• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantum Private Comparison of Equality Based on Five-Particle Cluster State?

    2016-05-09 09:20:06YanChang昌燕WenBoZhang張文博ShiBinZhang張仕斌HaiChunWang王海春LiLiYan閆麗麗GuiHuaHan韓桂華ZhiWeiSheng盛志偉YuanYuanHuang黃源源WangSuo索望andJinXinXiong熊金鑫
    Communications in Theoretical Physics 2016年12期
    關(guān)鍵詞:鴻門宴思維能力語言

    Yan Chang(昌燕),Wen-Bo Zhang(張文博),Shi-Bin Zhang(張仕斌),Hai-Chun Wang(王海春), Li-Li Yan(閆麗麗),Gui-Hua Han(韓桂華),Zhi-Wei Sheng(盛志偉),Yuan-Yuan Huang(黃源源), Wang Suo(索望),and Jin-Xin Xiong(熊金鑫)

    1Department of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China

    2School of Economics,Sichuan University,Chengdu 610065,China

    1 Introduction

    Thesedays,dataandcommunicationsareomnipresent.The problems of security and privacy have come to assume an unprecedented importance.Cryptography is the approach to protect data secrecy in public environment.Both classical cryptography and quantum cryptography can solve the problems of security.However,the latter has shown the advantage of higher security because of the strong security basis assured by physical principles.Therefore,quantum cryptography has attracted a great deal of attentions now.

    In distributed computation,usually,a group of mutually distrustful players want to perform correct and distributed computations without leaking their respective secrets.That is,some users want to compute a function with private input of each party,but in the end only the evaluation result is known and the private input is not exposed.Secure multiparty computing(SMC)is an application for such circumstance.Millionaire problem proposed by Yao[1]is a typical secure two-party computation problem,in which two millionaires wish to know who is richer without revealing the precise amount of their fortunes.Later Boudot et al.[2]extended the problem of the millionaire and proposed a protocol to decide whether two millionaires are equally rich.Imagine that,two millionaires want to know whether they happen to be equally rich,but neither millionaire wants to simply disclose their wealth,which is called the problem of private comparison of equality(PCE),a branch of SMC has attracted much attention these days.However,Lo[3]indicated that the equality function used to determine this cannot be securely evaluated in a two-party scenario.Therefore,some additional assumptions such as a semi-honest third party(TP)should be considered to successfully achieve a private comparison.

    Quantum private comparison of equality(QPCE)is the quantum scheme for PCE problem.In 2009,Yang et al.[4]first proposed QPCE schemes.Later,some QPC protocols based on different states were proposed.[5?18]Chen et al.[5]proposed a QPC protocol by using triplet GHZ(Greenberger–Horne–Zeilinger)states.However,Lin et al.[6]pointed out that one can retrieve other’s secret information by means of intercept-resend attack,[7]because the positions of checking particles or the measurement basis are determined by the participants in the eavesdropping check phase.Moreover,they gave two solutions to avoid this attack,i.e.,they let the third-party determine the positions and the measurement basis.Liu et al.presented QPC protocols based on triplet W states,[8]four-particle χ-Type states entanglement swapping,[9]Bell states[10]and triplet GHZ[11]respectively.The research about QPC in noise setting was first proposed by Li et al.in Refs.[14–15].Huang et al.[16]also considered QPCE protocols under noise environments.The difference of roles about TP was also discussed in Refs.[14,19].Summarily,the QPCE protocols presented previously have a semi-honest TP at least to help the two parties(Alice and Bob)accomplish the comparison.This kind of semi-honest TP is the first kind of TP in Ref.[19],which executes the protocol loyally and records all the results of its intermediate computations but he might try to steal the information from the records.This kind of TP(the first kind)was thought to be unreasonable by Yang et al.[13]They advised that the first kind of TP should be replaced by the implementation of a semi-honest TP(the second kind of TP[19]),which was allowed to misbehave on its own but can not conspire with either of two parties,which was the reasonable assumption for QPCE.In addition,there are also two principles should be satis fied for QPCE protocol.The first is,no matter whether TP will know the position of different bit value in the compared information or not,he/she will not be able to know the actual bit value of the information.The second is,all outsiders and the two players should only know the result of the comparison(i.e.,identical or different),but not the position of the different information.[16]

    In most existing QPCE protocols,only two-user private comparison is implemented simultaneously. Few QPCE protocols compare private information more than two users’simultaneously.Chang et al.[20]proposed a pioneering QPCE protocol for n users which allowed n users’private information to be compared within one protocol execution,where TP was the first kind of semi-honest TP.However,we find that the protocol proposed by Chang et al.is insecure with the second kind of semi-honest TP.If TP measures the particles before he/she distributes them to the users,after the user announces Ci(the result of bitwise adding the secret of the user and a key obtained by measuring the particles TP sent to him)to TP,TP will know the secret of each user without being found.In our protocol, five-particle cluster state is used to implement QPCE scheme.Compared with other existing twouser QPCE protocols,our protocol is more flexible and efficient.Our protocol not only can compare two groups(each group has two private information)in one execution,but also compare just two private information.Compared with Chang’s multi-user protocol,our protocol is secure even with the second kind of semi-honest TP.Furthermore,our protocol can also be generalized to the case of 2N participants with one TP.The 2N-participant protocol can compare two groups(each group has N private information)in one execution or just N private information.

    2 Description of Protocol

    Step 1The third party(TP)randomly prepares some ordered five-particle cluster states inTP measures particle-4 sequence with Z-basis=basis=if he/she preparesand ob-orand “1”denotesBy rotating K right

    on particle-1,particle-2,particle-3,and particle-5 sequence respectively.The rule is that,if the i-th bit of K(K1,K,K1)is“0” (“1”),she performs operation I(U)on the i-th particle-1(particle-2,particle-3,particle-5).

    Step 2TP mixes some detecting photons(random in statesin particle-1,particle-2,particle-3 and particle-5 sequence respectively.Then TP sends particle-1 sequence to Alice,particle-2 sequence to Bob,particle-3 sequence to Charlie and particle-5 sequence to Dick.TP retains particle-4 sequence.After confirming that Alice,Bob,Charlie and Dick have received particles successfully,TP executes the first eavesdropping check process.TP announces the bases and positions of detecting photons.Alice,Bob,Charlie and Dick extract detecting photons and measure them.By comparing the initialstates and the measurement results of these particles,they can judge whether the channel between them is secure.If there is eavesdropper,they terminate the protocol;otherwise they go on the protocol.

    Step 3To resist TP’s malicious behavior,Alice,Bob,Charlie and Dick execute the second eavesdropping check process.The detail is as follows.TP announces the initial states he/she preparedAlice(Bob,Charlie or Dick)chooses randomly some particles from particle-1 sequence(particle-2,particle-3,or particle-5 sequence).If the initial state isAlice(Bob,Charlie or Dick)measures the particle in X-basis;otherwise she(he)measures the particle in Z-basis.Alice(Bob,Charlie or Dick)informs the other participants the positions of the detecting particles and bases.The other participants measure the corresponding particles in their quantum sequence in the same bases.Finally,all the participants present their measurement outcomes to check the quantum channels.If their results are in one of the eight forms|0000>,|0011>,they think the channels are safe;Otherwise they discard these entangled particles and abort the protocol.Notice that,although in step 1,TP performs operation I(U)on particle-1(particle-2,particle-3,particle-5)sequence according to K,K1,K,K1,the individual measurement results of particles 1,2,3,5 in Z-basis or X-basis are still in one of the above eight forms.

    Step 4Alice,Bob,Charlie and Dick measure the rest particles respectively,if the initial state isthey use Z-basis(X-basis).By measuring their particle sequences with Z-basis or X-basis,Alice,Bob,Charlie and Dick get binary key KA,KB,KC,and KDrespectively(the rule is that“0”denotesand “1” denotesEspecially,KA,KB,KC,and KDare real random number;TP can not infer KA,KB,KC,and KDbased on the measurement result of particle-4 sequence;Alice,Bob,Charlie and Dick can not infer others’keys according to their own keys.

    Step 5Suppose that the secrets of Alice,Bob,Charlie and Dick are XA,XB,XC,and XDrespectively.Alice,Bob,Charlie and Dick compute XA⊕KA,XB⊕KB,XC⊕KC,and XD⊕KD,and getandrespectively.

    Step 6Alice,Bob,Charlie and Dick announceandrespectively.TP compares the equality of their private information flexibly.TP can compare the equality of two private information XAand XBor XCand XDsimultaneously.

    The detailed process is described next.

    (i)Compare the equality of XAand XB

    Here,r1denotes the measurement result of particle 1 and particle 2 in the originalstate. Because TP knows K1and K,TP obtains XB⊕XA=K1⊕K.If XB⊕XA=0,TP knows XB=XA.

    (ii)Compare the equality of XCand XD

    Here,r2denotes the measurement result of particle 3 and particle 5 in the originalstate. Because TP knows K1and K,TP obtains XC⊕XD=If XC⊕XD=0,TP knows XC=XD.

    Step 7TP publishes the comparison results to the users.

    3 Security Analysis

    3.1 TP’s Attack

    TP is assumed to be semi-honest,that is TP will not conspire with any other one.Therefore,we consider only the situation that TP performs attacks on his/her own.The possible attack TP may perform is that TP measures each particle before he/she sends them to Alice,Bob,Charlie and Dick.By doing so,TP can obtain KA,KB,KC,and KD.However,TP’s malicious behavior will be found in the second eavesdropping check process(Step 3).Therefore,even if TP is the second kind of semi-honest TP,TP can not obtain the secrets of the participants.

    3.2 Conspiracy Attack Among Participants

    Next,we verify the security of our protocol when any three users colluding together.Here,we take Alice colluding with Charlie and Dick for example.

    For simple,we only consider a transmission from TP to Alice,Bob,Charlie and Dick with only fourorstates.KAis denoted as ka1,ka2,ka3,ka4.KBis denoted as kb1,kb2,kb3,kb4.KCis denoted as kc1,kc2,kc3,kc4.KDis denoted as kd1,kd2,kd3,kd4.K is denoted as x1,x2,x3,x4.Then,K1is denoted as x4,x1,x2,x3.We use ra1,ra2,ra3,ra4to denote the measurement results of particle 1 and particle 2 in the originalorstates;rc1,rc2,rc3,rc4to denote the measurement results of particle 3 and particle 5 in the originalorstates.We have:

    According to Eq.(6),if Charlie tells Dick about kc1⊕kc2and kc2⊕kc3;Dick tells Charlie about kd1⊕kd2and kd2⊕kd3,Charlie and Dick can calculate x3⊕x1and x4⊕x2.

    Our protocol is also secure when any two users colluding together.Next,we analyze the security about colluding between any two users.

    If Alice colludes with Bob,Alice or Bob may want to know K,so that which can help them to obtain Charlie’s and Dick’s secret.In this case,Alice and Bob may exchange each other some information about KAand KB,which will not leak the secrets of themselves.If Alice tells Bob ka1⊕ka2(ka2⊕ka3)and Bob tells Alice kb1⊕kb2(kb2⊕kb3),Alice and Bob know x1⊕x3(x2⊕x4),as is shown follows.

    Alice can calculate as follows:

    Bob can calculate as follows:

    From Eq.(8),we can see that except x1⊕x3and x2⊕x4,no more information about K can be obtained by Alice and Bob.From Eqs.(8)–(10),we find that Alice and Bob can not know any secret if they collude together.The same thing goes for Charlie and Dick.

    As for cross group conspiracy,we take Alice colluding with Charlie for example to illustrate that the participants can not obtain any secret through cross group conspiracy.Alice and Charlie aim to obtain K by colluding with each other,however,they will not be at the expense of revealing their secrets.Therefore,Alice may tell Charlie about ka1⊕ka2⊕ka3,and Charlie may tell Alice about kc1⊕kc2⊕kc3,then by calculating Alice knows rc1⊕rc2⊕rc3,as is shown follows:

    Similarly,Charlie knows ra1⊕ra2⊕ra3.we find that Alice and Charlie can not know any secret if they collude together.The same thing goes for Bob and Dick.

    3.3 Individual Attacks of Participants

    Individual attack means performing attack by their own without conspiring with others.

    We denote K =k1,k2,...,ki,...,kn,then K1=kn,k1,...,ki?1,...,kn?1. To simplify the description,we suppose kiki?1=01 and the i-th state=1/2After TP performs operation I(U)on particle-1(particle-2,particle-3,particle-5)sequence according to K,K1,K,and K1respectively,the i-th statechanges to state=1/2TP sends particle-1 sequence to Alice,particle-2 sequence to Bob,particle-3 sequence to Charlie and particle-5 sequence to Dick.The reduced density matrix[21?22]of Alice’s,Bob’s,Charlie’s and Dick’s photon are the same:

    That is,the reduced density matrix of each particle is completely the same and maximally mixed,therefore none participants can deduce the secrets of others by comparing the reduced density matrix of the particles their own between the initial states.

    Furthermore,Bob(Alice)can not perform individual attack although he(she)knowsbecause he(she)does not know KA(KB).If Bob(Alice)intercepts and measures particles when TP sends particle-1 sequence(particle-2 sequence)to Alice(Bob),because the bases and positions of detecting photons in each particle sequence are controlled by TP,he(she)will be found by Alice(Bob)in eavesdropping detection,and the protocol will be stopped.The same thing goes for Charlie and Dick.

    Although all the participants knowand,they can not deduce the secrets of others.They may attempt to find something by some calculating:

    If CCA=CADor CBC=CDB,

    From Eqs.(17)and(18)we find that,by deducing Alice,Bob,Charlie and Dick can only know the specific relations between XAand XBor XCand XD,under some specific conditions,such as CCA=CCB,CDA=CDB,CCA=CADand CBC=CDB.Although K,K1exist rotating right relation,without one of them anyone can not know the other.In our protocol,K,K1are known by TP only.Therefore,by deducing with known informationno one can deduce the secret of others.

    3.4 Outside Attack

    The outside eavesdropper Eve can not get the secret of the participants.Firstly,if Eve intercepts and measures particles when TP distributes particle sequences to the participants,Eve will be found by them in eavesdropping detection.Therefore,Eve can not get KA,KB,KCor KD.Secondly,Eve can not obtain any useful information from,,and,because KA,KB,KC,and KDare all real random numbers,andare the results of one-time pad ofandrespectively.

    3.5 Efficiency Comparison

    To estimate the efficiency of private comparison,we define the qubit efficiency as η=c/t,where c denotes the classical bits that can be compared,and t denotes the total particles transmitted for comparison.To simplify the computation,we suppose that n users want to do the equality comparisons with m-bit classical messages,TP uses l detecting photons to check the presence of eavesdropping for a communication between TP and each user,and each user uses l detecting photons to check the eavesdropping of TP.In Table 1,we compare the efficiency of the proposed protocol with Yang et al.’s[4]and Chang et al.’s[20]protocols.

    Table 1 The comparison of our protocol to the other QPCE protocols.

    In Yang et al.’s scheme,in order to complete the equality comparison with n users,TP has to execute the same protocol[n?1,n(n?1)/2]times,where n?1 denotes the optimal case that all users’information are the same,and n(n ? 1)/2 denotes the worst case that each user’s information is different from the others’.In Yang et al.’s protocol,to do the equality comparison with m-bit classical messages one time,TP needs to transmit(m+l)/2 Bell states and l single particles for detecting outsider eavesdropper(totally transmitting(m+2l)particles),in which the m/2 Bell states used to encode secret information,and the other l/2 Bell states used to check the honesty of TP.Because after the users encode secret information on particles they need to transmit them back to TP,the users need to transmit 2(m+2l)particles totally.Since the roundtrip strategy(the same particles are sent back and forth)for particle transmission has been adopted in their scheme,extra filters such as single photon detectors and the photon number splitter(PNS)have to be used to avoid the Trojan horse attacks.If we assume that the number of the transmitted particles used to detect the delayed photons caused by Trojan horse attack is the same as that used to encode secret information,the total particles need to be transmitted are 4(m+l).Therefore,to do the equality comparisonswith m-bit classical messages with n users,the qubit efficiency is:m/4(m+l)(n?1)w 2m/4n(m+l)(n?1).

    In Chang et al.’s scheme,to compare the private information of n users simultaneously(within one execution),TP needs to prepare m n-particle GHZ states or GHZ class states and n×l decoy particles.The total particles need to be transmitted is n(m+l).Therefore,to do the equality comparisons with m-bit classical messages with n users,the qubit efficiency is:m/n(m+l).However,TP may know the privacy of each user,if he/she measures the particles before he/she transmits them to each user.That is,Chang et al.’s scheme is insecure for the second kind of semi-honest TP.

    In our protocol,only two kinds of statesneed to be prepared in the whole process.In Step 3 Alice,Bob,Charlie,and Dick execute the second eavesdropping check process,which protects the privacy of each user from being known by TP,especially the second kind of semihonest TP.Furthermore our protocol can compare two pairs of private information simultaneously or just two private information.Therefore,our protocol is more flexible and efficient than Yang et al.’s[4]protocol,and more secure than Chang et al.’s[20]protocol.Furthermore,in order to complete the equality comparison with n users,TP has to execute the same protocol[(n?1)/2,n(n?1)/4]times,where(n?1)/2 denotes the optimal case that all users’information are the same,and n(n ?1)/4 denotes the worst case that each user’s information is different from the others’.In our protocol,to do the equality comparison with m-bit classical messages one time,TP needs to prepare m+l five-particle cluster statesin which the m five-particle cluster states used to generate secure KA,KB,KC,and KD,and the other l five-particle cluster states used to check the honesty of TP;at the same time to check the outsider eavesdropper,TP needs to prepare another 4l single particles random in stateTherefore,in one execution,5m+9l particles need to be transmitted.To compare the equality with n users,particles need to be transmitted.Therefore,to do the equality comparisons with m-bit classical messages with n users,the qubit efficiency is:

    For the aspect of qubit efficiency,

    學(xué)生思維發(fā)展能力的培育,可以通過多種形式進行,比如寫作、閱讀、實踐活動等,在語言的綜合運用當(dāng)中,學(xué)生的思維能力能夠得到有效發(fā)展。比如在進行《鴻門宴》的教學(xué)過程中,由于其中人物特色鮮明,故事情節(jié)生動緊張,非常有助于學(xué)生綜合思維能力的培養(yǎng)。因此,可以采用讓學(xué)生扮演角色的方式進行“鴻門宴”的重現(xiàn)。在此過程中,教師可以根據(jù)學(xué)生的學(xué)習(xí)水平和特點進行角色分派,在表現(xiàn)劉邦、項羽、樊噲、項莊等人的語言、神態(tài)的過程中,能夠加強學(xué)生語言的運用能力,促進思維發(fā)展能力的提升。

    when 3m>l.Generally speaking,the number of detecting particles will not exceed three times of encoding particles,thus 3m>l is satis fied.Therefore,our protocol has better qubit efficiency than Yang et al.’s[4]protocol(m/4(m+l)(n?1)~ 2m/4n(m+l)(n?1)).Still,we have a higher quantum state generation cost compared with Yang et al.’s protocol.In Yang et al.’s protocol,Bell states need to be generated.However,in our protocol,five-particle cluster states need to be prepared,which is more difficult than the preparing of Bell state.

    4 Discussion

    4.1 The Protocol in Practical Conditions

    Next we make some discussions about the protocol in practical conditions with noises.Here we give a solution using error correcting code.[14,23]

    Suppose that the secrets of Alice,Bob,Charlie and Dick are XA,XB,XC,and XDrespectively,where XA=

    Alice,Bob,Charlie,Dick and TP select the[n,s]errorcorrecting code[24]which uses n bits codeword to encode s bits word using generator matrix G(xs)and can correct t codeword error bits with the error-correcting function D(yn).

    In Step 4,Alice chooses a bits wordand calculates the corresponding bits codeword

    In Step 5,Bob chooses a bits word RB= (,,...,)and calculates the corresponding bits codewordi.e.,

    In Step 6,TP obtains bit stringby calculatingHere,kianddenote the i-th bit of K and K1respectively.Then TP uses the check matrix H of the[n,s]errorcorrecting code to check whether the number of error bits exceeds the threshold t.If it does,TP aborts the protocol and restarts from Step 1.Otherwise,he obtains s bits string RTby decoding WTwith error-correcting functionD(WT)=WT·D.He obtainsby calculatingIf there is at least one bit is different between RTand,TP announcesOtherwise,he announces XA=XB.

    In ideal condition,

    Here,r1denotes the measurement results of particle 1 and particle 2 in the originalstate.

    In practical scenario,noise might appear in all of quantum preparation setups,quantum channel and measurement equipment. We denote the noise appear in the courses of obtaining K as O=(o1,o2,...,on),where oi=0 or 1 representing error is existent or not in ki.So TP obtains bit string K?andas

    where O1=(on,o1,...,on?1).

    From Eq.(26),we find that the present protocol is correct in practical scenario when noise has not exceeded the used ECC’s ability.

    Charlie and Dick do the similar thing with Alice and Bob.Charlie announces PCand QCto TP.Dick announces PDand QDto TP.

    4.2 Generalizing Protocol to 2N Participants with One TP

    Our protocol can also be generalized to the case of 2N participants with one TP by employing cluster states similar as Eqs.(1)and(2).Here,to simplify the description,we take the case of 6 participants with one TP as an example to introduce the generalization of the protocol.

    In Step 1,TP prepares seven-particle cluster stateswhere

    In Step 2,TP measures particle-7 sequence with Z-basis=or X-basis=according to the state he/she prepares(|Ψ7>or|Φ7>)and obtains binary sequence K.By rotating K right with 3 and 5 bits,TP obtains K3and K5respectively.For example,if K=000001,after rotating K right with 3 bit,TP obtains K3=001000;after rotating K right with 5 bit,TP obtains K5=000010.Then,according to K,K3,K5,K,K3,K5,TP performs one of the two unitary operations I or U on particle-1,particle-2,particle-3,particle-4,particle-5,and particle-6 sequence respectively.The rule is that,if K(K3,K5,K,K3,K5)is “0” (“1”),she performs operation I(U)on particle-1(particle-2,particle-3,particle-4,particle-5,particle-6)sequence.

    TP sends particle-1 sequence to Alice,particle-2 sequence to Bob,particle-3 sequence to Charlie,particle-4 sequence to Dick,particle-5 sequence to Tom,particle-6 sequence to Frank.TP retains particle-7 sequence.

    In Step 4,by measuring their particle sequences with Z-basis or X-basis,Alice,Bob,Charlie,Dick,Tom and Frank get binary key KA,KB,KC,KD,KT,KFrespectively.

    In Step 5,suppose that the secrets of Alice,Bob,Charlie,Dick,Tom,and Frank are XA,XB,XC,XD,XT,XFrespectively.Alice,Bob,Charlie,Dick,Tom and Frank compute XA⊕KA,XB⊕KB,XC⊕KC,XD⊕KD,XT⊕KT,XF⊕KF,and getandrespectively.

    In Step 6,Alice,Bob,Charlie,Dick,Tom,and Frank announcerespectively.TP compares the equality of their private information flexibly.TP can compare the equality of two group of three private information XA,XB,and XCor XD,XT,and XFsimultaneously.

    Next we describe the process of comparing the equality of XA,XB,and XC.

    Here,r1denotes the measurement results of particle 1,particle 2 and particle 3 in the originalstate.Because TP knows K,K3,and K5,TP obtains

    The process of comparing the equality of XD,XT,and XFis similar with the process of comparing the equality of XA,XB,and XC,we will not repeat them here.

    As for the security analysis of generalizing protocol to 6 participants with one TP,because the analysis of TP’s attack,individual attacks of participants and outside attack are all similar with those in the case with 4 participants,we will not repeat them here.

    We mainly introduce the analysis of conspiracy attack among participants.For simple,we only consider a transmission from TP to Alice,Bob,Charlie,Dick,Tom and Frank with only sixstates.K is denoted as x1,x2,x3,x4,x5,x6.We can easily obtain that:if Alice colludes with Bob,neither of them can obtain more useful information to deduce others’secret;if Alice colludes with Charlie,they can obtain x3⊕x1,x5⊕x1,x4⊕x6,x5⊕x3,x2⊕x4,however these data contribute nothing to deduce Bob’s secret;if Bob colludes with Charlie,they can obtain x2⊕x6,x3⊕x1,x5⊕x3,x2⊕x4,which contributes nothing to to deduce Alice’s secret.The cases that Dick,Tom and Frank collude each other are similar with Alice,Bob and Charlie,we will not repeat them here.

    Obviously,in the 6-participant protocol,TP can compare the equality of two groups in one execution,each group has three private information XA,XBand XCor XD,XT,and XF.If the protocol is generalized to the case of 2N participants with one TP by employing(2N+1)-particle cluster states,the protocol can compare two groups(each group has N private information)in one execution.

    5 Conclusion

    We put forward a secure and flexible QPCE protocol based on five-particle cluster states.Our protocols have the following merits.Firstly,by utilizing five-particle cluster states and quantum one-time pad our protocol can not only compare two pairs of private information simultaneously,but also compare just two private information,therefore,our protocol is flexible and efficient.Secondly,the security of our protocol is guaranteed by laws of quantum mechanics and quantum one-time pad.Thirdly,our protocol has the more reasonable assumptions about TP(the second kind of TP).[19]Our protocol has bigger qubit efficiency than Yang et al.’s[4]protocol,but a higher quantum state generation cost,because five-particle cluster state is more difficult to prepare than Bell state.Furthermore,our protocol can also be generalized to the case of 2N participants with one TP by employing(2N+1)-particle cluster states similar as Eqs.(1)and(2).The 2N-participant protocol can compare two groups(each group has N private information)in one execution.

    [1]C.Yao,in Proc.of 23rd IEEE Symposium on Foundations of Computer Science,Chicago(1982)160.

    [2]F.Boudot,B.Schoenmakers,and J.Traore,Discrete Appl.Math.23(2001)111.

    [3]H.K.Lo,Phys.Rev.A 56(1997)1154.

    [4]Y.G.Yang and Q.Y.Wen,J.Phys.A:Math.Theor.42(2009)055305.

    [5]X.B.Chen,G.Xu,X.X.Niu,Q.Y.Wen,and Y.X.Yang,Opt.Commun.283(2010)1561.

    [6]J.Lin,H.Y.Tseng,and T.Hwang,Opt.Commun.284(2011)2412.

    [7]F.Gao,F.Z.Guo,Q.Y.Wen,and F.C.Zhu,Phys.Rev.Lett.101(2008)208901.

    [8]W.Liu,Y.B.Wang,and Z.T.Jiang,Opt.Commun.284(2011)3160.

    [9]W.Liu,Y.B.Wang,Z.T.Jiang,and Y.Z.Cao,Int.J.Theor.Phys.51(2012)69.

    [10]W.Liu,Y.B.Wang,and W.Cui,Commun.Theor.Phys.57(2012)583.

    [11]W.Liu and Y.B.Wang,Int.J.Theor.Phys.51(2012)3596.

    [12]Y.B.Li,S.J.Qin,Z.Yuan,W.Huang,and S.Ying,Quantum Inf.Process 12(2013)2191.

    [13]Y.G.Yang,J.Xia,and X.Jia,Quantum Inf.Process 12(2013)877.

    [14]Y.B.Li,S.J.Qin,Z.Yuan,W.Huang,and Y.Sun,Quantum Inf.Process 12(2013)2191.

    [15]Y.B.Li,T.Y.Wang,H.Y.Chen,M.D.Li,and Y.T.Yang,Int.J.Theor.Phys.52(2013)2818.

    [16]W.Huang,Q.Y.Wen,B.Liu,F.Gao,and Y.Sun,Sci.G-Phys.Meth.Astron.56(2013)1670.

    [17]S.Lin,Y.Sun,X.F.Liu,and Z.Q.Yao,Quantum Inf.Process 12(2013)559.

    [18]W.J.Liu,C.Liu,H.B.Wang,and T.T.Jia,IETE Tech.Rev.30(2013)439.

    [19]W.W.Zhang and K.J.Zhang,Quant.Inf.Process 12(2013)1981.

    [20]Y.J.Chang,C.W.Tsai,and T.Hwang,Quant.Inf.Process 12(2013)1077.

    [21]Y.B.Li,Q.Y.Wen,F.Gao,H.Y.Jia,and Y.Sun,European Phys.J.D 66(2012)110.

    [22]Y.B.Li,Q.Y.Wen,Z.C.Li,S.J.Qin,and Y.T.Yang,Quant.Inf.Processing 13(2014)141.

    [23]Y.B.Li,Y.J.Ma,S.W.Xu,W.Huang,and Y.S.Zhang,Int.J.Theor.Phys.53(2014)3191.

    [24]F.J.MacWilliams and N.J.A.Sloane,Mathematical Lib,North-Holland Publlishing Company,North-Holland(1977).

    猜你喜歡
    鴻門宴思維能力語言
    培養(yǎng)思維能力
    語言是刀
    文苑(2020年4期)2020-05-30 12:35:30
    培養(yǎng)思維能力
    培養(yǎng)思維能力
    兒童繪本(2018年19期)2018-10-31 21:02:34
    培養(yǎng)思維能力
    兒童繪本(2018年9期)2018-06-04 16:40:12
    讓語言描寫搖曳多姿
    鴻門宴(二)
    鴻門宴(一)
    累積動態(tài)分析下的同聲傳譯語言壓縮
    我有我語言
    18禁裸乳无遮挡免费网站照片| 久99久视频精品免费| 偷拍熟女少妇极品色| 国产视频一区二区在线看| 日本撒尿小便嘘嘘汇集6| 亚洲七黄色美女视频| 日韩欧美免费精品| АⅤ资源中文在线天堂| 久久天躁狠狠躁夜夜2o2o| 此物有八面人人有两片| 成人三级做爰电影| 视频区欧美日本亚洲| 国内少妇人妻偷人精品xxx网站 | 亚洲色图 男人天堂 中文字幕| 精品乱码久久久久久99久播| 日韩国内少妇激情av| 两个人看的免费小视频| 成人亚洲精品av一区二区| 国产成人欧美在线观看| 看片在线看免费视频| 国产精品一区二区精品视频观看| 男人舔奶头视频| 巨乳人妻的诱惑在线观看| 午夜免费观看网址| 91av网站免费观看| 精品一区二区三区视频在线 | 免费大片18禁| 亚洲av电影在线进入| 99国产精品一区二区三区| 九色成人免费人妻av| 亚洲国产精品合色在线| 88av欧美| а√天堂www在线а√下载| 国产伦精品一区二区三区视频9 | 免费看美女性在线毛片视频| 97人妻精品一区二区三区麻豆| 中文亚洲av片在线观看爽| 国产熟女xx| 国产成人精品久久二区二区免费| 日韩欧美国产在线观看| 成年人黄色毛片网站| 哪里可以看免费的av片| 国产av在哪里看| 老熟妇乱子伦视频在线观看| 人妻丰满熟妇av一区二区三区| 美女 人体艺术 gogo| 欧美激情在线99| 国产欧美日韩精品亚洲av| 国产又色又爽无遮挡免费看| 午夜福利高清视频| 三级男女做爰猛烈吃奶摸视频| 国产精品久久电影中文字幕| 69av精品久久久久久| 欧美黄色片欧美黄色片| 欧美av亚洲av综合av国产av| 免费在线观看影片大全网站| 欧美乱色亚洲激情| 欧美中文综合在线视频| 亚洲欧美日韩高清专用| 国产一区二区激情短视频| 男女做爰动态图高潮gif福利片| 999精品在线视频| 国产亚洲精品久久久久久毛片| 伊人久久大香线蕉亚洲五| 草草在线视频免费看| 亚洲国产欧美人成| 国产av不卡久久| 国产午夜精品久久久久久| 亚洲av熟女| av女优亚洲男人天堂 | 国内少妇人妻偷人精品xxx网站 | 国产97色在线日韩免费| 在线播放国产精品三级| 色综合婷婷激情| 亚洲专区国产一区二区| 日韩欧美国产一区二区入口| 99久久精品热视频| 亚洲性夜色夜夜综合| 99riav亚洲国产免费| 三级毛片av免费| av黄色大香蕉| 韩国av一区二区三区四区| 黑人巨大精品欧美一区二区mp4| 97碰自拍视频| 免费看a级黄色片| 好男人在线观看高清免费视频| 99在线视频只有这里精品首页| 成熟少妇高潮喷水视频| 黄色丝袜av网址大全| 中文字幕最新亚洲高清| 老司机深夜福利视频在线观看| 少妇熟女aⅴ在线视频| 岛国在线观看网站| 国产亚洲精品久久久久久毛片| 757午夜福利合集在线观看| 黑人欧美特级aaaaaa片| 国产精品 欧美亚洲| 天堂网av新在线| 国产v大片淫在线免费观看| 精品日产1卡2卡| 亚洲人成网站高清观看| 9191精品国产免费久久| 九色国产91popny在线| 别揉我奶头~嗯~啊~动态视频| 啪啪无遮挡十八禁网站| 18美女黄网站色大片免费观看| 久久中文字幕一级| 嫩草影院精品99| 成人特级av手机在线观看| 国产高清激情床上av| 18禁国产床啪视频网站| 久久精品aⅴ一区二区三区四区| 99视频精品全部免费 在线 | 国产 一区 欧美 日韩| 黄片大片在线免费观看| 免费在线观看亚洲国产| 色综合站精品国产| 十八禁网站免费在线| 国产真人三级小视频在线观看| 此物有八面人人有两片| 精品电影一区二区在线| 人人妻人人澡欧美一区二区| 老熟妇仑乱视频hdxx| 日韩欧美三级三区| 亚洲欧美日韩卡通动漫| 日本撒尿小便嘘嘘汇集6| 免费一级毛片在线播放高清视频| 岛国在线观看网站| 免费在线观看影片大全网站| 深夜精品福利| 国产高清有码在线观看视频| 男人舔女人下体高潮全视频| 制服丝袜大香蕉在线| 亚洲中文字幕日韩| 天堂av国产一区二区熟女人妻| 欧美成人免费av一区二区三区| 制服丝袜大香蕉在线| 亚洲,欧美精品.| 免费电影在线观看免费观看| 久久久久久大精品| 后天国语完整版免费观看| 真实男女啪啪啪动态图| 少妇熟女aⅴ在线视频| 此物有八面人人有两片| 长腿黑丝高跟| 美女cb高潮喷水在线观看 | 手机成人av网站| 精品人妻1区二区| 88av欧美| 性色avwww在线观看| 亚洲avbb在线观看| 成人高潮视频无遮挡免费网站| 午夜免费成人在线视频| 哪里可以看免费的av片| 亚洲成av人片免费观看| 国产aⅴ精品一区二区三区波| h日本视频在线播放| 男女午夜视频在线观看| 欧美性猛交╳xxx乱大交人| 在线观看日韩欧美| 亚洲天堂国产精品一区在线| 亚洲午夜精品一区,二区,三区| 人人妻人人澡欧美一区二区| 欧美性猛交黑人性爽| 成年人黄色毛片网站| 中文字幕最新亚洲高清| av天堂中文字幕网| 欧美日本亚洲视频在线播放| 国产精品日韩av在线免费观看| 两性夫妻黄色片| 最近最新中文字幕大全电影3| 国产乱人伦免费视频| 日本 av在线| 黄色视频,在线免费观看| 一级作爱视频免费观看| 久久国产精品人妻蜜桃| 熟妇人妻久久中文字幕3abv| 黄色女人牲交| 男女视频在线观看网站免费| 精品久久久久久成人av| 国产精品国产高清国产av| 久久精品国产清高在天天线| a在线观看视频网站| 高清在线国产一区| 欧美日韩瑟瑟在线播放| 国产欧美日韩一区二区三| 在线观看午夜福利视频| 欧美色视频一区免费| a级毛片在线看网站| 大型黄色视频在线免费观看| a在线观看视频网站| 操出白浆在线播放| 色视频www国产| 亚洲欧洲精品一区二区精品久久久| 啦啦啦观看免费观看视频高清| 亚洲欧美激情综合另类| 久久久久性生活片| 久久久久性生活片| 黄色片一级片一级黄色片| 久久这里只有精品19| 免费在线观看成人毛片| 一个人观看的视频www高清免费观看 | 亚洲午夜精品一区,二区,三区| 全区人妻精品视频| 一区福利在线观看| 亚洲国产欧美一区二区综合| 黑人欧美特级aaaaaa片| 午夜视频精品福利| 美女黄网站色视频| 一本一本综合久久| 天堂av国产一区二区熟女人妻| 1000部很黄的大片| 亚洲精品中文字幕一二三四区| 性欧美人与动物交配| 久久久久免费精品人妻一区二区| 久久精品人妻少妇| 久久久久久大精品| 一个人观看的视频www高清免费观看 | 日韩国内少妇激情av| 久久午夜综合久久蜜桃| 黑人欧美特级aaaaaa片| 国产在线精品亚洲第一网站| 亚洲国产精品合色在线| 国产免费av片在线观看野外av| 天天躁日日操中文字幕| 亚洲天堂国产精品一区在线| 老汉色∧v一级毛片| 亚洲精品美女久久久久99蜜臀| 好男人在线观看高清免费视频| 成熟少妇高潮喷水视频| 麻豆成人av在线观看| 免费电影在线观看免费观看| 国产亚洲精品久久久com| 国产精品野战在线观看| 黄色日韩在线| 国产伦精品一区二区三区视频9 | 亚洲精品粉嫩美女一区| 99精品久久久久人妻精品| 91麻豆av在线| 不卡av一区二区三区| 男女午夜视频在线观看| 在线观看美女被高潮喷水网站 | 亚洲自偷自拍图片 自拍| 97人妻精品一区二区三区麻豆| 亚洲精品国产精品久久久不卡| 91麻豆精品激情在线观看国产| 欧美色视频一区免费| 成人午夜高清在线视频| 国产三级黄色录像| 哪里可以看免费的av片| 床上黄色一级片| 久久久色成人| 制服丝袜大香蕉在线| 欧美色视频一区免费| 亚洲国产中文字幕在线视频| 脱女人内裤的视频| 亚洲欧美精品综合一区二区三区| 亚洲精品在线观看二区| a级毛片在线看网站| 中文在线观看免费www的网站| 在线a可以看的网站| 此物有八面人人有两片| 亚洲无线在线观看| 国产91精品成人一区二区三区| 一区福利在线观看| 国产精品久久久av美女十八| 亚洲专区中文字幕在线| 九九久久精品国产亚洲av麻豆 | 最新美女视频免费是黄的| 亚洲 欧美一区二区三区| 老司机深夜福利视频在线观看| 欧美日韩黄片免| 午夜福利在线观看吧| 夜夜爽天天搞| 亚洲精品粉嫩美女一区| 欧美午夜高清在线| 少妇裸体淫交视频免费看高清| 久久天躁狠狠躁夜夜2o2o| 成年女人毛片免费观看观看9| 亚洲人成伊人成综合网2020| 国产成人精品久久二区二区91| 淫秽高清视频在线观看| 国产又色又爽无遮挡免费看| 每晚都被弄得嗷嗷叫到高潮| 精品一区二区三区av网在线观看| 色综合欧美亚洲国产小说| 国产激情偷乱视频一区二区| 精品不卡国产一区二区三区| 亚洲自拍偷在线| 欧美日韩中文字幕国产精品一区二区三区| 一级作爱视频免费观看| 啦啦啦观看免费观看视频高清| 亚洲乱码一区二区免费版| 精品久久久久久久末码| 午夜精品一区二区三区免费看| 国产精品久久久av美女十八| 精品一区二区三区四区五区乱码| 免费在线观看影片大全网站| 十八禁人妻一区二区| 亚洲最大成人中文| 国产精品av久久久久免费| 怎么达到女性高潮| 他把我摸到了高潮在线观看| 欧美成人免费av一区二区三区| 免费看a级黄色片| 亚洲成人久久爱视频| 999久久久精品免费观看国产| 18美女黄网站色大片免费观看| 欧美日韩瑟瑟在线播放| 国内毛片毛片毛片毛片毛片| 日韩欧美在线乱码| 国产三级黄色录像| 人妻丰满熟妇av一区二区三区| 久久婷婷人人爽人人干人人爱| 国产v大片淫在线免费观看| 国产精品久久久久久亚洲av鲁大| 久久九九热精品免费| 婷婷精品国产亚洲av| 成年女人永久免费观看视频| 又大又爽又粗| 在线国产一区二区在线| 热99在线观看视频| 无人区码免费观看不卡| 手机成人av网站| 99在线人妻在线中文字幕| 中出人妻视频一区二区| 国产高潮美女av| 日本a在线网址| 久久久久久久久免费视频了| 国产三级在线视频| 日韩高清综合在线| 99久久99久久久精品蜜桃| 亚洲激情在线av| 国内精品久久久久久久电影| 在线观看66精品国产| 亚洲中文av在线| 嫁个100分男人电影在线观看| 中文字幕高清在线视频| 亚洲国产看品久久| 给我免费播放毛片高清在线观看| 久久精品国产综合久久久| 在线永久观看黄色视频| 美女 人体艺术 gogo| av福利片在线观看| 国产黄a三级三级三级人| 人妻久久中文字幕网| 欧美精品啪啪一区二区三区| 男人舔女人的私密视频| 午夜视频精品福利| 午夜久久久久精精品| 特级一级黄色大片| 亚洲熟女毛片儿| 91字幕亚洲| 亚洲熟妇熟女久久| 国产精品自产拍在线观看55亚洲| 真人一进一出gif抽搐免费| 久久国产精品人妻蜜桃| 国产亚洲精品久久久久久毛片| 国产免费av片在线观看野外av| 老鸭窝网址在线观看| 99久国产av精品| 在线观看舔阴道视频| 久久精品人妻少妇| 嫩草影院精品99| 无人区码免费观看不卡| 成人精品一区二区免费| 一区二区三区高清视频在线| 99在线人妻在线中文字幕| 99热6这里只有精品| 成人高潮视频无遮挡免费网站| 亚洲精品美女久久av网站| 久久人妻av系列| 99热只有精品国产| 国产又黄又爽又无遮挡在线| 国产私拍福利视频在线观看| 日韩欧美国产在线观看| 久久久久久久久久黄片| 国产高清三级在线| 亚洲精品美女久久久久99蜜臀| 日本一本二区三区精品| 天堂动漫精品| 美女被艹到高潮喷水动态| 久久久久久国产a免费观看| 国产欧美日韩精品一区二区| 国产三级黄色录像| 在线国产一区二区在线| 国产精品av久久久久免费| 亚洲专区字幕在线| 最近最新中文字幕大全免费视频| 白带黄色成豆腐渣| 国产精品一及| 日韩高清综合在线| 亚洲午夜理论影院| 久久精品影院6| 成人18禁在线播放| 无遮挡黄片免费观看| 久久九九热精品免费| 国产精品国产高清国产av| 国产午夜精品久久久久久| www.熟女人妻精品国产| 国产视频一区二区在线看| 精品久久久久久久毛片微露脸| 久久热在线av| 少妇丰满av| 老司机午夜十八禁免费视频| 日本黄色视频三级网站网址| 黄频高清免费视频| 亚洲欧美日韩高清在线视频| 亚洲熟女毛片儿| 亚洲av熟女| netflix在线观看网站| 婷婷精品国产亚洲av在线| 午夜精品在线福利| 婷婷精品国产亚洲av| 亚洲av第一区精品v没综合| 亚洲avbb在线观看| 男女午夜视频在线观看| 欧美日韩福利视频一区二区| 国产精品一区二区三区四区免费观看 | www.熟女人妻精品国产| 久久精品91无色码中文字幕| 精品久久蜜臀av无| 国产成+人综合+亚洲专区| 国产av在哪里看| cao死你这个sao货| 伦理电影免费视频| 国内少妇人妻偷人精品xxx网站 | 18禁美女被吸乳视频| 成熟少妇高潮喷水视频| 日韩精品中文字幕看吧| 99热只有精品国产| 99久久精品国产亚洲精品| 国产午夜精品论理片| 男人舔女人的私密视频| 岛国视频午夜一区免费看| 18美女黄网站色大片免费观看| 久久久久精品国产欧美久久久| 黄色成人免费大全| 在线视频色国产色| 啪啪无遮挡十八禁网站| 九色国产91popny在线| 亚洲一区二区三区色噜噜| 亚洲精品国产精品久久久不卡| 成年人黄色毛片网站| 看免费av毛片| 日本免费一区二区三区高清不卡| 久久亚洲精品不卡| 18禁裸乳无遮挡免费网站照片| 中文字幕最新亚洲高清| 国产爱豆传媒在线观看| 叶爱在线成人免费视频播放| 美女扒开内裤让男人捅视频| 亚洲一区二区三区不卡视频| 在线观看66精品国产| 国产精品女同一区二区软件 | 亚洲精品一卡2卡三卡4卡5卡| 欧美性猛交黑人性爽| 最近最新中文字幕大全电影3| 久久亚洲精品不卡| 亚洲第一欧美日韩一区二区三区| 亚洲精品一区av在线观看| 黄色片一级片一级黄色片| 我的老师免费观看完整版| 毛片女人毛片| 国产一区二区三区视频了| 又大又爽又粗| 小说图片视频综合网站| 免费搜索国产男女视频| 欧美日韩国产亚洲二区| 视频区欧美日本亚洲| 免费在线观看日本一区| 丰满人妻一区二区三区视频av | 日韩av在线大香蕉| 麻豆一二三区av精品| 久久中文看片网| 欧洲精品卡2卡3卡4卡5卡区| 国产三级在线视频| bbb黄色大片| 1000部很黄的大片| 高清毛片免费观看视频网站| 手机成人av网站| 免费人成视频x8x8入口观看| 欧美绝顶高潮抽搐喷水| 欧美性猛交黑人性爽| 国产高清三级在线| 日韩 欧美 亚洲 中文字幕| 97超级碰碰碰精品色视频在线观看| 午夜福利高清视频| 成人av在线播放网站| 熟女电影av网| 国模一区二区三区四区视频 | 亚洲七黄色美女视频| 香蕉久久夜色| 久久中文看片网| 国产成人啪精品午夜网站| 亚洲美女黄片视频| 国产成人欧美在线观看| 五月伊人婷婷丁香| 欧美一级毛片孕妇| 国产不卡一卡二| 一卡2卡三卡四卡精品乱码亚洲| 亚洲自拍偷在线| 成人三级做爰电影| 黄色女人牲交| 成人18禁在线播放| 美女大奶头视频| 在线看三级毛片| 在线观看舔阴道视频| 国产精品久久久人人做人人爽| 99久久国产精品久久久| 国产精品国产高清国产av| 亚洲精品粉嫩美女一区| 国产单亲对白刺激| 男女午夜视频在线观看| 毛片女人毛片| 老司机在亚洲福利影院| 俄罗斯特黄特色一大片| 国产精品 欧美亚洲| 最好的美女福利视频网| 精品欧美国产一区二区三| 天天一区二区日本电影三级| 视频区欧美日本亚洲| 精品久久久久久久久久免费视频| 男人舔女人下体高潮全视频| 桃色一区二区三区在线观看| 1000部很黄的大片| 18美女黄网站色大片免费观看| 香蕉久久夜色| 国产午夜精品久久久久久| 亚洲第一电影网av| 国产精品久久久av美女十八| 美女 人体艺术 gogo| 人妻夜夜爽99麻豆av| 叶爱在线成人免费视频播放| 一级毛片高清免费大全| 亚洲av成人av| 国产精品一区二区免费欧美| 国产免费av片在线观看野外av| 老司机午夜福利在线观看视频| 黄色 视频免费看| 久久精品91无色码中文字幕| 亚洲国产日韩欧美精品在线观看 | 国产野战对白在线观看| 国产亚洲av嫩草精品影院| 国内精品一区二区在线观看| 久久精品综合一区二区三区| 高清在线国产一区| 亚洲欧美日韩无卡精品| 国产美女午夜福利| 两个人的视频大全免费| 男插女下体视频免费在线播放| 97超级碰碰碰精品色视频在线观看| ponron亚洲| 精品熟女少妇八av免费久了| 全区人妻精品视频| 精品久久久久久久末码| 成人国产综合亚洲| 亚洲九九香蕉| 搡老熟女国产l中国老女人| 亚洲无线在线观看| 日日摸夜夜添夜夜添小说| 中文字幕人妻丝袜一区二区| 国产激情久久老熟女| 巨乳人妻的诱惑在线观看| 99久久国产精品久久久| 国产精品综合久久久久久久免费| 成年人黄色毛片网站| 亚洲成人免费电影在线观看| 母亲3免费完整高清在线观看| 亚洲va日本ⅴa欧美va伊人久久| 日韩欧美免费精品| 国产午夜精品论理片| 听说在线观看完整版免费高清| 日韩欧美在线乱码| 亚洲av电影在线进入| 在线国产一区二区在线| 色综合站精品国产| 美女被艹到高潮喷水动态| 老汉色av国产亚洲站长工具| 亚洲在线观看片| 美女黄网站色视频| xxx96com| 亚洲激情在线av| 久久久久精品国产欧美久久久| 在线永久观看黄色视频| 伦理电影免费视频| 18禁国产床啪视频网站| 精品久久久久久久久久久久久| 午夜a级毛片| 亚洲欧美精品综合久久99| 日本与韩国留学比较| 99久久精品国产亚洲精品| 婷婷精品国产亚洲av在线| 国产成人一区二区三区免费视频网站| 成人av一区二区三区在线看| 欧美成狂野欧美在线观看| 中文亚洲av片在线观看爽| 免费看十八禁软件| 亚洲 欧美 日韩 在线 免费| 男人的好看免费观看在线视频| 欧美日韩综合久久久久久 | 国产一区二区三区视频了| 一本久久中文字幕| 成年女人看的毛片在线观看| 成年人黄色毛片网站| 999久久久国产精品视频| 国产成人av教育| 免费看a级黄色片| 欧美中文日本在线观看视频| 色在线成人网| 精品一区二区三区四区五区乱码| 男人舔女人的私密视频| 99热6这里只有精品| 亚洲av成人不卡在线观看播放网| 精品一区二区三区四区五区乱码|