• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding?

    2018-11-24 07:39:46HongLai賴紅MingXingLuo羅明星YongJianXu徐永健JosefPieprzykJunZhang張軍LeiPan潘磊andMehmetOrgun
    Communications in Theoretical Physics 2018年10期
    關(guān)鍵詞:張軍明星

    Hong Lai(賴紅), Ming-Xing Luo(羅明星),Yong-Jian Xu(徐永健),Josef Pieprzyk,Jun Zhang(張軍), Lei Pan(潘磊),and Mehmet A.Orgun

    1School of Computer and Information Science and Centre for Research and Innovation in Software Engineering(RISE),Southwest University,Chongqing 400715,China

    2Information Security and National Computing Grid Laboratory,School of Information Science and Technology,Southwest Jiaotong University,Chengdu 610031,China

    3Data61,Commonwealth Scientific and Industrial Research Organisation,Sydney,Australia

    4Institute of Computer Science,Polish Academy of Sciences,Warsaw,01-248,Poland

    5School of Software and Electrical Engineering,Swinburne University of Technology,Hawthorn,VIC,3122,Australia

    6School of Information Technology,Deakin University,Geelong,VIC,3220,Australia

    7Department of Computing,Macquarie University,Sydney,NSW 2109,Australia

    8Faculty of Information Technology,Macau University of Science and Technology,Avenida Wai Long,Taipa,999078,Macau

    AbstractSince the use of a quantum channel is very expensive for transmitting large messages,it is vital to develop an effective quantum compression encoding scheme that is easy to implement.Given that,with the single-photon spin-orbit entanglement,we propose a quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding.In our proposed scheme,we can represent the frequency of any secret message which is typically collection of bits encodings of text or integers as a bitstring using the base Fibonacci sequence,which is encoded multiple spin states for secret shares transmitted to participants.We demonstrate that Fibonacci compression encoding carries excellent properties that enable us to achieve more robust quantum secret sharing schemes with fewer number of photons.

    Key words:spin-orbit entanglement,multiple spin states,Fibonacci compression encoding,quantum secret sharing

    1 Introduction

    In 1979,Shamir[1]and Blakeley[2]showed how a secret can be shared among a group of participants.Shamir used an algebraic construction while Blakley applied a geometric approach.In their schemes,if the number of collaborating participants is above the set threshold,then they can recover the secret.Conversely,if the number of participants in any given subset is below the set threshold,then they should obtain nothing about the secret.In 1999,Hillery et al.[3]proposed a quantum secret sharing(QSS)scheme based on the Greenberger-Horne-Zeilinger(GHZ)state.[4]The Hillery et al.scheme uses entangled quantum states to share a secret in the context of classic cryptography.In the same year,Cleve et al.[5]introduced an alternative QSS scheme that allows quantum state sharing(QSTS).For these schemes based on quantum mechanics,[6]participants use certain quantum techniques to share a secret,which makes it possible to achieve unconditionally secure QSS schemes.Inspired by their schemes,more and more authors have shown great interest in the study of QSS[7?13]and QSTS.[14?16]

    On the other hand,in 1909,Poynting[17]discovered that light waves have spin angular momentum(SAM).In 1992,Allen et al.[18]observed that a photon carries orbital angular momentum(OAM)as well.Using SAM photon freedom,qubit coding can be conducted in a similar manner to the demonstration provided by Bennett and Bras-sard in their quantum key distribution(QKD).[19]An interesting property of photon OAM is that it can achieve a high dimensional quantum state coding(i.e.qudit coding).In 2002,Leach et al.[20]conducted experiments with encoding separation techniques using photonic OAM.They pointed out that the OAM carrier could greatly improve the communication capacity of a single photon.In 2001,Mair et al.[21]experimentally demonstrated that photon pairs prepared by the spontaneous parametric down conversion(SPDC)share similar characteristics to those of OAM.A year later,Leach et al.[20]devised an interferometric technique that individually recognizes photons in arbitrarily many OAM states and routes each of the photons.Leach et al.advanced[22]their techniques to measure the orbital,spin or total angular momenta and subsequently a successful measurement of the sign of OAM of a light beam using a Shack Hartmann wavefront sensor.[23]In 2015,with OAM of photons,Mi et al.[24]proposed a high-capacity quantum secure direct communication.By using the rotational Doppler shift and an interferometer spanning the angle space,Vasnetsov et al.[25]and Zambrini and Barnett[26]discovered the resolution of the OAM spectrum respectively.Consequently,these developments ignited a great interest in studying quantum information processing with enlarged sets of alphabets based on OAM sorting.

    A separate line of research deals with the problem of how to achieve a coupling between SAM and OAM in an inhomogeneous and anisotropic medium(which is also known as q-plates).[27]Q-plates together with quantum information transfer between different degrees of freedom were studied by Nagali et al.[28]In this context,Chen and She demonstrated the Shannon dimensionality increase.[29]In 2009,Chen and She[30]proposed to use an OAM-dependent polarization manipulation technique to design a practical scheme,which is able to sort OAM by cascading conventional polarizing beam splitters.Moreover,they found that their scheme could induce spinorbit coupling.This provides an alternative technique for encoding OAM onto multiple spin states using a Hu ffman tree.[31]The technique could have some potential use in optical communication.Although Huffman codes have the optimal compression ratio,the encoding and decoding process is complicated as it depends on the probability distribution of the alphabetical letters in the given message.Moreover,its robustness against errors is absent.In order to address these problems,we propose to use a new variable-length codewords,i.e.,a binary Fibonacci numeration system.We show how to use them to design quantum secret sharing with Fibonacci compression encoding based on the technique proposed by Chen and She.[30]

    The rest of paper is organized as follows.Section 2 discusses Fibonacci sequences,Fibonacci representation and Fibonacci diagonal matrices.Section 3 describes the proposed compressed QSS scheme.The security analysis and features of the protocol are presented in Secs.4 and 5,respectively.Section 6 concludes the work.

    2 Fibonacci Sequences,Fibonacci Representation and Fibonacci Diagonal Matrices

    In this section,we give the necessary background on Fibonacci sequences and related mathematical structures that we use in the paper.

    2.1 Fibonacci Sequences

    The Fibonacci sequence for our proposed scheme is defi ned as follows:

    Definition 1Fibonacci sequence Fifor(i= 0,1,2,...)[32]satisfies the following recurrence relation:

    Therefore,the first few Fibonacci numbers are 0,1,1,2,3,5,8,13,21,34,55,89,...

    Alternatively,the Fibonacci sequence can be represented as follows[33]

    2.2 Fibonacci Representation

    A fundamental theorem in discrete mathematics states that any positive integer can be represented by Fibonacci bases.[34]The following definition describes the representation.

    Definition 2(Fibonacci representation[34])For any positive integer n,there exists a finite subset S ={l1,l2,...,lk}of the natural numbers,where l1

    (i)Fl1+Fl2+ ···+Flk=n.

    (ii)For all i,Fli+1≥Fli+2(no adjacent ones).

    There is also an efficient algorithm that produces such representation.

    Algorithm

    Parameters:Fibonacci bases Fl1,Fl2,Fl3,...,Flk.Input:an integer n.

    Output:a sequence S such that∑Fli=n.

    (i)S=?.

    (ii) For i∈[1,k]be the largest number such that Fli≤n.

    (iii)S=li.

    (iv)n→n?Fli.

    Proposition 1[34]The Fibonacci representation of an integer is uniquely decodable.

    Example 1According to the above-mentioned algorithm,the integer 45 can be represented using Fibonacci sequence as follows:

    where S={3,5,8}.

    2.3 Fibonacci Block Diagonal Matrices

    The simplest Fibonacci matrix can be constructed from the first three Fibonacci numbers 0,1,1 as follows:[35]

    where det(Q1)=F0F2?= ?1.Using Eq.(1),we can compute the k-th power of the Fibonacci matrixas follows

    Fibonacci block diagonal matrices are defined as follows:

    So,the Fibonacci block diagonal matrix for Example 1 is

    where O is a matrix of dimension 2×2 with zero entries.

    3 A QSS Scheme Based on Fibonacci Compression Encoding

    In this section,we apply the technique based on Ref.[30]to encode OAM onto multiple spin states using Fibonacci compression encoding and propose a quantum secret sharing scheme.We note that Fibonacci compression encoding[36]enjoys excellent properties that enable us to design a compressed QSS scheme.The proposed scheme can greatly increase the transmission capacity,and thus save qubits for the transmission.Most importantly,it provides extra resilience to the attacks against the secret message.

    Our QSS scheme includes two phases,i.e.,distributing key with Fibonacci compression encoding phase and recovering secret phase.There are three kinds of roles involved in our compressed QSS scheme,which are as follows:

    (i)A Dealer.

    (ii)Quantum participants.

    (iii)An adversary.

    The dealer(Alice),which is at a free-space OAM qudit network,is responsible for converting a classical secret message into multiple spin states and sending them to m quantum participants P1,P2,...,Pm.

    Quantum participants,denoted as P1,P2,...,Pmconnected viaaqubitnetwork,hold quantum shares s1,s2,...,smrespectively.Their task is to detect eavesdropping and jointly recover the shared secret.

    The adversary,who could also be any of participants,can eavesdrop the transmitted information over the quantum channel.

    3.1 Distributing Key with Fibonacci Compression Encoding Phase

    Our scheme accepts the triplet:a secret S(this is typically collection of bits,which are encodings of text or integers),a designated collection of participants P={P1,P2,...,Pm}from an access structure Γ as an input.The access structure Γ determines a collection of participants that are authorized to reconstruct the secret.It outputs quantum shares si,i=1,2,...,m-multiple spin states for participants Pi,i=1,2,...,m.

    The detailed steps of our protocol are given as follows:Step 1 Compressing the secretThe Dealer sets up the secret sharing.She computes the frequency of every block(for example,each sentence of a secrete text can be regarded as a block)of S and represents them in Fibonacci bases such as 34,21,13,8,5,3,2,1,(see Definition 2).

    The compressing processes are performed in clearly separated stages:

    (i)Compute the frequencies of the collection of bits which are encodings of the text or the integers.

    (ii)Rank the collection of bits by their frequencies.

    (iii)Compute the Fibonacci code of each ranking.

    (iv) Output the ranking as the header of the compressed secret.

    (v)Reread the input secret S,using the code table to generate the output and transfer it to the compressed secret.

    Step 2 Quantum encodingThe step aims to convert the binary codes 1s and 0s into single photon’s polarizations Vs and Hs.The Dealer encodes the frequencies with OAM by assigning a twisted number of a single photon to each Fibonacci value:.That is,only 8 different twists are required in terms of Chen and She’s work[30](see Fig.1).Moreover,the Dealer encodes every character into binary codes,i.e.,1s and 0s which are represented by single photon’s polarizations Vs and Hs.Also,to remove this encoding ambiguity,we append an extra bit 1 to every character binary codes,which is used to act as a “comma”,separating consecutive codewords.

    Step 3 Distributing the keyAs shown in Fig.1,Alice sends the quantum shares to P1,P2,...,Pmaccording to the setting of an array of angularly separated light sources illuminating the static phase mask.After entering static modulation,the input planar photons are converted into twisted ones with coinciding propagation direction.Each twist number assigned is selectively dependent on their inclinations in front of the phase mask.

    Then,the encoded twisted photons are sent into the free-space link by an afocal telescope.The Dealer’s qudit receiver consists of a similar telescope,the aforementioned OAM sorter,and an array of photodiode detectors which are set up to monitor the output intensity of each port.Thus,the aggregated information is used to decode the message.The Dealer Alice can encode the secret message as binary codes(spin),and send quantum shares–the corresponding multiple spin states through the quantum channel,and publish the determinants of Fibonacci diagonal matrices to participants P1,P2,...,Pmthrough the classical communication channel.

    Example 2Take the secret message“action please” as an example to illustrate Steps 1-3,we can obtain the encoded information listed in Table 1.

    Table 1 Compress and encode the secret message “action please” as binary bits,where each binary code(0 or 1)is represented by a single photon’s polarization(H or V).

    The Dealer sends VV to P1,HHVV to P2,...,HVV to P10via the quantum channel.At the same time,the Dealer publishes det(),det(),...,det()via the classical channel.

    3.2 Recovering the Secret Phase

    In this phase,the system accepts the triplet:quantum shares s1,s2,...,smand a set of currently active participants{P1,P2,...,Pm}as the input.It outputs the aggregated secret S if{P1,P2,...,Pm}are verified,or“FAIL”otherwise.

    The detailed steps are as follows:

    Step1 EavesdroppingDetectionUpon recipient of these multiple spin states,the participants{P1,P2,...,Pm}can obtain their qubits.According to Table 1,they first verify the determinants of Fibonacci diagonal matrices consisting of the Rank’s Fibonacci bases in terms of Eq.(5).If they are different,they immediately abort the communication and the final output is FAIL.Otherwise,they continue to obtain the matching codes.

    Step 2 Secret RecoveryAfter confirming that the secret shares received by all participants are valid,the Dealer informs the nominated aggregator immediately(which can be any participant)on the positions of every character or integer of the collection of bits.Finally,the secret S can be reconstructed by concatenating all the decoded pieces based on each participant’s secret share.An example is provided in Table 1.

    In Example 2,according to the published det(),det(),...,det()by the Dealer,P1,...,P10can detect potential eavesdropping in terms of Eq.(5).If the com-puted determinants from P1,...,P10are identical to the Dealer’s published values,P1can obtain “a” from the code word VV,P2can obtain “c” from the code word HHVV,···,P10can obtain “e” from the code word HVV.At last,they can obtain the secret message “action please”.

    4 Security Analysis

    In this section,we analyze the security of the proposed QSS scheme in the presence of some known attack strategies.

    4.1 The Man-in-the-Middle Attack

    As shown in Fig.1,the Dealer manipulates the qudit state of the signal photons only in her private side and keeps these photons all the time.Similarly,the participants P1,P2,...,Pmmanipulate the qubit states in their own sides.In these private places,it is not possible for the adversary Eve to have access to the photons.Nevertheless,participants P1,P2,...,Pmdo not always keep the qubit photons,providing a chance for Eve’s eavesdropping.That is,Eve can intercept the qubit photons from the Dealer to the participants P1,P2,...,Pmin the free space,and then send the unoriginal qubit photons to P1,P2,...,Pm,i.e.,man-in-the-middle attacks.However,our scheme can defend the secrets against the man-in-themiddle attack.This is because we can use the determinant of matching Fibonacci diagonal matrices of photon’s information to verify the identification of every participant.

    Take Table 1 for example,if the adversary Eve intercepts the multiple spin states HVV from the Dealer to participant 2,and then re-sends HHVV to participant 2.However,the determinant of matching Fibonacci diagonal matrices is also changed.In this case,the Fibonacci diagonal matrix is changed to

    4.2 The Participants’Attack

    Our scheme uses an access control mechanism,i.e.only designated participants can recover the secret.So,we consider the attacks launched from the external participants here.We analyze the following three scenarios.

    (i)Firstly,as shown in Fig.1,the external participant who is located at the other side of the qubit network,cannot see the secret message over the qudit network directly.

    (ii)Secondly,according to Eq.(5),we use the determinants of Fibonacci diagonal matrices consisting of the rank’s Fibonacci bases to verify the identity of the participant.For example,if a participant receives multiple spin states HVV and its Rank’s Fibonacci base is 2,then the Fibonacci diagonal matrices is

    (iii)Finally,even if the external participants can obtain the quantum information,any attacks can be detected by the compression coding with representation of every block.Each sentence or a certain number of letters can be regarded as a block of the secret.The position of every letters of a block is only given to the legal participants through the secure channel.Therefore,the external participants cannot obtain the secret.

    4.3 The Photon-Number-Splitting(PNS)Attack

    The photon-number-splitting(PNS)attack is defined as follows:as non-ideal light sources are used in quantum cryptography,the number of produced photons can be multiple,providing a chance for the attacker Eve to obtain the transmitted quantum messages in two-way quantum communications.However,as shown in Fig.1,our scheme is one-way and we use orbital angular momentum onto multiple spin states rather than spin angular momentum.Therefore,Eve cannot obtain the secret using the photon-number-splitting(PNS)attack.

    5 Features of Our Proposed Protocol

    Based on Chen and She’s work,[29]we have proposed a novel QSS scheme,i.e.compressed QSS.In our protocol,the q-plate is used as a qudit-to-qubit transverter to transform the polarization higher-dimensional photons into the two-dimensional photons,which provides the possibility to explore the features of the higher-dimensional space of OAM states to encode information.More importantly,our encoding process is much simpler than the Huffman encoding,because the latter must take every probability distribution of letters in the secret information into account.In addition,the actual decoding process is very similar to that of the Huffman coding.In our QSS scheme,one-to-one mapping between the multiple spin states and the participants P1,P2,...,Pmwould make the column of codewords in Table 1 superfluous.In the following,we introduce the features brought by the higher-dimensional space of OAM states in detail.

    (i)Our QSS scheme has high compression efficiency Due to the use of the variable-length Fibonacci compression encoding,the length of codeword is reduced tofromin the standard binary coding(see Table 2),where M is the maximal bytes of codewords length.The longer the secret messages,the more substantial the saving codes(photons)(see Fig.2).Figure 2 plots the codewords length as a function of the rank of the character on a logarithmic scale for Huffman and Fibonacci compression coding.

    Fig.2 The comparison of compression efficiency between Huffman encoding and our Fibonacci compression encoding.

    Also,as shown in Table 2,the Prob√ability of 1-bit guess is reduced from 1/2 to(1/2)(1? 1/)=0.276.Meanwhile,the average codeword lengths of 1-bit areandfor standard binary coding and our Fibonacci compression encoding respectively.

    Also,review Example 2,the size of header+51 bits is encoded into at most 51/10=6 bytes,though the header may be larger.With an ordinary representation,each letter of the original string “action please” in Example 2 requires one byte or 8 bits.Compared to the standard binary codes with our Fibonacci compression encoding,the length of character“a” is one fourth of that of standard binary codes.Moreover,if we can obtain a more accurate estimate of the probability of each letter in the secret message,the proportion of lossless compression can be significantly increased.

    Table 2 Performance comparison between standard binary encoding and Fibonacci encoding,where M is the maximal bytes of codewords length.

    (ii)Our QSS scheme is robustWhile inserting and deleting of a single bit,the Huffman coding may lose all the suffixes,since it renders the decoding to be shifted and all the true codeword boundaries to be missed.However,our Fibonacci coding is immune to such effects(see Fig.2),because of its explicit codeword ending.

    (iii)Our QSS scheme can save a substantial number of photons As shown in Fig.2,if the shared secret is long,with our Fibonacci compression encoding,the length of codes is reduced greatly,and in turn,in our QSS scheme,the number of the used photons is greatly reduced.

    (iv) The dealer and the participants P1,P2,...,Pmare in different kinds of a qubit network As is described in Sec.3,Dealer is at a free-space OAM qudit network while all participants P1,P2,...,Pmare at a qubit network.So,the participants P1,P2,...,Pmcould not see the Dealer’s secret,and the security is provided.

    6 Conclusion

    The paper uses Fibonacci compression encoding to achieve a compressed QSS scheme based on orbital angular momentum onto multiple spin states.The proposed scheme improves the efficiency of photon usage due to the significant improvement over the standard binary coding.The proposed scheme also improves the level of security,because the probability of successfully guess√ing 1-bit information is reduced from 1/2 to(1/2)(1?1/=0.276.Because we use the Fibonacci compression coding to tolerate information loss,our proposed scheme is more robust than the traditional schemes using the Huffman coding.

    猜你喜歡
    張軍明星
    篆刻:張軍
    萬松浦(2023年6期)2023-04-08 11:57:16
    張軍從脾論治痛風(fēng)性關(guān)節(jié)炎緩解期的經(jīng)驗總結(jié)
    明星猝死背后
    南方周末(2019-11-28)2019-11-28 08:37:59
    交通安全小明星
    幼兒園(2017年23期)2018-02-07 15:26:54
    明星們愛用什么健身APP
    Coco薇(2017年2期)2017-04-25 03:02:27
    扒一扒明星們的
    Coco薇(2016年10期)2016-11-29 16:59:54
    誰是大明星
    誰動了我的壽限
    貪小便宜毀人生
    CO2 Capture by Vacuum Swing Adsorption Using F200 and Sorbead WS as Protective Pre-layers*
    欧美xxxx黑人xx丫x性爽| netflix在线观看网站| 免费在线观看亚洲国产| 真实男女啪啪啪动态图| 搞女人的毛片| 黄色日韩在线| 欧美乱色亚洲激情| 老司机深夜福利视频在线观看| 欧美最黄视频在线播放免费| 老司机深夜福利视频在线观看| 身体一侧抽搐| 啦啦啦免费观看视频1| 久久精品夜夜夜夜夜久久蜜豆| 宅男免费午夜| 天天躁日日操中文字幕| 黄色片一级片一级黄色片| 国产激情久久老熟女| 日日夜夜操网爽| 色老头精品视频在线观看| 中文亚洲av片在线观看爽| 国产男靠女视频免费网站| 色吧在线观看| 精品免费久久久久久久清纯| 亚洲av电影在线进入| 嫩草影院精品99| 美女高潮喷水抽搐中文字幕| 欧美一区二区精品小视频在线| 不卡一级毛片| 欧美日本视频| 免费看日本二区| 丝袜人妻中文字幕| 99久久无色码亚洲精品果冻| 夜夜爽天天搞| 69av精品久久久久久| 99国产精品一区二区蜜桃av| 国产欧美日韩一区二区精品| 99久国产av精品| 韩国av一区二区三区四区| 熟妇人妻久久中文字幕3abv| 此物有八面人人有两片| 亚洲国产欧美人成| 精品久久久久久久毛片微露脸| 国产精品av视频在线免费观看| 最近视频中文字幕2019在线8| 中国美女看黄片| 性欧美人与动物交配| 老司机福利观看| 最新在线观看一区二区三区| 免费观看的影片在线观看| 久久精品国产亚洲av香蕉五月| av天堂中文字幕网| 国产精品国产高清国产av| 亚洲午夜精品一区,二区,三区| 亚洲av片天天在线观看| 精品久久久久久久人妻蜜臀av| 亚洲专区字幕在线| 人人妻人人澡欧美一区二区| 精品久久久久久久毛片微露脸| 欧美xxxx黑人xx丫x性爽| 丝袜人妻中文字幕| 男女之事视频高清在线观看| 99国产极品粉嫩在线观看| 亚洲自偷自拍图片 自拍| 少妇的丰满在线观看| 在线看三级毛片| 一边摸一边抽搐一进一小说| 国产精品久久久久久人妻精品电影| 少妇的逼水好多| 99国产精品99久久久久| 日日摸夜夜添夜夜添小说| 黑人操中国人逼视频| 国产伦在线观看视频一区| 少妇熟女aⅴ在线视频| 可以在线观看毛片的网站| 91av网站免费观看| 一夜夜www| a级毛片在线看网站| 欧美日韩一级在线毛片| 我要搜黄色片| 国产伦精品一区二区三区四那| 天堂网av新在线| 日韩欧美在线乱码| 久久国产精品人妻蜜桃| 久久久精品大字幕| 天堂影院成人在线观看| 韩国av一区二区三区四区| 网址你懂的国产日韩在线| av福利片在线观看| 欧美一区二区精品小视频在线| 人人妻人人澡欧美一区二区| 三级国产精品欧美在线观看 | 国产三级黄色录像| 精品国产三级普通话版| 国产一区二区三区视频了| 老司机深夜福利视频在线观看| 午夜日韩欧美国产| 国产精品野战在线观看| 亚洲av中文字字幕乱码综合| 国产精品一区二区三区四区免费观看 | 国产精品98久久久久久宅男小说| 超碰成人久久| 国产伦精品一区二区三区四那| 成熟少妇高潮喷水视频| 精品久久蜜臀av无| 日韩欧美免费精品| 午夜免费观看网址| 亚洲天堂国产精品一区在线| 精品久久久久久久久久免费视频| 特级一级黄色大片| 熟妇人妻久久中文字幕3abv| av福利片在线观看| 日韩免费av在线播放| 久久国产乱子伦精品免费另类| 欧美午夜高清在线| 久久中文字幕一级| 一边摸一边抽搐一进一小说| 亚洲人成电影免费在线| 99热这里只有精品一区 | 一级毛片精品| 精品久久久久久,| 91av网站免费观看| 亚洲欧美激情综合另类| 精品久久蜜臀av无| 国产精品自产拍在线观看55亚洲| 亚洲狠狠婷婷综合久久图片| 18禁美女被吸乳视频| 亚洲人成伊人成综合网2020| 丰满人妻熟妇乱又伦精品不卡| 一级毛片高清免费大全| 久久久久国产精品人妻aⅴ院| 免费无遮挡裸体视频| 别揉我奶头~嗯~啊~动态视频| 精品一区二区三区视频在线 | 黄色 视频免费看| 老熟妇仑乱视频hdxx| 美女午夜性视频免费| 亚洲中文av在线| 亚洲国产欧美一区二区综合| 午夜激情福利司机影院| 欧美大码av| 免费无遮挡裸体视频| 黄色女人牲交| 免费在线观看成人毛片| 国内精品一区二区在线观看| 国产一区二区在线av高清观看| 免费在线观看成人毛片| 亚洲自偷自拍图片 自拍| 国产av在哪里看| 哪里可以看免费的av片| 久久久久久久精品吃奶| 母亲3免费完整高清在线观看| 国产真实乱freesex| 性欧美人与动物交配| 精品久久久久久久久久免费视频| netflix在线观看网站| 久久精品91蜜桃| 香蕉av资源在线| 久久久国产成人免费| 啦啦啦韩国在线观看视频| 国产精品亚洲一级av第二区| 在线视频色国产色| 草草在线视频免费看| 国产精品免费一区二区三区在线| 露出奶头的视频| 亚洲色图 男人天堂 中文字幕| 国产成人啪精品午夜网站| 美女被艹到高潮喷水动态| 成人特级黄色片久久久久久久| 老熟妇仑乱视频hdxx| 久久久久久大精品| 在线播放国产精品三级| 欧美日本亚洲视频在线播放| 99久久无色码亚洲精品果冻| 中文资源天堂在线| 日韩欧美三级三区| 嫁个100分男人电影在线观看| 中出人妻视频一区二区| 两个人看的免费小视频| 欧美大码av| 国产成+人综合+亚洲专区| 网址你懂的国产日韩在线| 999久久久国产精品视频| 国产三级黄色录像| 在线观看日韩欧美| 男女那种视频在线观看| 欧美日本亚洲视频在线播放| 精品久久久久久久末码| 午夜成年电影在线免费观看| 亚洲国产精品合色在线| 黄色 视频免费看| 精品人妻1区二区| 午夜福利18| 宅男免费午夜| 亚洲国产精品成人综合色| 亚洲黑人精品在线| 亚洲avbb在线观看| 欧美最黄视频在线播放免费| 啦啦啦韩国在线观看视频| 日韩精品中文字幕看吧| 亚洲电影在线观看av| 日韩人妻高清精品专区| 国产高清视频在线观看网站| 亚洲aⅴ乱码一区二区在线播放| 亚洲一区高清亚洲精品| 国产伦精品一区二区三区四那| 老熟妇仑乱视频hdxx| 成年女人永久免费观看视频| 国产精品久久视频播放| 在线看三级毛片| 天堂网av新在线| 国语自产精品视频在线第100页| 每晚都被弄得嗷嗷叫到高潮| 免费看a级黄色片| 亚洲九九香蕉| 精品无人区乱码1区二区| 白带黄色成豆腐渣| 国产精品一及| 免费看十八禁软件| 99热6这里只有精品| 国产久久久一区二区三区| 看片在线看免费视频| 亚洲欧美精品综合一区二区三区| 亚洲欧美日韩无卡精品| 欧美性猛交╳xxx乱大交人| 在线看三级毛片| 中文字幕久久专区| 伊人久久大香线蕉亚洲五| 18禁国产床啪视频网站| 亚洲五月婷婷丁香| 夜夜躁狠狠躁天天躁| 97人妻精品一区二区三区麻豆| 国产亚洲av嫩草精品影院| 亚洲无线观看免费| 国产精品免费一区二区三区在线| 美女高潮的动态| 中文亚洲av片在线观看爽| 成人特级av手机在线观看| 两人在一起打扑克的视频| 亚洲无线观看免费| 午夜福利在线在线| 88av欧美| 我要搜黄色片| 亚洲精品久久国产高清桃花| 最新在线观看一区二区三区| 国产欧美日韩精品一区二区| 三级国产精品欧美在线观看 | 制服丝袜大香蕉在线| 91麻豆av在线| 国内精品美女久久久久久| 99国产精品一区二区蜜桃av| 亚洲天堂国产精品一区在线| 色哟哟哟哟哟哟| 国产精品免费一区二区三区在线| 俄罗斯特黄特色一大片| 黄色片一级片一级黄色片| 中文字幕精品亚洲无线码一区| 99精品在免费线老司机午夜| 岛国在线观看网站| 免费av毛片视频| 后天国语完整版免费观看| 波多野结衣巨乳人妻| 99国产极品粉嫩在线观看| 国产精品九九99| 久久性视频一级片| www.熟女人妻精品国产| 成人高潮视频无遮挡免费网站| av天堂在线播放| 亚洲18禁久久av| 99riav亚洲国产免费| 久久久久精品国产欧美久久久| 色在线成人网| 久久这里只有精品19| 亚洲熟女毛片儿| 少妇裸体淫交视频免费看高清| 国内精品久久久久精免费| 久久精品aⅴ一区二区三区四区| 精品无人区乱码1区二区| 亚洲中文字幕日韩| cao死你这个sao货| 欧美高清成人免费视频www| 亚洲国产高清在线一区二区三| 人妻夜夜爽99麻豆av| 香蕉av资源在线| 久9热在线精品视频| 精品国产乱子伦一区二区三区| 国内精品美女久久久久久| 90打野战视频偷拍视频| 精品久久蜜臀av无| 在线视频色国产色| 国产亚洲欧美98| 三级国产精品欧美在线观看 | 黑人巨大精品欧美一区二区mp4| 听说在线观看完整版免费高清| 国产成人欧美在线观看| 婷婷亚洲欧美| 男女做爰动态图高潮gif福利片| 免费观看人在逋| 在线看三级毛片| 久久久久久久久中文| 2021天堂中文幕一二区在线观| 成在线人永久免费视频| 99热这里只有精品一区 | 哪里可以看免费的av片| 欧美色欧美亚洲另类二区| 亚洲av片天天在线观看| 欧美日本亚洲视频在线播放| 久久中文字幕人妻熟女| 三级毛片av免费| 窝窝影院91人妻| 午夜福利18| 日日干狠狠操夜夜爽| 九色国产91popny在线| 女人高潮潮喷娇喘18禁视频| www.www免费av| 国产成人精品久久二区二区免费| 欧美一区二区精品小视频在线| 国产黄a三级三级三级人| 99精品久久久久人妻精品| 国产激情欧美一区二区| av天堂在线播放| 国产美女午夜福利| 天堂av国产一区二区熟女人妻| 成人三级黄色视频| 99国产精品一区二区蜜桃av| 国产成人av激情在线播放| 91字幕亚洲| 国产精品久久久久久人妻精品电影| 国产精品野战在线观看| 日韩欧美精品v在线| 天天躁日日操中文字幕| 夜夜躁狠狠躁天天躁| 熟女电影av网| 国产野战对白在线观看| 一夜夜www| 天堂影院成人在线观看| 国产99白浆流出| 欧美日韩中文字幕国产精品一区二区三区| 美女高潮的动态| 欧美又色又爽又黄视频| 女警被强在线播放| 成年版毛片免费区| 国产成年人精品一区二区| bbb黄色大片| 一级毛片高清免费大全| 日韩中文字幕欧美一区二区| 日韩成人在线观看一区二区三区| 久久久久久久精品吃奶| 国内久久婷婷六月综合欲色啪| 岛国在线观看网站| 国产欧美日韩一区二区三| 国产激情久久老熟女| 亚洲国产看品久久| 成人三级做爰电影| 18禁黄网站禁片免费观看直播| 国产单亲对白刺激| 18禁黄网站禁片免费观看直播| www国产在线视频色| 亚洲自拍偷在线| 欧美3d第一页| 国产99白浆流出| 日本a在线网址| 久久久精品大字幕| 2021天堂中文幕一二区在线观| 日本一二三区视频观看| 亚洲av成人精品一区久久| 日本五十路高清| xxxwww97欧美| 日韩欧美精品v在线| 国产精品亚洲av一区麻豆| 男女午夜视频在线观看| 精品久久蜜臀av无| 搡老岳熟女国产| 黄色片一级片一级黄色片| 女同久久另类99精品国产91| 19禁男女啪啪无遮挡网站| 欧美国产日韩亚洲一区| 亚洲中文字幕日韩| 成人特级av手机在线观看| 热99re8久久精品国产| 看免费av毛片| 亚洲真实伦在线观看| 久久亚洲真实| 亚洲av中文字字幕乱码综合| 天天躁狠狠躁夜夜躁狠狠躁| 日日干狠狠操夜夜爽| 丁香六月欧美| 日韩欧美精品v在线| 亚洲一区高清亚洲精品| 99re在线观看精品视频| 黄色丝袜av网址大全| 色综合亚洲欧美另类图片| 中文在线观看免费www的网站| 美女黄网站色视频| 成人一区二区视频在线观看| 欧美日韩中文字幕国产精品一区二区三区| 韩国av一区二区三区四区| 日韩欧美免费精品| 免费无遮挡裸体视频| 欧美xxxx黑人xx丫x性爽| 网址你懂的国产日韩在线| or卡值多少钱| 午夜精品一区二区三区免费看| 日韩 欧美 亚洲 中文字幕| 1024手机看黄色片| 中文字幕av在线有码专区| 日韩欧美精品v在线| 69av精品久久久久久| 欧美一级a爱片免费观看看| 丁香欧美五月| 在线观看免费午夜福利视频| 手机成人av网站| 老汉色av国产亚洲站长工具| svipshipincom国产片| 国产男靠女视频免费网站| 亚洲一区高清亚洲精品| 久久亚洲精品不卡| 国产又黄又爽又无遮挡在线| 国产精品九九99| 亚洲在线观看片| 国产免费av片在线观看野外av| 精品一区二区三区四区五区乱码| 欧美日韩综合久久久久久 | 窝窝影院91人妻| 久久人人精品亚洲av| 十八禁人妻一区二区| 韩国av一区二区三区四区| 亚洲国产欧洲综合997久久,| 国产精品 欧美亚洲| 一进一出好大好爽视频| 亚洲天堂国产精品一区在线| 国产一区在线观看成人免费| 很黄的视频免费| 国产黄片美女视频| 精品国产三级普通话版| 十八禁人妻一区二区| 精品国内亚洲2022精品成人| av欧美777| 老司机午夜福利在线观看视频| 国产视频一区二区在线看| 日韩欧美免费精品| 亚洲中文日韩欧美视频| 婷婷六月久久综合丁香| 亚洲欧美激情综合另类| 婷婷精品国产亚洲av在线| 久久午夜亚洲精品久久| 少妇熟女aⅴ在线视频| 最近视频中文字幕2019在线8| 中文字幕最新亚洲高清| av国产免费在线观看| 麻豆成人午夜福利视频| 成人永久免费在线观看视频| 草草在线视频免费看| 久久久国产成人精品二区| 国产99白浆流出| 中国美女看黄片| 亚洲午夜精品一区,二区,三区| 国产精品av久久久久免费| 日本三级黄在线观看| 一级a爱片免费观看的视频| 高清毛片免费观看视频网站| 午夜两性在线视频| a级毛片在线看网站| 亚洲最大成人中文| 亚洲九九香蕉| 国产精品电影一区二区三区| 亚洲美女黄片视频| 麻豆av在线久日| 国产亚洲精品综合一区在线观看| 久久久久久九九精品二区国产| 国产精品久久视频播放| 国产高清视频在线播放一区| www国产在线视频色| 一进一出好大好爽视频| 精品久久久久久久久久免费视频| 99热只有精品国产| 午夜久久久久精精品| www.自偷自拍.com| 麻豆国产av国片精品| 99视频精品全部免费 在线 | 亚洲第一电影网av| 色在线成人网| 热99re8久久精品国产| 日本成人三级电影网站| 国产精品久久久久久人妻精品电影| 天天一区二区日本电影三级| 日韩三级视频一区二区三区| 欧美中文综合在线视频| 精华霜和精华液先用哪个| 欧美丝袜亚洲另类 | 久久天堂一区二区三区四区| 法律面前人人平等表现在哪些方面| 日韩欧美 国产精品| 最近视频中文字幕2019在线8| 亚洲第一电影网av| 最新中文字幕久久久久 | 久久久国产成人精品二区| 黄色 视频免费看| 欧美黑人巨大hd| 九九在线视频观看精品| 成人午夜高清在线视频| 特级一级黄色大片| 亚洲熟妇中文字幕五十中出| 国产人伦9x9x在线观看| 男人舔奶头视频| 性色avwww在线观看| 国产精品永久免费网站| 在线视频色国产色| xxxwww97欧美| 人人妻人人澡欧美一区二区| 免费看美女性在线毛片视频| 国产亚洲精品综合一区在线观看| 国产精品日韩av在线免费观看| 久久久久久久久免费视频了| 黄色女人牲交| 精品久久蜜臀av无| 欧美在线黄色| 欧美国产日韩亚洲一区| 日本 av在线| 亚洲av成人精品一区久久| 国内毛片毛片毛片毛片毛片| 黄色日韩在线| 午夜精品久久久久久毛片777| 搡老岳熟女国产| 久久久精品大字幕| 91在线精品国自产拍蜜月 | 精品国产三级普通话版| 国产伦精品一区二区三区四那| 亚洲aⅴ乱码一区二区在线播放| 两个人的视频大全免费| 亚洲成人久久爱视频| 婷婷精品国产亚洲av在线| aaaaa片日本免费| av中文乱码字幕在线| 亚洲欧美日韩高清专用| 成人国产综合亚洲| 噜噜噜噜噜久久久久久91| 亚洲人成网站高清观看| 国产精品久久久av美女十八| 99久久精品国产亚洲精品| 悠悠久久av| 精品欧美国产一区二区三| 亚洲中文字幕一区二区三区有码在线看 | 欧美zozozo另类| 久久久久国产精品人妻aⅴ院| 最近最新免费中文字幕在线| 久久久久久九九精品二区国产| 精品99又大又爽又粗少妇毛片 | 99久久99久久久精品蜜桃| 91av网站免费观看| 精品福利观看| a在线观看视频网站| 无限看片的www在线观看| 亚洲av日韩精品久久久久久密| 国产1区2区3区精品| 国产一区二区在线av高清观看| 免费观看精品视频网站| 国产成年人精品一区二区| 日本一本二区三区精品| 国产免费av片在线观看野外av| 成熟少妇高潮喷水视频| 国产伦精品一区二区三区视频9 | 51午夜福利影视在线观看| 国产精品99久久久久久久久| 成人无遮挡网站| 亚洲精品一区av在线观看| 黑人欧美特级aaaaaa片| 亚洲精品中文字幕一二三四区| 国产高潮美女av| 老司机福利观看| 久久久久久久午夜电影| 精品不卡国产一区二区三区| 欧美丝袜亚洲另类 | 欧美乱色亚洲激情| 麻豆国产av国片精品| 久久亚洲精品不卡| 在线观看舔阴道视频| 午夜精品在线福利| avwww免费| 欧美高清成人免费视频www| 嫁个100分男人电影在线观看| 成人三级黄色视频| 国产激情欧美一区二区| 18美女黄网站色大片免费观看| 午夜影院日韩av| 一级毛片女人18水好多| 嫩草影院入口| 久久人人精品亚洲av| 看免费av毛片| 亚洲精华国产精华精| 国产野战对白在线观看| 99热精品在线国产| 免费看十八禁软件| 国产成人系列免费观看| 精品久久久久久久人妻蜜臀av| 十八禁人妻一区二区| 五月伊人婷婷丁香| 国产成人精品久久二区二区免费| 午夜福利视频1000在线观看| 午夜福利欧美成人| 91在线观看av| 好男人在线观看高清免费视频| 热99在线观看视频| 亚洲一区二区三区不卡视频| 99精品久久久久人妻精品| 精品国产美女av久久久久小说| 老司机深夜福利视频在线观看| 国产美女午夜福利| 亚洲,欧美精品.| 激情在线观看视频在线高清| 午夜激情欧美在线| 少妇丰满av| 看免费av毛片| 91av网站免费观看| 黑人巨大精品欧美一区二区mp4| 美女cb高潮喷水在线观看 |