• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    2024-03-23 08:17:38YanzhongSunXiaoniDuShufenNiuandXiaodongYang

    Yanzhong Sun ,Xiaoni Du,? ,Shufen Niu and Xiaodong Yang

    1College of Mathematics and Statistics,Northwest Normal University,Lanzhou,730070,China

    2College of Computer Science and Engineering,Northwest Normal University,Lanzhou,730070,China

    ABSTRACT Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability and multi-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.

    KEYWORDS Cloud email system;authenticated searchable encryption;blockchain-based;designated server test;multi-trapdoor privacy;multi-ciphertext indistinguishability

    1 Introduction

    Email systems have become an essential component of modern communication tools and revolutionized the way we conduct business,education,and personal communication,facilitating effective and efficient communication.However,the widespread usage of email has raised significant concerns regarding email security.Searchable encryption[1],as a promising security solution,has been successfully applied in many fields,including email systems.It can not only provide users with convenient search and data management methods while preserving data privacy and security but also enrich the overall user experience while safeguarding email confidentiality.That is,searchable encryption technology has become an indispensable security protection measure within email systems.

    Public key Encryption with Keyword Search(PEKS)is a form of searchable encryption within the asymmetric category proposed by Boneh et al.[2]which optimises the security and privacy of email and improves users’experience and the system performance.Since then,several PEKS schemes with varying functionality have been proposed including secure channel-free PEKS [3] and certificateless PEKS[4,5].Although these schemes offer numerous keyword search methods suitable for encrypted email systems,there are still some security issues to be concerned with,specifically the Keyword Guessing Attack(KGA)[6].In fact,the limited keyword space and low entropy render most PEKS schemes vulnerable to both online and offline KGA.

    To defend against KGA,Huang et al.[7] introduced the Public Key Authenticated Encryption with Keyword Search (PAEKS) as a new variant of PEKS in 2017 and proved that the proposed PAEKS scheme achieved Ciphertext Indistinguishability (CI)-secure and Trapdoor Privacy (TP)-secure.Considering against chosen multi-keyword attacks and multi-keyword guessing attacks,Qin et al.[8]presented a new security model as Multi-Ciphertext Indistinguishability(MCI)in 2020 and Pan et al.formalized Multi-Trapdoor Privacy(MTP)in[9],which are the enhancement of CI-secure and TP-secure,respectively.

    It is obvious that all PEKS/PAEKS systems cannot avoid the inherent burden of certificate management and key escrow issues due to their reliance on public key infrastructure cryptosystem or identity-based cryptosystem.A common approach to overcome these problems is to incorporate the PEKS/PAEKS system in certificateless public key cryptography (CL-PKC) [10].As a result,Peng et al.[5] proposed the first certificateless PEKS scheme and He et al.[11] developed the first certificateless PAEKS scheme.However,the CL-PKC scheme still suffers from two types of attackers.The distributed nature of blockchain makes it impossible to tamper the data stored on the chain,which solves the trust problem and guarantees data security.Therefore,in CL-PKC,in order to avoid forgery attacks launched by attackers using public parameters,part of the user’s private key is created by a blockchain smart contract[12].

    All of the above improvements to PEKS/PAEKS including the enhancement of security and the introduction of certificateless cryptosystem have significantly optimized their application for protecting the data security and privacy,enhancing user experience and improving system performance.Moreover,Zhang et al.[13] highlighted a crucial aspect of encrypted email systems: users must not only search for encrypted emails received from others but also retrieve encrypted emails sent to others,and they developed a new cryptographic approach named Public-key Encryption with Bidirectional Keyword Search (PEBKS).Inspired by the above ideas,it is imperative to develop a certificateless authenticated bidirectional searchable encryption scheme with a designated server test that can achieve both MCI and MTP security.

    1.1 Our Contributions

    The following is a list of the main contributions of this paper:

    ? Considering the actual application scenario of cloud email system that the data owner also needs to retrieve emails with target keywords.We apply the bidirectional searchable functionality to CL-PAEKS cryptosystem by introducing a trapdoor generation algorithm for the data owner,put forward a cryptographic concept named CL-BSE.This allows the data owner not only to encrypt and send an email to the cloud email server,but also to generate its own trapdoor for specified keyword and retrieve the corresponding email.

    ? On the one side,the scheme in this paper achieves bidirectional searchable functionality,on the other side,it establishes dual authentication functions.In the process of generating the ciphertext with the keyword,the data owner not only uses the public key of the data receiver,but also uses his own private key.Similarly,the data receiver uses both his own private key and the public key of the data owner to generate the corresponding trapdoor,which authenticates the identity of the data owner.Meanwhile,the blockchain can also verify the legitimacy of the ciphertexts,which effectively saves the storage space.Furthermore,the scheme satisfies designated server test which makes secure channel free.

    ? We formalize the definition of the new cryptographic concept CL-BSE,then give a concrete construction of the scheme under the bilinear pairing.Meanwhile,we formally define the security model of CL-BSE scheme and show that in the random oracle model,it is able to achieve both MCI and MTP security levels against inside KGA under the CBDH hardness assumption.Through the experimental comparison,our scheme has more advantages and higher efficiency in computation and communication costs.

    1.2 Organization

    The rest of this paper is arranged as follows.The next section presents some basic symbols and notations,including bilinear pairing and hardness assumption.Section 3 illustrates the framework of our scheme including the system model in 3.1,the formalized definition in 3.2 and the formalized security model in 3.3.Section 4 is the concrete construction of our CL-BSE scheme and Section 5 guarantees the security of the new scheme.In Section 6,we analyze the performance by comparing it with existing works.Eventually,we draw a conclusion of the paper in Section 7.

    1.3 Related Works

    Boneh et al.[2]presented the first PEKS scheme in 2014,which effectively solved the distribution and management of the secret-key in the symmetric searchable encryption(SSE)cryptosystem[14–16].However,Baek et al.[3]pointed out that the trapdoor transmission channel must be secure in[2],and then proposed a secure channel free PEKS(SCF-PEKS)scheme by giving the server a public/private key pair so that only the designated server could execute the test algorithm.Rhee et al.in[17]improved the trapdoor security of[3]and then constructed a new SCF-PEKS scheme called dPEKS under the new security model.Nevertheless,Byun et al.[6] claimed that both PEKS and SCF-PEKS schemes were vulnerable to(offline)KGA and a variety of improved PEKS and SCF-PEKS schemes[18–20]were proposed to overcome the series security threats in the years including [17].Unfortunately,it turns out that none of them can really resist the offline KGA[21].What’s worse is that Yau et al.[22]pointed out that these existing PEKS schemes suffered from another generic attack called online KGA or inside KGA in 2013.

    In order to defend against both online KGA and offline KGA,Huang et al.[7] introduced a new primitive of PAEKS and proposed the first PAEKS scheme in 2017.The essence of PAEKS is to insert the data owner’s public/private key pair into PEKS so that it can authenticate the keyword while encrypting it.Meanwhile,they defined the security as TP and CI for trapdoor and ciphertext,respectively.After that,Noroozi et al.[23] pointed out some weaknesses of the previous security in terms of multi-user settings.In 2020,Qin et al.[8] found that the CI &TP security in [7] does not protect the information whether two different files extract identical keywords or the same file contains how many identical keywords so they improved the security model as MCI,and they proposed a PAEKS scheme satisfying MCI instead of MTP.In 2021,Pan et al.claimed that their new scheme in[9]achieved both MCI and MTP secure until Cheng et al.[24]presented an effective attack method on MTP.In addition to the security efforts,contributions to the functionality of PEKS/PAEKS have also been made.Fuhr et al.[25]and Hofheinz et al.[26]inserted the ciphertext decryptable function on PEKS schemes in different types of models.Zhang et al.[13]observed that in practical application,a data owner also needed to retrieve encrypted files containing specified keywords,then proposed a cryptographic system Public-key Encryption with Bidirectional Keyword Search (PEBKS) and constructed a concrete scheme.

    All of the above schemes,including PEKS,PAEKS and PEBKS are identity-based cryptosystem with key escrow and certificate management issues.Peng et al.[5]constructed the first PEKS under CL-PKC named CLPEKS.In 2018,Ma et al.[4]proposed an improved CLPEKS scheme and it was improved again in the literature[27],which was been pointed out cannot achieve both MCI and MTP secure and was subsequently improved by Yang et al.[28].But,the cryptanalysis in[29]demonstrates that these CLPEKS frameworks also suffer from the security vulnerability caused by the keyword guessing attack and in order to remedy these security weakness and provide resistance against both inside and outside keyword guessing attacks,they propose a new CLEKS scheme by embedding the owner’s private key into the calculation of keyword ciphertexts,which actually is CL-PAEKS.Later,combining[4],He et al.[11]proposed a CL-PAEKS scheme,and Shiraly et al.[30]constructed a pairing-free CL-PAEKS.However,their security and functionality still need to be improved and promoted.

    2 Preliminaries

    2.1 Notations

    The symbols and notations used in this paper are presented in the Table 1.

    Table 1:The symbols and notations

    2.2 Bilinear Pairing

    Bilinear pairing[31]is an important tool in the construction of many pairing based cryptographic schemes,including our CL-BSE scheme,and we usually construct it using the Weil pairing and the Tate pairing[31–33].

    Definition 2.1(Bilinear Pairing).Let G1be an additive cyclic group of large prime orderqand G2a multiplicative cyclic group of the same order.Abilinear pairing:G1×G1→G2is a mapping which satisfies the following properties:

    Bilinearity:For anyP,Q∈G1and anya,;

    Non-Degeneracy:There exists aP∈G1such that,(wheredenotes the identity in G2).Observe that since G1and G2are groups of prime order,so for any generatorP∈G1,this statement implies that∈G2is a generator of G2;

    Computability:For anyP,Q∈G1,there is an efficient algorithm to compute.

    2.3 Hardness Assumption

    where the probability is taken over the random choices ofP∈G1,a,b,c∈and the random coins tossed byB.

    3 The Framework

    There are three principal works in this section.First,we illustrate the system model of our protocol in this paper based on[13],and then formalise the definition of our CL-BSE scheme.Finally,we define the security model based on[8,9].

    3.1 System Model

    As shown in Fig.1,the system model of our protocol includes the following five parties: cloud email server (CS),smart contract-based key generation center (SC-KGC),blockchain (BC),data owner(DO)and data receiver(DR).They are interacting as follows:

    ?SC-KGC:Deployed on the blockchain,the smart contract key generation center is a combination of a smart contract and a conventional key generation center.It is responsible for producing and storing the public parameters on the blockchain,generating and distributing partial private keys and the master key to the corresponding parties.

    ?Blockchain:To avoid the system public parameters being tampered with,blockchain stores and then transmits them to all clients.The blockchain is also responsible for verifying the validity of the ciphertext,and then transferring the verified ciphertext to the cloud server.

    ?Cloud Email Server:The cloud email server plays an “honest but curious”role in the system model,i.e.,it stores the real data,retrieves keyword sets by rules and returns the corresponding results correctly.Meanwhile,it may launch keyword guessing attacks on a set of received search tokens.Furthermore,it also performs the test algorithm and then sends the search results to the data receiver.

    ?Data Owner:The data owner is a client who wants to store the encrypted data files with keyword indexes in the email server while sending it to the data receiver through the cloud email server,so that he/she can retrieve it by generating a trapdoor using his/her own private key.

    ?Data Receiver:The data receiver is one who receives emails from the cloud email server by sending a trapdoor for the keywords he/she interested in using his/her own private key.

    Figure 1:System model

    3.2 The Definition of CL-BSE

    We have formalized the architecture of our certificateless bidirectional authenticated searchable encryption(CL-BSE)scheme for the cloud email system.

    Definition 3.1.The CL-BSE scheme consists essentially of nine PPT algorithms:Setup,Extract-PPK,Set-secret-value,Set-private-key,Set-public-key,CL-BSE,Trapdoor-DR,Trapdoor-DO and Test.They are described below:

    ? Setup(1k):This algorithm is executed by SC-KGC.Given a security parameter 1k,the algorithm generates the global public parametersParamsand the master keyPmas.

    ? Extract-PPK (Params): This algorithm is also performed by SC-KGC.It takes as input the global public parametersParams,the master keyPmasand the client identityIDU(U∈{CS,DO,DR}),generates and outputs each client’s partial private keyPPKU.

    ? Set-secret-value(Params,IDU):This algorithm is run by each client.InputParamsand the client identityIDU(U∈{CS,DO,DR}),it generates the secret valueSVUfor each participant.

    ? Set-private-key (Params,SVU,PPKU): Each client runs this algorithm on its own.EnteringParams,secret valueSVUand partial private keyPPKU,it outputs the private keySKUfor each client.

    ? Set-public-key(Params,SVU):This algorithm is executed by each client.It takes as inputParamsand the secret valueSVU,and outputs the public keyPKUfor itself.

    ? CL-BSE (PKDR,PKCS,SKDO,w): This is the keyword ciphertext generation algorithm and is performed by the data owner.It takes as inputPKDR,PKCS,SKDOand keywordwwith respect to the encrypted files,outputs a ciphertextCw.

    ? Trapdoor-DR (PKDO,PKCS,SKDR,w′): This algorithm generates trapdoor for data receiver.When searching the encrypted files containing the keywordw′from the cloud email server,it takes as inputPKDO,PKCS,SKDRand the keywordw′,and outputsTDR.

    ? Trapdoor-DO(PKDR,PKCS,SKDO,w′):This algorithm generates trapdoor for data owner.When the client wants to retrieve the encrypted files containing the keywordw′from the cloud email server,it takes as inputPKDR,PKCS,SKDOand the keywordw′,outputsTDO.

    ? Test (Cw,SKCS,Tw′=TDO(TDR)): The test algorithm is executed by the cloud email server.It takesCwandTw′as input and returns“1”ifw=w′and“0”otherwise.

    Correctness.The correctness of our CL-BSE scheme is defined as follows.For any legally registered clientsIDU(U∈{DO,DR,CS})with public/private key pairs(PKU,SKU).LetCw←CL-BSE(PKDR,PKCS,SKDO,w)be the ciphertext ofw,TDO←Trapdoor-DO(PKDR,PKCS,SKDO,w′)andTDR←Trapdoor-DR(PKDO,PKCS,SKDR,w′)be the trapdoors ofw′generated byDOandDR,respectively.Correctness implies

    3.3 Security Model

    As with other certificateless cryptosystems [5,10,28,34,35],the CL-BSE scheme considers two types of adversary with different privileges: Type-I adversaryA1and Type-II adversaryA2.Specifically,

    ?Type-I adversaryA1.It plays the part of the malicious user who is available to perform queries including extract partial private key,request public key,extract secret value and replace public key,but does not have access to the master private keyPmas.

    ?Type-II adversaryA2.It models an honest-but-curious SC-KGC that has access to the master private keyPmas,but not allowed to replace public key query.

    Now,the above queries are listed as follows,which are actually interactions between an adversaryA1(A2)and a challengerC.

    –Extract-PPK query.WhenA1(A2)queries partial private key for identityIDi,Cexecutes Extract-PPK algorithm and returns partial private keyPPKi.

    –Extract-secret-value query.WhenA1(A2)queries secret value for identityIDi,Cexecutes Setsecret-value algorithm and returns a secret valueSVi.

    –Request-public-key query.WhenA1(A2)queries public key for identityIDi,Cexecutes Setpublic-key algorithm and returns public keyPKi.

    –Replace-public-key query.A1is permitted to askCto replace the publicPKiwith a new onefor any userIDi.

    –Ciphertext query.WhenA1(A2)queries the ciphertext of the keywordw,the challengerCreturns the matching ciphertextCw.

    –Data receiver trapdoor query.WhenA1(A2)queries the data receiver trapdoor of keywordw′,Creturns the matching trapdoorTDR=.

    –Data owner trapdoor query.WhenA1(A2)queries the data owner trapdoor of keywordw′,Creturns the matching trapdoorTDO=.

    In order to capture chosen multi-keyword attacks and multi-keyword guessing attacks,the security model of our CL-BSE scheme are defined as MCI[8]and MTP[9],which are the enhancement of CIsecure and TP-secure[7],respectively.Their formal definitions are described by the following games,which are interactions between an challengerCand an adversaryA1orA2.

    Game 1:The MCI Security against AdversaryA1.

    ?Setup.Given security parameter 1k,Cgenerates public parameterParamsand system master keyPmasby running Setup algorithm.It then responds only toA1Paramsand keeps master keyPmassecret.

    ?Phase 1.A1can adaptively perform a series of polynomial times queries,includingExtract-PPKquery,Extract-secret-valuequery,Request-public-keyquery,Replace-public-keyquery,Ciphertextquery,Data receiver trapdoorquery andData owner trapdoorquery.

    ?Challenge.AfterA1finishes the queries inPhase 1,it selects two challenge keyword sets={w0,1,w0,2,...,w0,n},={w1,1,w1,2...,w1,n} which are not queried inPhase 1and sends them toC.After that,it first chooses a random bitb∈{0,1},then computes the searchable ciphertextwith respect to.Finally,it returnsas a challenge ciphertext.

    ?Phase 2.As inPhase 1,A1can continue to make series queries for polynomial times and the restriction here is that cannot make ciphertext query and two trapdoor queries on.

    ?Guess.Finally,A1outputs its guessb′∈{0,1}onb,and wins this game ifb′=b.

    The following probability equation definesA1’s advantage in the game,

    Game 2:The MCI Security against AdversaryA2.

    ?Setup.Given security parameter 1k,Cruns Setup algorithm generates public parameterParamsand system master keyPmas,then sends bothParamsandPmastoA2.

    ?Phase 1.As inGame 1,A2can makeExtract-PPKquery,Extract-secret-valuequery,Requestpublic-keyquery,Ciphertextquery,Data receiver trapdoorquery andData owner trapdoorquery,but not available forReplace-public-keyquery.

    ?Challenge.WhenA2completed thePhase 1,it selectsas challenge keywords sets like the steps inGame 1,and sends them toC.ThenCchooses a random bitb∈{0,1}and generates the ciphertextwith respect to.Finally,it returnstoA2as a challenge ciphertext.

    ?Phase 2.This phase is the same asGame 1,A2is not allowed to make ciphertext query and two trapdoor queries on.

    ?Guess.Finally,A2outputs its guessb′∈{0,1}onb,and wins ifb′=b.

    The advantage ofA2inGame 2is defined by the following probability equation:

    Definition 3.2(MCI security).The CL-BSE scheme is said MCI security if for any PPT adversaryA,its advantagesagainst the challengerCinGame 1andGame 2are negligible.

    Game 3:The MTP Security against AdversaryA1.

    ?Setup.The setup algorithm is the same asGame 1,Calso only sends the public parameterParamstoA1eventually.

    ?Phase 1.Same as processPhase 1inGame 1.

    ?Challenge.WhenA1has finished thePhase 1,do the same as that inGame 1to obtain two challenge keywords setsand send them toC.After that,Cchooses a random bitb∈{0,1}first,then computes the trapdoorwith respect to.Finally,it returnstoA1as a challenge trapdoor.

    ?Phase 2.Same as processPhase 2inGame 1.

    ?Guess.Finally,A2outputs its guessb′∈{0,1}onb,and wins this game ifb′=b.

    The advantage ofA1inGame 3is defined by

    Game 4:The MTP Security against AdversaryA2.

    ?Setup.The setup algorithm is the same asGame 2,the challengerCsends both the public parameterParamsand the master keyPmastoA2eventually.

    ?Phase 1.Same as processPhase 1inGame 2.

    ?Challenge.AfterA2has finished thePhase 1,do the same as that inGame 3to obtain two challenge keyword setsand send them toC.ThenCchooses a random bitb∈{0,1}and generates the trapdoorwith respect to.Finally,it returnstoA2as a challenge trapdoor.

    ?Phase 2.Same as processPhase 2inGame 2.

    ?Guess.Finally,A2outputs its guessb′∈{0,1}onb,and it wins this game ifb′=b.

    The advantage ofA2inGame 4is defined by

    Definition 3.3(MTP security).The CL-BSE scheme is said MTP security for both data receiver trapdoor and data owner trapdoor,if for any PPT adversaryA,its advantagesandagainst the challengerCinGame 3andGame 4are negligible.

    4 The Proposed CL-BSE Scheme

    In this section,we give a concrete construction as the formal definition of the CL-BSE scheme in Section 3.2 with a designated server,it consists of nine PPT algorithms in five phases: System initialization,Key generation,Keyword encryption,Trapdoor generation and Test.

    Phase A.System Initialization.

    ? Setup(1k):Given the security parameter 1k,SC-KGC performs the following steps:

    (1) Select a cyclic additive group G1,a cyclic multiplicative group G2with a large prime orderq,(q >2k)and three generatorsP1,P2andQ∈G1,generate a bilinear pair:G1×G1→G2;

    (2) Pick a random numbers←,put it as the system master key and store it secretly,then computePpub=sP1;

    (3) Define six different cryptographic hash functionsHi(1≤i≤6)as:H1: {0,1}?→G1,H2:{0,1}?×G1→,H3:{0,1}?×G1×G1×G1→,H4:G1→{0,1}len,wherelenis the fixed length output,H5: G2→,H6: {0,1}logw+len→,and logwdenotes the length ofw;

    (4) Broadcast the public parametersparams=on the blockchain.

    Phase B.Key Generation.

    ? Extract-PPK(Params):SC-KGC takes as input the public parametersParams,the master keyPmasand the identityIDU(U∈{CS,DO,DR}),then generates partial private keys for all clients as follows:

    (1) ForCS,SC-KGC selectsrCS←randomly,computesRCS=rCSP2,αCS=H2(IDCS,RCS)anddCS=rCS+αCSs(mod ~q),and outputsPPKCS=(RCS,dCS)as its partial private key;

    (2) ForU∈{DO,DR},SC-KGC computes their partial private key asPPKU=DU,whereDU=sQUandQU=H1(IDU).

    ? Set-secret-value(Params,IDU):The clientU∈{DO,DR}selectsxU,yU←randomly and setsSVU=(xU,yU).CSselects a single random numberxCS←and setsSVCS=xCS.

    ? Set-private-key (Params,SVU,PPKU): The clientU∈{DO,DR} andCSset their own private keys asSKU=(xU,yU,DU)andSKCS=(xCS,dCS),respectively.

    ? Set-public-key(Params,SVU):The clientU∈{DO,DR}computesPU=xUP1,YU=yUQ,and assigns its public keys asPKU=(PU,YU),whileCSassigns its public key asPKCS=(PCS,RCS),wherePCS=xCSP2.

    Phase C.Keywords Encryption.

    ? CL-BSE(PKDR,PKCS,SKDO,w):WhenDOwants to encrypt the keywordwextracted from the encrypted emails,he/she enters the relevant parametersparams,SKDO,IDDR,PKDR,IDCS,PKCSand performs the following steps:

    (1) ComputeαCS=H2(IDCS,RCS),βCS=H3(IDCS,Ppub,PCS,RCS);

    (2) Computek1=H4(yDOYDR),k2=;

    (3) Selectr←randomly,then compute

    (4) ComputeV=DDO+(r·k2+xDO)RCS;

    (5) Upload the ciphertextCw=(C1,C2,C3,V)on the blockchain.

    Upon receivingCw=(C1,C2,C3,V)from the data owner,the blockchain verifies the owner’s legitimacy by the equation

    If and only if the owner is a legal member of the system,the blockchain then stores the verified ciphertexts to the cloud server,which can effectively save storage space.

    Phase D.Trapdoor Generation.

    BothDRandDOcan generate their own trapdoor in the following ways:

    ? Trapdoor-DR (PKDO,PKCS,SKDR,w′): Input parametersParams,SKDR,PKDOandPKCS,whenDRsearches for the files containing the keywordw′,it performs the following operations:

    (1) RecallαCS,βCS,andk1=H4(yDRYDO),k2=;

    (2) Select a random numbertDR←and compute

    (3) OutputTDR=(T1,T2).

    ? Trapdoor-DO (PKDR,PKCS,SKDO,w′).Different from other CL-PAEKS models,the bidirectional keyword search functionality in this paper is achieved by introducingDO’s trapdoor generation algorithm.In fact,similar toDR’s trapdoor generation process above,whenDOretrieves the data fromCS,it does not need to generate any additional variables,but simply uses its own private keySKDOandPKDR,PKCSto generate the trapdoorTDO=(T1,T2).That is,

    Phase E.Test Process.

    ? Test(Cw,SKCS,=TDO/TDR):TakeCw,SKCS,=TDOorTDRas input,CSverifies whether

    holds.Output“1”if it holds and“0”otherwise.

    Actually,from the verification equation it can be seen that sincexCSanddCSare private keys secretly held by the cloud email server,then only the server holding the private key can verify the equation above,i.e.,our scheme is a bidirectional searchable encryption scheme with secure channel free for designated server verification.

    Correctness.

    The verification process described above demonstrates the correctness of the data owner’s trapdoor and ciphertext test,the verification with respect to the data receiver’s trapdoor is similar and we omit it.

    5 Security Analysis

    Based on the formal definition of security models in Section 3.3 and the CBDH hardness assumption in Section 2.3,we give the security proof of our scheme in this section.

    Theorem 5.1(MCI security).In the random oracle model,our CL-BSE scheme achieves semantically MCI security against outside chosen multi-keyword attacks under the CBDH hardness assumption.

    The proof of Theorem 5.1 can be achieved by the following two lemmas.

    Lemma 5.1.In the random oracle model,for any PPT adversaryA1,there is an algorithmBthat can break the CBDH assumption with advantage

    ifA1wins Game 1 with advantageε.

    ?Phase 1.A1preforms a series of queries with polynomially many times adaptively,they are

    ?Phase 2.As inPhase 1,A1can make a series of queries for polynomial times and it can not make ciphertext query and two trapdoor queries on any keyword in.Denote this event asE6.

    Now,supposeBcan break the CBDH assumption with advantageε′,A1can make at most,qCandqTtimes queries toH1-query,Extract-PPK query,Request-public-key query,Ciphertext query and Trapdoor query,respectively,then

    we have Pr[?E6]≥2ε.Combing with(24),we get Eq.(16)and the lemma is proved.

    Lemma 5.2.In the random oracle model,for any PPT adversaryA2,there is an algorithmBthat can break the CBDH assumption with advantage

    ifA2wins Game 2 with advantageε.

    Proof.Similar with Lemma 5.1,given an instance of the CBDH assumption(P1,aP1,bP1,cP1)∈,Bcalculates the valueby takingA2as a subroutine as follows:

    ?Setup.BgeneratesParams={G1,G2,,q,P1,P2=αP1,Q,Ppub,Hi(1≤i≤6)} andPmas=s∈,setsPDO=aP1,PDR=bP1,PKCS=(PCS,RCS)andSKCS=(xCS,dCS),and choosesIDI(1≤I≤)randomly as the challenge identity.Finally,it responds both(Params,PDO,PDR,PKCS,SKCS)andPmas=stoA2.

    ?Phase 1.A2preforms a series of queries with polynomially many times adaptively,they are

    –Hash queries.A2can queryHi(1≤i≤6)random oracles.Bresponds them as same as Lemma 5.1.

    –Request-public-key query.Bmaintains a list={〈IDi,xi,yi,Pi,Yi〉} to respondA2for the public key ofIDi.The interaction is the same asPhase 1in Lemma 5.1.

    –Extract-private-key query.When the identityIDiis queried byA2,Bfirst checks whetherIDi=IDI.If not,it performs as follows: ifIDialready exists onin the corresponding tuples〈IDi,λi,Qi〉and〈IDi,xi,yi,Pi,Yi〉,thenBresponds toA2asSKi=(xi,yi,sQi),otherwise performsH1queryandRequest-public-key querywithIDiand retrieves the correspondingSKi=(xi,yi,sQi).IfIDi=IDI,it aborts and denotes this event asE1.

    ?Phase 2.This phase is same asGame 2,A2is not allowed to make ciphertext query and two trapdoor queries on.Denote this event asE5.

    Now,supposeBbreaks the CBDH assumption with advantageε′,A2can make at most,qCandqTtimes queries toH1-query,Request-public-key query,Ciphertext query and Trapdoor query,respectively,thus,

    we have Pr[?E5]≥2ε,so combing with(35),we get Eq.(27)and the lemma is proved.

    Theorem 5.2MTP security.In the random oracle model,our CL-BSE scheme achieves semantically MTP security against inside multi-keywords guessing attacks under the CBDH hardness assumption.

    The proof of Theorem 5.2 can be achieved by the following two lemmas:

    Lemma 5.3.In the random oracle model,for any PPT adversaryA1,there is an algorithmBcan break the CBDH assumption with advantage

    ifA1wins Game 3 with advantageε.

    Proof.The interaction process in the proof is basically the same as Lemma 5.1 except theChallengephase and theGuessphase.They are

    The analysis process of the advantagesε′thatBcomputes the above problem is also same as Lemma 5.1,that is Eq.(38)holds and the lemma is proved.

    Lemma 5.4.In the random oracle model,for any PPT adversaryA2,there is an algorithmBcan break the CBDH assumption with advantage

    ifA2wins Game 4 with advantageε.

    Proof.The interaction process in the proof is basically the same as Lemma 5.2 except theChallengephase and theGuessphase.They are

    The analysis process of the advantagesε′thatBcomputes the above problem is also same as Lemma 5.2,that is Eq.(40)holds and the lemma is proved.

    6 Performance Analysis

    In this section,we analyze the performance of our scheme by comparing it with some existing schemes in[4,5,28–30,36,37].

    First,we give some basic operations used in the scheme and the executing times of a single operation in Table 2.These times of operations are averaged over 1000 runs on a personal computer(Lenovo with Windows 10 operating system,Intel (R) Core (TM) i7 -7700 CPU @ 3.60 GHz and 8 GB RAM memory)using the Pairing-Based Cryptography(PBC)library[38]in Ubuntu10.

    Table 2:Some operations and their overhead time(ms)

    Figs.2–5 and Table 3 describe the computation overhead of different algorithms in each scheme.Specifically,the computational overhead in the ciphertext generation(Fig.3)of our scheme is slightly higher than[30,36].In trapdoor generation process(Fig.4),the computational overhead of the scheme is higher than [4,5,30] since the enhanced trapdoor privacy and authentication functionality.In test process (Fig.5),its computational overhead is slightly higher than in [29,30] because our scheme is server-designated,that is,the public/private key pairs of the server are involved in the operation.However,in terms of total time,the time overhead of our new scheme is only slightly higher than[30].It has some advantages when DO (or DU) retrieves emails and is more in line with practical application scenarios.

    Figure 2:Computation overhead in each phase

    Table 3:The computational overhead of the schemes(ms)

    Figure 3:Running time of encryption

    Figure 4:Running time of trapdoor

    Figure 5:Running time of test

    Subsequently,we make a comparison in terms of communication costs,including the size of public key |PK|,ciphertext |CT| and trapdoor |TD|,which are presented in Table 4.In the table,the notations |G1|,|G2| and |Zq| denote the bit length size for each element in G1,G2and Zq,respectively.It is clearly see that the size of ciphertext of our scheme is the same as Yang et al.’s scheme[28]and is smaller than Cheng et al.’s scheme[37],a sightly larger than other schemes;same as Yang et al.’s scheme[28],the size of trapdoor of our scheme is smaller than other schemes except Ma et al.’s scheme[4].

    Table 4:The communication overhead of the schemes(bits)

    Finally,we present some additional performance comparisons in the Table 5.In the table,SCF denotes designated server test,AUT denotes authenticated function,BSE denotes bidirectional searchable encryption and ASSUM denotes the difficulty assumption of the scheme security depends on.Finally,we find that our scheme is a certificateless authenticated bidirectional searchable encryption scheme with a designated server test that achieves both MCI and MTP security under the CBDH hardness assumption.

    Table 5:Other performance comparison

    7 Conclusion

    Based on the certificateless public key authenticated encryption with keyword search (CLPAEKS) cryptosystem and the bidirectional searchable functionality,this paper proposed a new cryptographic approach named blockchain-based certificateless authenticated bidirectional searchable encryption (CL-BSE).To some extent,it can be regarded as avoiding the key escrow and certificate management problem in the PEBKS scheme,and can also be considered as appending distinctive features which allow a data owner to retrieve the keyword ciphertext from server in the CL-PAEKS cryptosystem.Taking the cloud email system as the actual application scenario,we build a concrete construction of the CL-BSE scheme.The security analysis of the scheme indicates that it can achieve both MCI-secure and MTP-secure against IKGA under the CBDH hardness assumption.

    Acknowledgement:The authors wish to express their appreciation to the reviewers for their helpful suggestions which greatly improved the presentation of this paper.

    Funding Statement:This work was supported by the National Natural Science Foundation of China(Nos.62172337,62241207)and Key Project of Gansu Natural Science Foundation(No.23JRRA685).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Y.Sun,X.Du;data collection:Y.Sun;analysis and interpretation of results:Y.Sun,X.Du,X.Yang;draft manuscript preparation:Y.Sun,S.Niu.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the article.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人18禁在线播放| 色综合婷婷激情| 网址你懂的国产日韩在线| 精品人妻1区二区| 日韩欧美三级三区| 亚洲成av人片免费观看| 午夜成年电影在线免费观看| 亚洲专区字幕在线| 最好的美女福利视频网| 极品教师在线免费播放| 国产69精品久久久久777片 | 男女午夜视频在线观看| 国产三级黄色录像| 熟女人妻精品中文字幕| 看片在线看免费视频| 亚洲专区国产一区二区| 国产欧美日韩一区二区三| 91久久精品国产一区二区成人 | 欧美成人免费av一区二区三区| 麻豆一二三区av精品| 不卡一级毛片| 国产精品一及| 偷拍熟女少妇极品色| 欧美日韩福利视频一区二区| 亚洲欧美日韩高清在线视频| 日韩中文字幕欧美一区二区| www.999成人在线观看| 又大又爽又粗| 午夜成年电影在线免费观看| 国产精品久久久久久久电影 | 亚洲精华国产精华精| 特大巨黑吊av在线直播| 亚洲无线观看免费| av天堂中文字幕网| cao死你这个sao货| 成在线人永久免费视频| 搡老妇女老女人老熟妇| 国产精品爽爽va在线观看网站| 成年女人永久免费观看视频| 免费看美女性在线毛片视频| 亚洲五月天丁香| 香蕉丝袜av| 国产亚洲欧美在线一区二区| 欧美一区二区国产精品久久精品| 成在线人永久免费视频| 国产成人精品久久二区二区91| 国产伦人伦偷精品视频| 午夜免费激情av| 一级作爱视频免费观看| 亚洲成人久久爱视频| 熟女人妻精品中文字幕| www国产在线视频色| 成熟少妇高潮喷水视频| 欧美国产日韩亚洲一区| 国产激情欧美一区二区| 国产激情久久老熟女| 久久国产精品人妻蜜桃| 91九色精品人成在线观看| 在线观看66精品国产| 久久久久国产精品人妻aⅴ院| 嫩草影视91久久| 精品乱码久久久久久99久播| 国产真实乱freesex| 国产精品久久电影中文字幕| 一级毛片女人18水好多| 久久久久性生活片| 亚洲第一欧美日韩一区二区三区| 一级毛片高清免费大全| 搞女人的毛片| 国产精品综合久久久久久久免费| 少妇人妻一区二区三区视频| 国产免费av片在线观看野外av| 叶爱在线成人免费视频播放| 色噜噜av男人的天堂激情| 变态另类丝袜制服| 国产黄a三级三级三级人| 成在线人永久免费视频| 中亚洲国语对白在线视频| 精品无人区乱码1区二区| 国产精品 欧美亚洲| 中文字幕高清在线视频| 国产精品一区二区三区四区免费观看 | 久久国产精品人妻蜜桃| 成人高潮视频无遮挡免费网站| 无限看片的www在线观看| 又黄又爽又免费观看的视频| 午夜久久久久精精品| 午夜日韩欧美国产| 在线十欧美十亚洲十日本专区| 精品一区二区三区视频在线观看免费| 国产乱人视频| 天天躁狠狠躁夜夜躁狠狠躁| 久久久成人免费电影| 床上黄色一级片| 欧美zozozo另类| 久久午夜亚洲精品久久| 99精品久久久久人妻精品| x7x7x7水蜜桃| 老司机福利观看| 欧美最黄视频在线播放免费| 亚洲专区字幕在线| 欧美日韩黄片免| 亚洲av免费在线观看| 麻豆av在线久日| 精品久久久久久久久久免费视频| av中文乱码字幕在线| 一个人免费在线观看的高清视频| 欧美成人免费av一区二区三区| 一个人看的www免费观看视频| 午夜a级毛片| 中亚洲国语对白在线视频| 国产 一区 欧美 日韩| 亚洲中文字幕一区二区三区有码在线看 | 欧美成狂野欧美在线观看| 国产成人av激情在线播放| 悠悠久久av| 久久久水蜜桃国产精品网| 在线观看免费午夜福利视频| 熟妇人妻久久中文字幕3abv| 久久精品国产清高在天天线| 国产麻豆成人av免费视频| 国产伦一二天堂av在线观看| 色综合亚洲欧美另类图片| 亚洲精品久久国产高清桃花| 看黄色毛片网站| 国产三级在线视频| 成人午夜高清在线视频| 精品久久久久久久久久免费视频| 亚洲自拍偷在线| 91久久精品国产一区二区成人 | 精品久久久久久久人妻蜜臀av| 日韩欧美国产一区二区入口| 99久久无色码亚洲精品果冻| 精品国内亚洲2022精品成人| 欧美av亚洲av综合av国产av| 黄片大片在线免费观看| 精品国产乱子伦一区二区三区| 国产高清视频在线播放一区| а√天堂www在线а√下载| 一卡2卡三卡四卡精品乱码亚洲| 亚洲人成网站在线播放欧美日韩| 亚洲熟妇中文字幕五十中出| 国内精品久久久久久久电影| 亚洲av五月六月丁香网| 久久久久久国产a免费观看| 免费在线观看成人毛片| 一二三四在线观看免费中文在| 88av欧美| 操出白浆在线播放| 欧美日韩精品网址| 国产三级黄色录像| 熟女少妇亚洲综合色aaa.| 亚洲 欧美 日韩 在线 免费| 成人特级av手机在线观看| 99久国产av精品| 亚洲欧美精品综合一区二区三区| 色综合站精品国产| 黄色丝袜av网址大全| 999精品在线视频| 九九热线精品视视频播放| 狂野欧美激情性xxxx| h日本视频在线播放| 亚洲国产欧洲综合997久久,| 亚洲av电影不卡..在线观看| 日韩欧美 国产精品| 一个人免费在线观看电影 | 岛国视频午夜一区免费看| 日韩有码中文字幕| 久久国产精品影院| 久久久久久国产a免费观看| 久久久久国产一级毛片高清牌| 黄色成人免费大全| 国内毛片毛片毛片毛片毛片| 日韩欧美国产在线观看| 最好的美女福利视频网| 精品欧美国产一区二区三| 亚洲午夜理论影院| 美女黄网站色视频| 狂野欧美激情性xxxx| 国产精品久久久久久久电影 | 夜夜夜夜夜久久久久| 老熟妇乱子伦视频在线观看| 中文字幕熟女人妻在线| 国产在线精品亚洲第一网站| 一级a爱片免费观看的视频| 日韩高清综合在线| 亚洲国产欧美网| 在线观看一区二区三区| 久久久久性生活片| 亚洲成人免费电影在线观看| 最近最新中文字幕大全免费视频| 国产精品电影一区二区三区| 在线观看一区二区三区| 日本撒尿小便嘘嘘汇集6| 变态另类成人亚洲欧美熟女| 欧美日韩中文字幕国产精品一区二区三区| 欧美另类亚洲清纯唯美| 999久久久国产精品视频| 久久久久久久精品吃奶| 波多野结衣巨乳人妻| 国产一区在线观看成人免费| 一个人看视频在线观看www免费 | 99riav亚洲国产免费| 久久热在线av| 精品人妻1区二区| 国模一区二区三区四区视频 | 成人午夜高清在线视频| 真人做人爱边吃奶动态| 1024香蕉在线观看| 老司机福利观看| 12—13女人毛片做爰片一| 男女之事视频高清在线观看| 色综合婷婷激情| 国产蜜桃级精品一区二区三区| 三级毛片av免费| 变态另类成人亚洲欧美熟女| 搡老妇女老女人老熟妇| 国产亚洲精品综合一区在线观看| 美女黄网站色视频| 亚洲欧美精品综合久久99| 999久久久精品免费观看国产| 色综合站精品国产| 夜夜躁狠狠躁天天躁| 久久人人精品亚洲av| 国产成人影院久久av| 黑人操中国人逼视频| 国产免费av片在线观看野外av| 在线免费观看不下载黄p国产 | 真人一进一出gif抽搐免费| 欧美绝顶高潮抽搐喷水| 亚洲精品美女久久久久99蜜臀| 欧美中文日本在线观看视频| 午夜福利高清视频| 十八禁人妻一区二区| 中文资源天堂在线| 变态另类丝袜制服| 久久久久精品国产欧美久久久| 成人国产一区最新在线观看| 最近最新免费中文字幕在线| 日本熟妇午夜| 九色成人免费人妻av| 美女扒开内裤让男人捅视频| 无遮挡黄片免费观看| 美女cb高潮喷水在线观看 | 日韩高清综合在线| 欧美不卡视频在线免费观看| 久久中文字幕人妻熟女| 天堂网av新在线| 五月伊人婷婷丁香| 99热6这里只有精品| 三级男女做爰猛烈吃奶摸视频| 露出奶头的视频| 国产高清videossex| 久久久久亚洲av毛片大全| 成人无遮挡网站| 国产亚洲精品av在线| 久久天堂一区二区三区四区| 亚洲avbb在线观看| 色在线成人网| 99久久国产精品久久久| 国产亚洲精品久久久久久毛片| 久久中文字幕一级| 欧美高清成人免费视频www| 91麻豆精品激情在线观看国产| 国产视频内射| 久久久久久人人人人人| a在线观看视频网站| 成人永久免费在线观看视频| 国产精品一区二区三区四区久久| 伦理电影免费视频| 国产不卡一卡二| 三级毛片av免费| 亚洲电影在线观看av| 18禁美女被吸乳视频| 99热精品在线国产| 久久中文看片网| 欧美一级毛片孕妇| 免费看a级黄色片| 一级作爱视频免费观看| 国产一区二区三区视频了| 欧美黑人巨大hd| 亚洲午夜理论影院| 国产黄a三级三级三级人| 欧美国产日韩亚洲一区| 色哟哟哟哟哟哟| 757午夜福利合集在线观看| 99久久综合精品五月天人人| 一级毛片精品| 又黄又粗又硬又大视频| 国产精品久久久久久亚洲av鲁大| 日韩三级视频一区二区三区| 男女那种视频在线观看| 日韩欧美一区二区三区在线观看| 欧美日韩亚洲国产一区二区在线观看| 久久久国产欧美日韩av| 精品无人区乱码1区二区| 亚洲精品在线美女| 毛片女人毛片| 国产亚洲av高清不卡| 51午夜福利影视在线观看| 中文字幕高清在线视频| 欧美性猛交黑人性爽| 国产aⅴ精品一区二区三区波| 搡老岳熟女国产| 99久久国产精品久久久| 又粗又爽又猛毛片免费看| 给我免费播放毛片高清在线观看| 麻豆成人av在线观看| 亚洲av第一区精品v没综合| 亚洲av成人一区二区三| 久久久久久国产a免费观看| 国产aⅴ精品一区二区三区波| 日本 av在线| 99久国产av精品| 日本与韩国留学比较| 成人av在线播放网站| 国产午夜福利久久久久久| 99久久无色码亚洲精品果冻| 成年版毛片免费区| 51午夜福利影视在线观看| 国产熟女xx| 麻豆国产97在线/欧美| 最新美女视频免费是黄的| 男人舔女人下体高潮全视频| 99久国产av精品| 亚洲美女黄片视频| 国产单亲对白刺激| www.自偷自拍.com| 国产精品美女特级片免费视频播放器 | 美女大奶头视频| 非洲黑人性xxxx精品又粗又长| 国内精品美女久久久久久| 18美女黄网站色大片免费观看| 两性午夜刺激爽爽歪歪视频在线观看| 国内毛片毛片毛片毛片毛片| 老司机深夜福利视频在线观看| 九九热线精品视视频播放| 日日夜夜操网爽| 精品国产美女av久久久久小说| 熟女少妇亚洲综合色aaa.| 精华霜和精华液先用哪个| 免费在线观看成人毛片| 午夜影院日韩av| 午夜激情福利司机影院| 日韩人妻高清精品专区| 热99re8久久精品国产| 不卡一级毛片| 99在线视频只有这里精品首页| 亚洲 欧美 日韩 在线 免费| tocl精华| 悠悠久久av| 精品一区二区三区视频在线 | 国产高清视频在线观看网站| 亚洲第一电影网av| 18禁国产床啪视频网站| 午夜久久久久精精品| 久久天堂一区二区三区四区| 国产高清三级在线| 国产欧美日韩精品亚洲av| 久久久精品大字幕| 久久精品影院6| 国产久久久一区二区三区| 国产一区在线观看成人免费| 亚洲精品乱码久久久v下载方式 | 欧美不卡视频在线免费观看| 日本 欧美在线| 亚洲精品一卡2卡三卡4卡5卡| 男女视频在线观看网站免费| 精品不卡国产一区二区三区| 18禁裸乳无遮挡免费网站照片| 婷婷精品国产亚洲av| 岛国在线免费视频观看| 手机成人av网站| 99久久无色码亚洲精品果冻| 国产精品亚洲一级av第二区| 一本一本综合久久| 12—13女人毛片做爰片一| 精品一区二区三区视频在线 | 国产精品九九99| 精品国产乱子伦一区二区三区| 十八禁网站免费在线| 精品久久久久久久久久免费视频| 国产av不卡久久| 久久久精品大字幕| 琪琪午夜伦伦电影理论片6080| 波多野结衣巨乳人妻| 淫秽高清视频在线观看| 久久精品国产综合久久久| 免费高清视频大片| 国产激情欧美一区二区| 亚洲狠狠婷婷综合久久图片| 两性午夜刺激爽爽歪歪视频在线观看| 啪啪无遮挡十八禁网站| 精品福利观看| 久久天躁狠狠躁夜夜2o2o| 黄色日韩在线| 成人无遮挡网站| 日本黄色视频三级网站网址| 在线观看日韩欧美| 日韩精品青青久久久久久| 亚洲人与动物交配视频| 日本五十路高清| 桃色一区二区三区在线观看| 丁香欧美五月| 色尼玛亚洲综合影院| 黄色女人牲交| 最近最新中文字幕大全电影3| 1024香蕉在线观看| 成人一区二区视频在线观看| 综合色av麻豆| 一个人看视频在线观看www免费 | 国产高清videossex| 色吧在线观看| 久久久精品大字幕| 国产精品爽爽va在线观看网站| 亚洲一区二区三区不卡视频| 免费搜索国产男女视频| 欧美三级亚洲精品| 午夜精品久久久久久毛片777| 1000部很黄的大片| 午夜激情欧美在线| 久久国产乱子伦精品免费另类| 国产成人欧美在线观看| avwww免费| 午夜久久久久精精品| 天堂动漫精品| 亚洲av成人一区二区三| 两个人视频免费观看高清| 亚洲欧美精品综合一区二区三区| 久久久色成人| 日本五十路高清| 亚洲第一欧美日韩一区二区三区| 99久久精品热视频| 看免费av毛片| 99国产综合亚洲精品| 无限看片的www在线观看| 日韩av在线大香蕉| 亚洲熟女毛片儿| 久9热在线精品视频| 国产乱人视频| 久久久久国产一级毛片高清牌| 热99在线观看视频| 午夜精品一区二区三区免费看| 久久精品综合一区二区三区| 99精品在免费线老司机午夜| 少妇人妻一区二区三区视频| 国产av一区在线观看免费| 黄片小视频在线播放| 可以在线观看毛片的网站| 视频区欧美日本亚洲| 国产熟女xx| 免费搜索国产男女视频| 精品国产亚洲在线| aaaaa片日本免费| 国产一区二区在线观看日韩 | 看片在线看免费视频| 天天添夜夜摸| 婷婷精品国产亚洲av| 午夜精品在线福利| 波多野结衣高清无吗| 久久久久国产一级毛片高清牌| 99久久精品热视频| 欧美最黄视频在线播放免费| 制服丝袜大香蕉在线| 免费无遮挡裸体视频| 欧美成狂野欧美在线观看| 亚洲av成人不卡在线观看播放网| 一卡2卡三卡四卡精品乱码亚洲| 宅男免费午夜| 麻豆一二三区av精品| 99国产综合亚洲精品| 网址你懂的国产日韩在线| 久久午夜亚洲精品久久| 村上凉子中文字幕在线| 亚洲国产精品久久男人天堂| 国产黄a三级三级三级人| 香蕉久久夜色| www.www免费av| 99久久久亚洲精品蜜臀av| 欧美色欧美亚洲另类二区| 国内揄拍国产精品人妻在线| 脱女人内裤的视频| 亚洲av第一区精品v没综合| 99视频精品全部免费 在线 | 久久精品aⅴ一区二区三区四区| 亚洲在线观看片| 极品教师在线免费播放| 日本成人三级电影网站| 欧美日韩福利视频一区二区| 五月伊人婷婷丁香| 亚洲av成人精品一区久久| 一个人免费在线观看的高清视频| 国产精品99久久99久久久不卡| 久9热在线精品视频| 亚洲欧美日韩无卡精品| 天堂影院成人在线观看| 国产精品日韩av在线免费观看| 成人永久免费在线观看视频| 久久久久九九精品影院| 国产男靠女视频免费网站| 精品久久久久久成人av| 国产成人福利小说| 欧美日韩瑟瑟在线播放| 国产淫片久久久久久久久 | 国产伦一二天堂av在线观看| 性色avwww在线观看| 亚洲av成人不卡在线观看播放网| 亚洲精品乱码久久久v下载方式 | 亚洲人成伊人成综合网2020| 久久婷婷人人爽人人干人人爱| 丁香六月欧美| 最近最新中文字幕大全免费视频| 999精品在线视频| 国产单亲对白刺激| 亚洲18禁久久av| 国产免费男女视频| 成年人黄色毛片网站| 亚洲精品在线观看二区| 国产人伦9x9x在线观看| 听说在线观看完整版免费高清| 欧美不卡视频在线免费观看| 可以在线观看的亚洲视频| 少妇丰满av| 一级毛片精品| 欧美黑人巨大hd| 男人舔女人的私密视频| 日本三级黄在线观看| 亚洲精品美女久久av网站| 欧美乱码精品一区二区三区| 在线观看午夜福利视频| 男女午夜视频在线观看| 男女那种视频在线观看| 一个人免费在线观看电影 | 夜夜夜夜夜久久久久| 国产精品一及| 亚洲专区字幕在线| 久久午夜亚洲精品久久| www日本黄色视频网| 免费观看精品视频网站| 亚洲精品中文字幕一二三四区| 色哟哟哟哟哟哟| 人妻久久中文字幕网| 床上黄色一级片| 成年版毛片免费区| 99久久国产精品久久久| 国产精品久久久久久精品电影| 亚洲在线观看片| 欧美成人性av电影在线观看| 国产高潮美女av| 网址你懂的国产日韩在线| 欧美日韩一级在线毛片| 国产精品av视频在线免费观看| 少妇的逼水好多| 亚洲五月天丁香| ponron亚洲| 久久伊人香网站| 亚洲狠狠婷婷综合久久图片| 中文亚洲av片在线观看爽| 成人鲁丝片一二三区免费| 亚洲18禁久久av| 亚洲国产精品合色在线| 亚洲人与动物交配视频| 亚洲激情在线av| 中文资源天堂在线| 两性夫妻黄色片| 日韩 欧美 亚洲 中文字幕| 窝窝影院91人妻| 精品免费久久久久久久清纯| 身体一侧抽搐| 亚洲欧美精品综合久久99| 久久香蕉国产精品| 国语自产精品视频在线第100页| 在线免费观看不下载黄p国产 | 人人妻人人看人人澡| 这个男人来自地球电影免费观看| 久久国产乱子伦精品免费另类| 啦啦啦观看免费观看视频高清| 亚洲七黄色美女视频| 日韩免费av在线播放| 国产av一区在线观看免费| 国内毛片毛片毛片毛片毛片| 三级国产精品欧美在线观看 | 日韩三级视频一区二区三区| 国产精品98久久久久久宅男小说| av片东京热男人的天堂| 五月玫瑰六月丁香| 白带黄色成豆腐渣| 在线看三级毛片| 黄片小视频在线播放| www日本在线高清视频| 成人av在线播放网站| 丰满的人妻完整版| 老司机深夜福利视频在线观看| 99精品久久久久人妻精品| 国产精品久久久人人做人人爽| 无限看片的www在线观看| 在线观看日韩欧美| 国产欧美日韩一区二区三| 又黄又粗又硬又大视频| 精品熟女少妇八av免费久了| 久久天堂一区二区三区四区| 亚洲va日本ⅴa欧美va伊人久久| 国产精品美女特级片免费视频播放器 | 桃色一区二区三区在线观看| 天堂√8在线中文| 老司机在亚洲福利影院| 成年免费大片在线观看| 床上黄色一级片| 亚洲人成网站在线播放欧美日韩| 亚洲第一欧美日韩一区二区三区| 欧美日韩中文字幕国产精品一区二区三区| 日本熟妇午夜| 青草久久国产| 午夜免费成人在线视频| 国产成人啪精品午夜网站|