearly independent columns a1,a2,...,am∈Rn.The A forms a latticeΛ.Besides,Λ*is called dual lattice.

    Lemma 2.1.Set the following parameters,q≥3,m=.Then,there exists a probability polynomial time(PPT)algorithmTrapGen(n,m,q,σ),which generates a random matrix A ∈Znq×mand a basis TA∈Zm×mqforΛ⊥q(A)meeting the following equation:

    Lemma 2.2.We assume that given a prime numberq>2,a matrixwhere TAis the basis ofΛ⊥q(A).Next,we choose two vectors u ∈Znqand c ∈Zm.Then,

    · There exists a PPT algorithmSamplePre(A,TA,σ,u),which makes it output a vector x ∈Λuq(A)with statistical properties similar to the discrete Gaussian distributionDΛuq(A),σ,c;

    · There is a PPT algorithmSampleBasisLeft(A,B,TA,σ),which makes it output a set of basis T(A|B)on the latticeΛ⊥q(A|B)that is statistically close to the distribution

    · Given three matrices A,G ∈Zn×mand S ∈Zm×m,TGis a short basis for the latticeΛ⊥q(G).Then,there is a PPT algorithmSampleBasisRight(A,G,S,TG,σ),which makes it output a basis T(A|AS+G)for the latticeΛ⊥q(A|AS + G) distributed statistically close to the distribution

    Lemma 2.3.Given a posi tive integern,a prime numberq,a matrix A ∈Znq×m,and a vector e ∈DZm,σ.We setm≥2nlog2q,σ≥If so,the distribution of the vector u=Ae modqis statistically close to the uniform distribution on Znq.

    The above lemmas are used in the security proof of our scheme to show that the simulated system is indistinguishable from the real system.

    2.2.2DecisionLWEq,Ψ

    Definition 2.2.We assume that the positive integersn,m,q∈Z,and setΨαmbe an error distribution on Zmq.Let A and e be uniformly chosen at random from Zn×mqandΨmα,respectively.Then,select secretly a vector s ∈Znqwith uniform distribution.There is a LWE oracle with two algorithms:

    ·Os:Outputs the samples(A,b) ∈Znq×m×Zmqaccording to LWE distribution,where b=ATs+e(modq);

    ·O$:Outputs the samples(A,b)from the uniformly random distribution Znq×m×Zmq.

    The attackerAcould find a solution to the decision LWEq,Ψproblem,if and only if its advantagesAdv(A)=|Pr[AOs=1]-Pr[AO$=1]|>negl(n).

    2.2.3LSSS

    Definition 2.3.If the following requirements are met by a secret sharing systemΠover a group of participantsP,we call it LSSS over ZP:

    · Each participant’s shares compose a vector over ZP;

    · The share generating matrix M forΠis a matrix oflrows andθcolumns.Additionally,the functionρis defined by the participant labeling rowiasρ(i) for all thei-th row of M(i=1,2,...,l).Besides,the column vector v=(s,r2,...,rn) is predetermined,wheres∈ZPis a secret that is about to be shared,r2,...,rn∈ZPare selected at random.Moreover,M ·v is the vector oflshares ofsin the light ofΠ.Furthermore,the participantρ(i) owns the shareλi=(M·v)i.

    In addition,a LSSS has linear reconstruction’s characteristics.

    2.2.4HomomorphicSignature-HS

    Lemma 2.4.The HS scheme typically makes up the following four algorithms:

    ·HS.KeyGen(λ,d,n):The algorithm returns a pair of keys(hssk,hsvk)by inputting the security parameterλ,the depthdof a circuit,and the message lengthn.

    ·HS.Sign(hssk,m):The algorithm entershsskand a messagem,produces the original signatureσ.

    ·HS.SignEval(δ,(mi,σi)):The algorithm inputs an evaluation circuitδ: {0,1}N→{0,1}Nwith maximum depthd,and the pair(mi,σi),outputs an evaluation signatureσm′.

    ·HS.Verify(hsvk,δ,m′,σm′): The algorithm inputshsvk,δ,an evaluation massagem′,and an evaluation signatureσm′.If verification is successful,returns result 1,otherwise returns 0.

    Correctness:The HS scheme is correct if the following equation holds for anyλ,d,n,δ,m∈{0,1}n,

    HS.KeyGen(λ,d,n)→(hssk,hsvk),HS.Sign(hssk,mi)→σi,m′=δ(mi):

    3 Defnition and the Security Model of KPAB-VPRE

    3.1 System Model

    Fig.2 is an illustration of KPAB-VPRE.And in this encryption system,if user 1 and user 2 want to share encrypted data files,they need to execute the following series of algorithms(Setup,KeyGen,Encrypt,ReKeyGen,ReEncrypt,ReEncVer,Decrypt).Especially,an additional verification algorithmReEncVer,executed by the verification server,is used to determine whether the ciphertext is an honest transformation.First,User 2 sends a sharing request to User 1,and uploads the access policy to the key generation center.Next,the key generation center issues public and private keys to User 1 and User 2,respectively.After receiving the request,user 1 encrypts the data to be shared with its own private key and calculates the re-encryption key.Then sends the original ciphertext and re-encrypted key to the proxy.The proxy re-encrypts the ciphertext with the re-encryption key and sends the re-encryption ciphertext to the verification server.The verification server sends the re-encrypted ciphertext to User 2 after judgment.Finally,User 2 decrypts the shared data of User 1 by its private key.

    Figure 2 :The system model of our proposed KPAB-VPRE

    Definition 3.1.The following seven algorithms make up a KPAB-VPRE scheme:

    ·Setup(1λ,U): Inputs a security parameter 1λand an attribute domainU,then the algorithm returns the public parametersppand the master keymsk.

    ·KeyGen(pp,msk,P):Inputs the parametersppgenerated bySetupand an access policyPon an attribute domainUto return the secret keysk.

    ·Encrypt(pp,m,Att):Enterspp,messagemand an attribute setAtton the attribute domainUto return the original ciphertextC1.

    ·ReKeyGen(pp,sk1,Att′):Enterspp,sk1and a new attribute setAtt′to return the re-encryption keyrk1→2.

    ·ReEncrypt(pp,rk1→2,C1): Enterspp,rk1→2and the original ciphertextC1,ifAtt′|=P,outputs the re-encrypted ciphertextC2;otherwise,outputs the symbol ⊥.

    ·ReEncVer(pp,hsvk,C1,C2):Enterspp,hsvk,the ciphertextC1andC2,ifC2is correctly converted fromC1,outputs the result 1,which means the verification is passed;otherwise,outputs 0.

    ·Decrypt(pp,sk,C):Enterspp,skandCi(i=1,2),then returns the messagem.Note that

    (i) For the original ciphertextC1,enters the user 1’s secret keysk1.Finally,decryption successfully returnsm;otherwise,the error mark ⊥is output.

    (ii) For the converted ciphertextC2,inputs another user 2’s secret keysk2.After that,the decryption successfully outputs the underlying messagem;otherwise,the error mark ⊥is output.

    Correctness:For parametersλ,m,Att∈U,if the attribute sets satisfy the access policy,then a correct KPAB-VPRE scheme should meet the following Eqs.(5)–(7)requirements:

    3.2 Security Model

    In the part,we mainly describe the security model of KPAB-VPRE,which is based on the indistinguishability under chosen-plaintext attack in the selective security model (IND-sCPA).And we illustrate the model through the interactive games between the adversaryAand the challengerC.First,we input the security parameterλ,an attribute domainU={Att1,Att2,...,Attl},whereAtti={atti1,atti2,...,attit},(t≤l).Then,the game is comprised ofA’s operations and the following oracles(Osk,Ork,Orv),which could be called more than once in any order.Besides,the following is the interaction process between them:

    ·Target.The adversaryAinitially chooses a set of target attributesAtt*to challenge.

    ·Instance.The adversaryAreceives the system settings as a consequence of the challengerC’s execution of theSetupalgorithm.

    ·Phase 1.The adversaryAis allowed to perform the following inquiries multiple times:

    (i) Secret Key QueryOsk:The attackerAsends the access policyPto a challengerCfor secret key queriesOsk.However,the target attributeAtt*onPcannot be queried.Finally,the challengerCcalls the secret key generation algorithmKeyGen(pp,msk,P)to return the generated users’secret keysktoA.

    (ii) Re-Encryption Key QueryOrk:The adversaryAinitiatesOrkto the challengerC.When the challengerCreceives the query,first runs the private key generation algorithmKeyGen(pp,msk,P) to generatesk,and next carries out theReKeyGen(pp,sk,Att′)algorithm to sendsrk1→2toA.

    (iii) Re-Encryption Verification QueryOrv: After receiving the converted ciphertextC2,Cneeds to access the oracleOrvand implement an algorithmReEncVer(pp,hsvk,C1,C2)to check whether theC2is legal.

    ·Challenge.First,Achooses two plaintext messagesm0andm1of equal length.Next,sends them toC.AfterCobtains two messages,a valueb∈{0,1}is randomly selected.Besides,Cenforces the algorithmEncrypt(pp,m,Att),and finally exports the resulting ciphertext toA.

    ·Phase 2:Aproceeds withPhase 1queries during this process.

    ·Guess.Agives out his guessb′∈{0,1}toC.What’s more,whenb′=b,means thatAwins the interactive game.In addition,theA’s advantage to victory is

    For any PPTA,ifA’s advantage(1λ,U) against the KPAB-VPRE scheme is negligible,then the KPAB-VPRE scheme is IND-sCPA secure.

    4 Scheme of our KPAB-VPRE

    4.1 Construction

    ·Setup(λ,n,q,m,U): This algorithm takes security parametersλ,positive integern>Ω(λ),prime numberq>2,lattice dimensionm>5nlogqand an attribute domainU={Att1,Att2,...,Attl},whereAtti={att1,att2,...,attt},(t≤l)as input.Then,

    (i) For each attributeatti∈U,performs the algorithmTrapGen(n,m,q,σ)to produce two matrices,one is the uniform and random matrix Aatti∈Zn×mq,i∈[l].The other is a small norm matrix TAatti∈Zmq×m,which is a trapdoor basis forΛ⊥q(Aatti),where‖‖≤

    (ii) Chooses a uniform random variables∈Zq;

    (iii) Finally,returns the public parameterspp={Aatti,s}atti∈Uand the master keymsk=TAatti.

    ·KeyGen(pp,msk,P):pp,mskand the access policyPare inputs into this algorithm.Next,the algorithm extracts the private key as follows:

    (i) Converts the user’s access policyPinto a shared access policy(M,ρ)by the linear secret sharing theory.Here,M is an×nshare-generating matrix.Additionally,ρ(i):[n]→Uis a function which maps thei-th row of the matrix M to the attribute domainU;

    (ii) Lets H=MG,G ∈Zn×mis the gadget matrix.Generates an extended trapdoor T(Aatti|H)∈by running theSampleBasisLeft(Aatti,H,TAatti,σ)algorithm,and then sets F1=(Aatti|H)∈Zn×2mq;

    (iii) Finally,outputssk=T(Aatti|H)=TF1.

    ·Encrypt(pp,m,Atti):As input,the algorithm acceptspp,m∈{0,1}and an attribute setAtti={atti1,atti2,...,attit},(t≤l),then does:

    (i) Chooses uniformly at random a matrix S ∈{±1}m×m,a vectoru∈Znqand two noises e1∈Ψ2mα,e2∈Ψα;

    (ii) Sets

    (iii) Computes

    (iv) Outputs the ciphertextC1=(c1,0,c1,1).

    ·ReKeyGen(pp,sk,Attj): This algorithm enterspp,skand a new attribute setAttj={attj1,attj2,...,attjt},(t≤l)to return the re-encryption keyrk1→2in the following way:

    (i) For each attributeattj∈U,chooses a uniformly random matrix Aattj∈Zn×mq,j∈[l].Then sets

    (ii) Creates a low-norm matrix R1→2∈Z2m×2mqwith theSamplePre(F1,TF1,F2,σ),with the goal of ensuring that

    Therefore,we setrk1→2=R1→2as re-encryption key.

    (iii) Runs the algorithmHS.KeyGen(λ,d,n)to generate a key pair(hssk,hsvk),and parses each row of R1→2to zx∈Z2mq,(1 ≤x≤2m),using the algorithmHS.Sign(hssk,zx)to each zxto get the signσx,(1 ≤x≤2m),wherehsvkis used to verify the signature;

    (iv) Finally,deliversrk1→2and the associated signatureσxover a secure channel to the proxy server.

    ·ReEncrypt(pp,rk1→2,C1): This algorithm accepts as inputspp,rk1→2andC1.The proxy then produces the re-encrypted ciphertext in the manner described below:

    (i) Finds the vector g=(g1,g2,...,gn),?i∈[n]:(gi=0)∨(i∈[Atti])so that

    (ii) Sets two vectors

    (iii) Computes a signatureσ1→2←HS.SignEval(δC1,σx)homomorphically where the evaluation circuitδC1(rk1→2)is defined by the original ciphertext as follows:

    (iv) Finally,outputs the re-encryption ciphertextC2=(c2,0,c2,1)and the signatureσ1→2.

    ·ReEncVer(pp,hsvk,C1,C2):pp,hsvk,C1withσ*→2(ifC1is generated by encrypting a plaintextm,σ*→2is empty)and the transformed ciphertextC2withσ1→2are all inputted into this algorithm.Then,executes the algorithmHS.Verify(hsvk,δC1,C2,σ1→2).If it outputs 1,it means that the reencryption ciphertext is legal,otherwise,outputs 0 indicates that the re-encryption ciphertext is illegal.

    ·Decrypt(sk,C):The user inputs the secret keyskand a ciphertextC.If the attribute sets satisfy the access policy,then follow the steps below to decrypt.

    (i) Construct two new vectors

    where v2,v3,...,vm,v′2,v′3,...,v′k∈Zqare chosen at random,and computes the matrix multiplication Mi·v,·v′,denotes the result by

    where{Mi}i∈[n]is the i-th row of M ∈Znq×mandis the j-th row of M′∈Znq×m;

    (iii) Given a Gaussian parameter σ,and then runs theSamplePrealgorithm to sample a vector kt∈Z2mq,t ∈{1,2}such that F1·k1=μ1mod q,F2·k2=μ2mod q;

    (iv) Calculates

    (v) Outputs the result:

    4.2 Correctness and Parameter

    4.2.1 Proof of Correctness

    (i) The accuracy of unconverted ciphertext decoding.When t=1,if Atti(M,ρ),the original ciphertext C1is decrypted as follows:

    (ii) Decryption correctness of converted ciphertext.When t=2,for the re-encryption ciphertext C2,if Attj(M,ρ),we need to compute

    (iii) Correctness of re-encryption ciphertext verification.The effectiveness of the re-encryption ciphertext verification depends on the output of the verification algorithmHS.Verify.Besides,in theReEncrypt(pp,rk1→2,C1),the the evaluation circuit is defined byδC1(rk1→2)=cj,0with the original ciphertext ci,0andrk1→2.From the correctness definition of HS,it can be seen that if the signatureσ1→2is the result of an honest calculation by the proxy,then the algorithmHS.Verify(hsvk,δC1,C2,σ1→2)will be accepted with overwhelming probability.In summary,the validity of the converted ciphertext has been verified.

    Remark 4.1.If the parameter setting is reasonable and the noise item in Eqs.(23)and(24)is small enough,the plaintext message can be recovered correctly after decryption.

    4.2.2ParameterSettings

    (i) According to the assumption of the LWE problem,for the Gaussian noise distribution ei←Ψαmand the normalized varianceα≥the length of the vector satisfiesin Regev’s proof[26];

    (ii) According to the algorithmTrapGen(n,m,q,σ),for the safety parametern=Ω(λ),we require that the prime modulusq>2,the Gaussian parameterσ≥m·ω(logn)and the dimension of the lattice basem≥5nlogq.If the constraints of each parameter can be satisfied,the length of the lattice base generated by the trapdoor generation algorithm is at mostm·

    (iii) According to the algorithmSamplePre(F1,TF1,F2,σ),we set the discrete Gaussian distribution parameterσ≥the parameterq≥2 andm≥2nlogq.If the above constraints are met,rk1→2=R1→2is created with overwhelming probability advantage.Besides,the length of therk1→2satisfies‖R1→2‖≤2σm;

    (iv) In order to make the error term|noise|<5/q,αmust satisfy the conditions

    Sinceqα≥qmust meet

    Thus,we decided on the following scheme parameters:

    wherelis the count of attributes on the access policy.If the parameters are set reasonably,it can be correctly recovered after the above decryption.

    4.3 Security Analysis

    Theorem 4.1.Assume thatσ,m,n,αandqare the same as in the previous sentence.In the standard model,our KP-ABPRE scheme is IND-sCPA secure under the assumption that the decision LWEq,Ψproblem is difficult.

    Proof.We utilize the assumption that there is a PPT adversaryAwith a non-negligible advantage to attack our system under the selective security model via “game-hopping” in order to demonstrate the theorem.The basic idea is to construct three games.The first game is an actual IND-sCPA attack,however the last game is impossible for the attacker to win;Then,based on some difficult assumptions on lattice,it is proved that the first game and the last game are equivalent.We have to demonstrate that these three games are indistinguishable from each other for PPT adversaryAin the following ways.

    Game sequence:

    · Game0:CandAare playing a typical IND-sCPA game.Besides,Cfaithfully responds to differentskandrk1→2queries in accordance with the real scheme’s algorithms.

    · Game1:This game changes the generation of Aattiandsk.

    (i)TrapGen(n,m,q,σ)algorithm produces a matrix AattiinGame0,but inGame1,Aattidoes not contain trapdoor,the matrix Aatti∈Zn×mqis a uniformly distributed matrix randomly selected by the challengerC;

    (ii) The challengerCsets H=AattiS+G,and then runs theSampleBasisRight(Aatti,G,S,TG,σ)algorithm to get the private keysk=T(Aatti|H)=TF1;

    (iii) Finally,the attackerAreceives theskback from the challengerC.And the settings of other parameters are the same asGame0.

    · Game2:The production of the challenge ciphertextC*distinguishes this game fromGame1.InGame1,theEncrypt(pp,m,Atti) algorithm createsC*.However,inGame2,theC*is a uniformly random and independent matrix from×Zq.The rest of the settings are the same asGame1.In this case,the advantage of the attackerAis zero.

    IfGame1is indistinguishable fromGame0,andGame2is indistinguishable fromGame1,our KPAB-VPRE scheme is IND-sCPA secure in the standard model.

    Game transfer:

    ·Game0toGame1: We now prove thatGame0andGame1are indistinguishable through the Lemma 4.1.

    · Lemma 4.1.Ifmn>(n+1)log2q+ω(lgn),thenGame1andGame0are indistinguishable,and the answer to the attackerA’s inquiries become indistinguishable from the true scheme.

    Proof.

    (i) The matrix Aatti∈Zn×mqinGame0is produced by theTrapGen(n,m,q,σ)algorithm.In addition,it is random.However,inGame1,the matrix Aattiis randomly selected from,so,for the attackerAin polynomial time,the public parameter Aattiis taken from uniformly distributed Znq×m;

    (ii) For the private key,skis generated by theSampleBasisLeftalgorithm inGame0,but inGame1,skis generated by theSampleBasisRightalgorithm.By definition ofSampleBasisRight,we have thatsk=T(Aatti|H)is distributed as required.Thus,the challengerC’s response to the secret key question is indistinguishable from that inGame1for theA.

    From the Lemma 4.1,we can see that theA’s advantage inGame1is equal to that inGame0.Therefore,Game0andGame1are indistinguishable.

    ·Game1toGame2:Assuming that in the selective security model,an attackerAcan discriminate betweenGame1andGame2with a non-negligible advantage by chosen plaintext attack,the challengerCwill construct an algorithmBto solve the decision LWE problem with a nonnegligible probability.In the LWE problem,the decision algorithm has access to a sampling oracleO,which can be either a really random samplerOsor a pseudo-random samplerO$with an embedded secret u ∈Znq.Following is the reduction’s progression:

    –Target.The challengerCreceives a statement from the adversaryAannouncing the target attribute setAtt*ito attack.

    –Instance.The challengerCdemandsl+1 LWE samples from the oracleO,which we denote as:

    –Setup.The challengerCprepares the public parameters as follows once it has obtained the target attribute setAtt*i:

    (i) The central authority selects the appropriate system parametersn,m,q,σ;

    (ii) If the attributeattiis in the target attribute set,then the challengerCconstructs a matrixand a vector[s,0,...,0]T=w0,where wi(i∈[l])comes from LWE sampling;

    (iii) The remaining parameters are the same asGame1settings.

    Remark 4.2.The above settings have the correct distribution.

    –Phase 1.The attackerAcan ask the following questions:

    Secret Key QueryOsk:

    (i) The attackerAsends the access policyPto a challengerCfor private key queries,However,the target attribute on(M,ρ)cannot be queried,that is,ρ(i) ∈/Att*i,whereρ(i)is the attribute on the access policy(M,ρ).Ifρ(i)∈Att*i,a random bit is output and terminated;

    (ii) According to the parameters inGame1,the challengerCgeneratesskas previously mentioned and gives it back to the attackerA.

    Re-Encryption Key QueryOrk:

    (i) The challengerCfirst generatesskas inOsk.Then,the challengerCreplies withrk1→2by running the algorithmReKeyGen(pp,sk,Attj);

    (ii)rk1→2is sent by the the challengerCto the attackerA.The attackerAcan query multiple times.

    Re-Encryption Verification QueryOrv:

    (i) AfterAgets the queriesOrkfrom one access policyPto another access policyP′,Acan also make some queriesOrvtoC.Next,Conly executes the algorithmReEncVerfaithfully;

    (ii) Finally,Csends the result toAaccording to the verification algorithm.

    Remark 4.3.Because of the unforgeability of HS,the algorithmReEncVercannot provide any additional capabilities forAin the selectively IND-CPA security game.That is to say,Acannot offer invalid ciphertext to pass the algorithmReEncVer.This is very critical.What’s more,we are aware that the security features of the underlying algorithmHS.Verifydetermine if the algorithmReEncVeris valid.Furthermore,Amust be able to counterfeit the signatureand pass the algorithmHS.Verifyin order to pass the game of re-encryption verification,as this is also a legal signature for HS.In other words,Ahas the same benefits as violating the unforgeability of HS when it comes to our KPABVPRE scheme’s re-encryption verifiability.

    –Challenge.In order to indicate that it is open to a challenge,Aselects two messages{m0,m1} ←Zmqof equal-length.A messagemφ(φ←{0,1}) is selected at random byCfor encryption.At last,Creplies withC*built as follows applying the LWE instance:

    (i) Constructing ciphertextC*=(c*0,1,c*1,1)based on LWE samplings.Let

    whereviis taken from the LWE instance;

    (ii) The challengerCrandomly selects a bitφ←{0,1},ifφ=0,C*=(c*1,0,c*1,1) that will be returned to the attacker as challenge ciphertext.Ifφ=1,C*as a challenge ciphertext will be randomly chosen from Z2qm×Zqand returned to the attackerA.

    Remark 4.4.The above challenge ciphertextC*=(c*1,0,c*1,1)has the correct distribution.A simple analysis reveals that:

    * IfO=Osin the instantiation process,it is a pseudo random sampling oracle embedded in the secret u ∈Znq.Well,

    Due to the setting of public parameters,the ciphertext obtained is

    where e1∈Ψ2mα.

    wheree2∈Ψα.

    The aboveC*=(c*1,0,c*1,1)obeys uniform random distribution in statistics;

    *C*=(c*1,0,c*1,1)is chosen at random in Z2qm×ZqifO=O$.

    –Phase 2.The simulatorBoperates in a similar manner toPhase 1,the attackerAis able to query secret keys multiple times,and the set of attributesthat have done so have not yet met the access structure(M,ρ).

    –Guess.After enough questioning,the attacker outputs his guess ofφasφ′.Ifφ′=φ,the challenger outputsO′=O$,otherwiseO′=Os.

    In the attackerA’s view,the challengerC’s behavior is close to that of a real,adaptive security experiment.In this game,the attackerAhas the advantage sinceε=|Pr[φ′=φ]-|.Therefore,the advantages of the LWE predictor are as follows:

    (i) In a pseudo-random sampler,an attackerAhas the advantageous valueε.In this case,O=O$,Pr[φ′=φ|O=O$]=+εand the challenger’s advantage is

    (ii) In a true random predictor,an attackerAhas an advantage of 0.In this case,O=Os,Pr[φ′=φ|O=Os]=+ε,the challenger’s advantage is

    Therefore,assuming that an attackerAguesses the correct probability isPr[φ′=φ] ≥+ε,a challengerChas the advantage

    to solve the decision LWEq,Ψproblem.

    As a result,Game2andGame1cannot be distinguished under the assumption of the decision LWEq,Ψproblem.

    In conclusion,the security of our designed KPAB-VPRE scheme is compactly reduced to the decision LWEq,Ψdifficulty assumption by the use of the three equivalent games mentioned above.Additionally,under the standard model,the KPAB-VPRE scheme is selectively IND-CPA secure.This completes the proof.

    4.4 Performance Analysis

    ·Non-interactivity.Our scheme is non-interactive,because the re-encryption keyrk1→2is generated by theSamplePre(F1,TF1,F2,σ) algorithm,which is created only depends on the private keysk1=TF1in the list of the delegator Alice’s attributes,and does not need the private key of the delegatee Bob’s access structure.Therefore,the scheme is non-interactive.

    ·Proxy transparency.Our scheme satisfies this property,because the size of the re-encrypted ciphertextC2∈Z2mq×Zqis the same as the size of the original ciphertextC1∈Z2mq×Zq.

    ·Unidirectionality.This property requires that the ciphertext direction can only be converted from Alice to Bob,not in reverse.This is true,because the proxy can get the re-encryption keyrk1→2←SamplePre(F1,TF1,F2,σ)from Alice to Bob.However,the re-encryption key generation method requires Alice’s private key.Thus,if the proxy wants to obtain the re-encryption keyrk2→1from Bob to Alice,without Bob’s private key,the proxy cannot convert Bob’s ciphertext into Alice’s ciphertext.

    ·Multi-use.We suppose thatC1=(c1,0,c1,1)is the ciphertext of the attribute list 1 for the attribute lists 1,2,...,k.The re-encryption process is carried out in the ranges of 1 tokand 2 tok-1.In order to create a low-norm matrix Ri→i+1∈Z2qm×2msuch that Fi·Ri→i+1=Fi+1andrki→i+1=Ri→i+1,we run the algorithmSamplePre(Fi,TFi,Fi+1,σ),i∈[1,k-1].The re-encryption procedures are shown in the Eq.(35).

    Setck,1=c1,1.Obviously,Ck=(ck,0,ck,1) in the Eq.(35) is the ciphertext of the attribute listk.Using reasonable parameter settings,the noise item is sufficiently small to be decrypted correctly.

    4.5 Comparison

    In this part,we compare our KPAB-VPRE with other relevant schemes[13,17,28–30]in terms of the size of the ciphertext,access policy,multi-use,security model,and re-encryption verifiability.And Table 3 displays the comparison’s findings.

    Table 3 : Comparison with previous related work

    As can be seen from Table 3,in the same type of schemes,the literature[13,28–30]did not support the expression of access policy,while the literature[17]only supports “AND” expression.While,our scheme adopts the LSSS matrix to express the access policy and supports the operations of “AND,OR,THRESHOLD”.What’s more,matrix operation is used to realize encryption and decryption algorithm,which has higher efficiency.In terms of the re-encryption verification,only Wu et al.[30]supported this property,but this scheme cannot support arbitrary access policies.Therefore,the proposed scheme realizes fine-grained access and sharing of encrypted data,as well as meets the multiuse and re-encryption verification,which makes the scheme more practical.Especially,our KPABVPRE achieves IND-sCPA security under the standard model.

    5 Conclusion

    We present a multi-functional LSSS matrix-based KPAB-VPRE scheme from lattice that is proven to be IND-sCPA secure under the standard model.The scheme based on the lattice is implemented by matrix operation,which can facilitate parallel algorithm design and has superior efficiency,as opposed to the classic ABPRE schemes based on bilinear mapping.This scheme is based on the construction of LWE difficult problems from lattice.From the complexity of lattice difficult problems in the worst case,we can see that under the appropriate parameter selection,there is no effective algorithm to solve these difficult problems in polynomial time,even if it is a quantum computer.Therefore,this scheme can resist quantum attacks.In addition,the data owner can encrypt messages on any attribute sets.The ciphertext cannot be actively decoded until the attribute put on it complies with the user’s access policy.Furthermore,the verification of re-encryption is realized by introducing homomorphic signature technology,thereby detecting the activities of corrupt proxies,which has higher security and enforceability in practical scenarios.However,in our KPAB-VPRE scheme,the size of the ciphertext is not fixed,and it grows linearly as the number of attributes increases.Therefore,the next study will focus on creating a multi-functional ABPRE system with fixed ciphertext length in the future.

    Acknowledgement: The authors are willing to express our appreciation to the reviewers for their constructive comments which significantly enhanced the presentation of the study.

    Funding Statement: The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400),the Science and Technology Program of Guizhou Province(No.[2020]5017),the Research Project of Guizhou University for Talent Introduction (No.[2020]61),the Cultivation Project of Guizhou University (No.[2019]56),the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01] and the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).

    Author Contributions: The authors confirm contribution to the paper as follows: study conception and design:Jinqiu Hou;data collection:Weijie Tan;analysis and interpretation of results:Changgen Peng.Hongfa Ding;draft manuscript preparation:Jinqiu Hou.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials: All data generated or analysed during this study are included in this published article.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    12—13女人毛片做爰片一| 精品久久久噜噜| 最新在线观看一区二区三区| 能在线免费观看的黄片| 一边摸一边抽搐一进一小说| 欧美性感艳星| 久久人人爽人人爽人人片va| 丰满的人妻完整版| 国产真实伦视频高清在线观看 | 国产成年人精品一区二区| 精品一区二区免费观看| 久久亚洲精品不卡| 亚洲自拍偷在线| 国产精品久久久久久亚洲av鲁大| 夜夜看夜夜爽夜夜摸| 亚洲av五月六月丁香网| 欧美+日韩+精品| netflix在线观看网站| 少妇的逼水好多| 欧美最黄视频在线播放免费| 真实男女啪啪啪动态图| 国产精品久久电影中文字幕| 欧美色视频一区免费| 一本久久中文字幕| 性插视频无遮挡在线免费观看| 女人十人毛片免费观看3o分钟| 国产精品女同一区二区软件 | 中文字幕人妻熟人妻熟丝袜美| 成年女人毛片免费观看观看9| x7x7x7水蜜桃| 三级毛片av免费| 能在线免费观看的黄片| 精品一区二区三区视频在线| 久久久久九九精品影院| 日韩欧美精品免费久久| 日韩av在线大香蕉| 一夜夜www| 深爱激情五月婷婷| 国产精品精品国产色婷婷| 有码 亚洲区| 日本精品一区二区三区蜜桃| 深夜精品福利| 免费电影在线观看免费观看| 一进一出好大好爽视频| 精品久久久久久久久av| 色噜噜av男人的天堂激情| 午夜福利在线在线| 91午夜精品亚洲一区二区三区 | 岛国在线免费视频观看| 夜夜爽天天搞| 男人的好看免费观看在线视频| 中文字幕精品亚洲无线码一区| 简卡轻食公司| 欧美成人a在线观看| 99久久无色码亚洲精品果冻| 深爱激情五月婷婷| 久久午夜福利片| 人妻少妇偷人精品九色| 一本一本综合久久| 男人的好看免费观看在线视频| 欧美zozozo另类| 岛国在线免费视频观看| 日韩av在线大香蕉| 超碰av人人做人人爽久久| 淫秽高清视频在线观看| 国产国拍精品亚洲av在线观看| АⅤ资源中文在线天堂| 久久精品综合一区二区三区| 国产亚洲91精品色在线| 欧美精品国产亚洲| 欧美一区二区国产精品久久精品| 国产精品三级大全| 久久久精品欧美日韩精品| 国产黄色小视频在线观看| 日本免费a在线| 欧美日韩乱码在线| 成人午夜高清在线视频| 久久久久久久精品吃奶| 国产高清有码在线观看视频| 狠狠狠狠99中文字幕| 亚洲七黄色美女视频| 亚洲综合色惰| www日本黄色视频网| 欧美最新免费一区二区三区| 日韩,欧美,国产一区二区三区 | 在线天堂最新版资源| 看十八女毛片水多多多| 麻豆成人av在线观看| 成年女人看的毛片在线观看| 国产午夜福利久久久久久| 一区二区三区高清视频在线| 在线观看av片永久免费下载| 男女啪啪激烈高潮av片| 男人舔奶头视频| 国产一区二区三区av在线 | 可以在线观看的亚洲视频| 麻豆精品久久久久久蜜桃| 男人狂女人下面高潮的视频| 精品久久久久久久久久久久久| 亚洲av成人精品一区久久| 久久久久久久久中文| 搞女人的毛片| 看十八女毛片水多多多| 精品一区二区三区人妻视频| 男女啪啪激烈高潮av片| 日韩欧美精品v在线| 精品国产三级普通话版| 国产精品人妻久久久影院| 国产精品一区二区三区四区久久| 91久久精品国产一区二区三区| 国内毛片毛片毛片毛片毛片| 狠狠狠狠99中文字幕| 国产成人影院久久av| 简卡轻食公司| 极品教师在线视频| 级片在线观看| 亚洲在线观看片| 亚洲成av人片在线播放无| 久久精品国产亚洲av涩爱 | 一个人观看的视频www高清免费观看| 久久久久九九精品影院| 99精品久久久久人妻精品| 久久久国产成人精品二区| 级片在线观看| 成人精品一区二区免费| 日韩国内少妇激情av| 亚洲中文字幕日韩| 国产精品综合久久久久久久免费| av在线观看视频网站免费| 最新中文字幕久久久久| 国产精品一区二区三区四区久久| 我要看日韩黄色一级片| 91久久精品国产一区二区成人| 国产精华一区二区三区| 熟女人妻精品中文字幕| 国产单亲对白刺激| 精品久久久久久久久久久久久| 可以在线观看毛片的网站| 伊人久久精品亚洲午夜| 我的老师免费观看完整版| 色在线成人网| 色在线成人网| АⅤ资源中文在线天堂| 搡老妇女老女人老熟妇| 99在线视频只有这里精品首页| 成人性生交大片免费视频hd| 欧美3d第一页| 久久久久久久亚洲中文字幕| 联通29元200g的流量卡| 国产在线男女| 黄色配什么色好看| 午夜福利在线观看免费完整高清在 | 亚洲va日本ⅴa欧美va伊人久久| 免费无遮挡裸体视频| 精品人妻偷拍中文字幕| 黄色女人牲交| 欧美黑人欧美精品刺激| 极品教师在线免费播放| 亚洲精品影视一区二区三区av| 精品无人区乱码1区二区| 日本一本二区三区精品| 亚洲,欧美,日韩| 夜夜看夜夜爽夜夜摸| 国产男靠女视频免费网站| 香蕉av资源在线| 国产av不卡久久| 偷拍熟女少妇极品色| 久久久久国内视频| 久久九九热精品免费| 麻豆精品久久久久久蜜桃| 国产精品永久免费网站| 日韩一区二区视频免费看| 白带黄色成豆腐渣| 国产视频一区二区在线看| 午夜免费成人在线视频| 丰满的人妻完整版| 欧美性猛交╳xxx乱大交人| 免费人成视频x8x8入口观看| 99精品久久久久人妻精品| 蜜桃亚洲精品一区二区三区| 啦啦啦韩国在线观看视频| 欧美绝顶高潮抽搐喷水| 免费观看在线日韩| 亚洲精品在线观看二区| 黄色女人牲交| videossex国产| 精品午夜福利视频在线观看一区| a级一级毛片免费在线观看| 欧美日韩综合久久久久久 | 999久久久精品免费观看国产| 国产真实伦视频高清在线观看 | 天堂影院成人在线观看| 亚洲无线观看免费| 精品一区二区三区视频在线观看免费| 美女大奶头视频| 天堂√8在线中文| 最近最新免费中文字幕在线| 日本撒尿小便嘘嘘汇集6| 久久精品国产99精品国产亚洲性色| 亚洲图色成人| 国产精品99久久久久久久久| 久久精品人妻少妇| 国产伦精品一区二区三区视频9| 国内毛片毛片毛片毛片毛片| 国产精品嫩草影院av在线观看 | 伦精品一区二区三区| 午夜福利高清视频| 国产伦精品一区二区三区视频9| 免费观看人在逋| 麻豆成人午夜福利视频| 麻豆av噜噜一区二区三区| 免费观看精品视频网站| 日韩精品中文字幕看吧| 97碰自拍视频| 国产高清视频在线观看网站| 毛片一级片免费看久久久久 | 日本在线视频免费播放| 搡老熟女国产l中国老女人| 久久香蕉精品热| 成人三级黄色视频| 国产国拍精品亚洲av在线观看| 亚洲五月天丁香| 日本黄色片子视频| 免费观看精品视频网站| 日本黄色视频三级网站网址| 国产主播在线观看一区二区| 国产精品女同一区二区软件 | 麻豆成人av在线观看| eeuss影院久久| 女生性感内裤真人,穿戴方法视频| 精品久久久久久久末码| 国产精品美女特级片免费视频播放器| 欧美高清性xxxxhd video| 搡老熟女国产l中国老女人| 久久香蕉精品热| 久久精品久久久久久噜噜老黄 | 淫秽高清视频在线观看| 午夜免费激情av| 久久精品国产亚洲av天美| 久久久久免费精品人妻一区二区| 999久久久精品免费观看国产| 草草在线视频免费看| 免费观看人在逋| 国产视频内射| 亚洲人成网站高清观看| 老熟妇乱子伦视频在线观看| 又粗又爽又猛毛片免费看| 美女高潮喷水抽搐中文字幕| 成年人黄色毛片网站| 又爽又黄a免费视频| 日韩中文字幕欧美一区二区| 国产高清激情床上av| 国产精品自产拍在线观看55亚洲| 日本欧美国产在线视频| 中文字幕人妻熟人妻熟丝袜美| 国产精品99久久久久久久久| 日本五十路高清| 99在线人妻在线中文字幕| 免费观看的影片在线观看| 高清在线国产一区| 国产精品乱码一区二三区的特点| 人人妻人人澡欧美一区二区| 国产av不卡久久| 日本 欧美在线| 国产亚洲欧美98| 啦啦啦韩国在线观看视频| 国内精品美女久久久久久| 免费电影在线观看免费观看| 欧美zozozo另类| 国产视频内射| av专区在线播放| 人妻夜夜爽99麻豆av| 欧美黑人欧美精品刺激| 亚洲精品久久国产高清桃花| 日韩欧美在线二视频| 欧美日本视频| 精品一区二区三区视频在线观看免费| 男女做爰动态图高潮gif福利片| 我要搜黄色片| 午夜精品久久久久久毛片777| 亚洲男人的天堂狠狠| 看免费成人av毛片| 2021天堂中文幕一二区在线观| 国产精品爽爽va在线观看网站| 精品人妻熟女av久视频| 国内精品久久久久精免费| 国产精品亚洲一级av第二区| 日韩欧美精品v在线| 我要看日韩黄色一级片| 日本一二三区视频观看| 别揉我奶头 嗯啊视频| 国内精品一区二区在线观看| 此物有八面人人有两片| 天堂√8在线中文| www.www免费av| 中文在线观看免费www的网站| 网址你懂的国产日韩在线| 男人舔女人下体高潮全视频| 极品教师在线免费播放| 国产精品美女特级片免费视频播放器| 国内精品久久久久精免费| 夜夜看夜夜爽夜夜摸| 国产又黄又爽又无遮挡在线| 亚洲最大成人av| 91麻豆精品激情在线观看国产| 人人妻,人人澡人人爽秒播| 男女那种视频在线观看| 九九热线精品视视频播放| 麻豆成人av在线观看| 熟妇人妻久久中文字幕3abv| 欧美精品啪啪一区二区三区| 日韩中字成人| 欧美成人a在线观看| 日韩欧美国产在线观看| 永久网站在线| 国产国拍精品亚洲av在线观看| 亚洲成人久久爱视频| 亚洲午夜理论影院| 国产乱人视频| 舔av片在线| 桃色一区二区三区在线观看| 亚洲va日本ⅴa欧美va伊人久久| 3wmmmm亚洲av在线观看| 一区二区三区四区激情视频 | 22中文网久久字幕| 琪琪午夜伦伦电影理论片6080| 亚洲欧美激情综合另类| 久久精品国产亚洲av涩爱 | 尤物成人国产欧美一区二区三区| 亚洲va日本ⅴa欧美va伊人久久| 搡女人真爽免费视频火全软件 | 精品一区二区免费观看| 日本一二三区视频观看| 午夜精品一区二区三区免费看| 身体一侧抽搐| 国产成人福利小说| 国产视频内射| 特级一级黄色大片| 久久久久久久久大av| 给我免费播放毛片高清在线观看| 天堂av国产一区二区熟女人妻| 亚洲欧美日韩无卡精品| 亚洲精华国产精华精| 国产大屁股一区二区在线视频| 亚洲成人久久性| 久久久精品欧美日韩精品| 校园春色视频在线观看| 成人特级黄色片久久久久久久| 亚洲av成人av| 很黄的视频免费| 伦理电影大哥的女人| 国产私拍福利视频在线观看| 国产淫片久久久久久久久| 国产精品野战在线观看| 美女免费视频网站| 日本一二三区视频观看| 赤兔流量卡办理| 亚洲成人精品中文字幕电影| 男女视频在线观看网站免费| 老师上课跳d突然被开到最大视频| 一区二区三区高清视频在线| 免费看美女性在线毛片视频| 别揉我奶头 嗯啊视频| 我的老师免费观看完整版| 国产精品爽爽va在线观看网站| 国产精品伦人一区二区| 波野结衣二区三区在线| 亚洲av成人av| aaaaa片日本免费| 女同久久另类99精品国产91| АⅤ资源中文在线天堂| 亚洲成a人片在线一区二区| 黄色一级大片看看| 国产精品国产三级国产av玫瑰| 国产精品一区www在线观看 | 国产av不卡久久| 精品无人区乱码1区二区| 国产白丝娇喘喷水9色精品| 亚洲国产欧洲综合997久久,| 精品无人区乱码1区二区| 国产伦一二天堂av在线观看| 亚洲自拍偷在线| 嫩草影院入口| 久久久久久久久中文| 国产伦精品一区二区三区视频9| 亚洲最大成人手机在线| 免费一级毛片在线播放高清视频| 亚洲自拍偷在线| 男人的好看免费观看在线视频| 赤兔流量卡办理| 99久久精品热视频| 可以在线观看的亚洲视频| 亚洲最大成人中文| 国产成年人精品一区二区| 又爽又黄无遮挡网站| 中文亚洲av片在线观看爽| 欧美日韩中文字幕国产精品一区二区三区| 婷婷丁香在线五月| 九九在线视频观看精品| 综合色av麻豆| 色尼玛亚洲综合影院| 男女啪啪激烈高潮av片| 一级毛片久久久久久久久女| 久久精品国产亚洲av天美| 国产一级毛片七仙女欲春2| 亚洲狠狠婷婷综合久久图片| 在线播放国产精品三级| 欧美+亚洲+日韩+国产| 日韩av在线大香蕉| 国内精品久久久久精免费| 亚洲乱码一区二区免费版| 日韩高清综合在线| 韩国av一区二区三区四区| 久久久久久伊人网av| x7x7x7水蜜桃| 亚洲经典国产精华液单| 十八禁网站免费在线| 女的被弄到高潮叫床怎么办 | 性插视频无遮挡在线免费观看| 日日夜夜操网爽| 最新中文字幕久久久久| 18禁黄网站禁片午夜丰满| av福利片在线观看| 中文字幕熟女人妻在线| 亚洲第一电影网av| 波多野结衣高清无吗| 18禁裸乳无遮挡免费网站照片| 中文字幕av在线有码专区| 国产免费av片在线观看野外av| 三级毛片av免费| 变态另类成人亚洲欧美熟女| 99九九线精品视频在线观看视频| 中文在线观看免费www的网站| 精品国内亚洲2022精品成人| 亚洲成人精品中文字幕电影| 日韩高清综合在线| 欧美激情国产日韩精品一区| 国产成年人精品一区二区| 欧美成人免费av一区二区三区| 成人毛片a级毛片在线播放| 少妇裸体淫交视频免费看高清| 九色国产91popny在线| 午夜影院日韩av| av中文乱码字幕在线| 午夜福利欧美成人| 可以在线观看的亚洲视频| 国产乱人伦免费视频| 舔av片在线| 久久久久久久亚洲中文字幕| 精品久久久久久,| 午夜爱爱视频在线播放| 波野结衣二区三区在线| 色综合站精品国产| 日本在线视频免费播放| 国产真实伦视频高清在线观看 | 国产精品亚洲一级av第二区| 免费观看人在逋| 亚洲欧美日韩高清在线视频| 深夜a级毛片| 99精品久久久久人妻精品| 婷婷亚洲欧美| 国产一区二区在线av高清观看| 久久久久久久久久久丰满 | 日韩强制内射视频| 成人美女网站在线观看视频| 男女做爰动态图高潮gif福利片| 国产麻豆成人av免费视频| 精品不卡国产一区二区三区| 黄色视频,在线免费观看| 日韩大尺度精品在线看网址| 五月伊人婷婷丁香| 少妇人妻精品综合一区二区 | 久久久成人免费电影| 亚洲人成伊人成综合网2020| 日本-黄色视频高清免费观看| 岛国在线免费视频观看| 波多野结衣巨乳人妻| 国产男人的电影天堂91| 九九爱精品视频在线观看| 一区二区三区高清视频在线| 欧美成人a在线观看| av在线亚洲专区| 国产私拍福利视频在线观看| 又爽又黄无遮挡网站| 日韩欧美 国产精品| 97热精品久久久久久| netflix在线观看网站| 色哟哟·www| 成人一区二区视频在线观看| 亚洲一级一片aⅴ在线观看| 色av中文字幕| 久久欧美精品欧美久久欧美| 午夜免费激情av| 成人国产综合亚洲| 91久久精品国产一区二区三区| 最近最新中文字幕大全电影3| 欧美又色又爽又黄视频| 日韩高清综合在线| 日韩,欧美,国产一区二区三区 | 亚洲最大成人av| 成人一区二区视频在线观看| 男女做爰动态图高潮gif福利片| 最新在线观看一区二区三区| 日韩欧美 国产精品| 一边摸一边抽搐一进一小说| 国产免费男女视频| 久久精品综合一区二区三区| 级片在线观看| 精品久久久久久久久亚洲 | 国产乱人视频| 亚洲va在线va天堂va国产| 欧美日韩瑟瑟在线播放| 深爱激情五月婷婷| 麻豆一二三区av精品| АⅤ资源中文在线天堂| 观看免费一级毛片| 最新中文字幕久久久久| 在线看三级毛片| 成人av一区二区三区在线看| 久久天躁狠狠躁夜夜2o2o| 亚洲国产日韩欧美精品在线观看| 天堂√8在线中文| 亚洲在线观看片| 精品乱码久久久久久99久播| 亚洲avbb在线观看| 亚洲精品日韩av片在线观看| 精品无人区乱码1区二区| 悠悠久久av| 97热精品久久久久久| 精品福利观看| 91在线精品国自产拍蜜月| 久久精品国产亚洲av涩爱 | 国内精品一区二区在线观看| 噜噜噜噜噜久久久久久91| 美女被艹到高潮喷水动态| 免费电影在线观看免费观看| 亚洲美女搞黄在线观看 | 国产真实伦视频高清在线观看 | 一区福利在线观看| 日韩欧美国产在线观看| 婷婷六月久久综合丁香| 女的被弄到高潮叫床怎么办 | 在线免费观看不下载黄p国产 | 给我免费播放毛片高清在线观看| 亚洲成人免费电影在线观看| 午夜老司机福利剧场| 波野结衣二区三区在线| 啪啪无遮挡十八禁网站| 国产精品国产高清国产av| 69人妻影院| 又黄又爽又免费观看的视频| 69人妻影院| 欧美激情久久久久久爽电影| 校园人妻丝袜中文字幕| 成人永久免费在线观看视频| 免费看美女性在线毛片视频| 日韩一本色道免费dvd| 亚洲成人久久爱视频| 一进一出抽搐gif免费好疼| 99精品久久久久人妻精品| 成人av一区二区三区在线看| 久久九九热精品免费| 亚洲一区二区三区色噜噜| 日本欧美国产在线视频| 国产午夜福利久久久久久| 日本欧美国产在线视频| 两个人的视频大全免费| 午夜精品久久久久久毛片777| 日韩欧美 国产精品| av女优亚洲男人天堂| 日本免费一区二区三区高清不卡| 成人av在线播放网站| 久久精品人妻少妇| 免费在线观看成人毛片| 午夜免费成人在线视频| xxxwww97欧美| 国产 一区精品| 精品日产1卡2卡| 国产主播在线观看一区二区| 国产在视频线在精品| 亚洲18禁久久av| 天堂av国产一区二区熟女人妻| 欧美日韩中文字幕国产精品一区二区三区| 精品久久久久久久人妻蜜臀av| 极品教师在线免费播放| 日日摸夜夜添夜夜添av毛片 | 18+在线观看网站| 免费大片18禁| 老熟妇乱子伦视频在线观看| 精品久久久久久久末码| 又紧又爽又黄一区二区| 春色校园在线视频观看| 欧美日韩黄片免| 午夜激情欧美在线| 亚洲精品一区av在线观看| 国产v大片淫在线免费观看| 久久亚洲精品不卡| 九色国产91popny在线| 欧美精品国产亚洲| 波多野结衣巨乳人妻| 乱人视频在线观看| 黄色一级大片看看| 国模一区二区三区四区视频| 久久香蕉精品热| 能在线免费观看的黄片| 午夜福利在线在线| 人妻久久中文字幕网| 国产蜜桃级精品一区二区三区| av在线老鸭窝| 丰满乱子伦码专区| 搞女人的毛片| 亚洲精华国产精华精| 欧美日韩黄片免| 国产中年淑女户外野战色| 少妇人妻一区二区三区视频|