• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Quantum Authorization Management Protocol Based on EPRPairs

    2019-06-12 01:24:00YanChangShibinZhangLiliYanGuihuaHanHaiquanSongYanZhangXueyangLiandQirunWang
    Computers Materials&Continua 2019年6期

    Yan Chang ,Shibin ZhangLili YanGuihua HanHaiquan SongYan ZhangXueyang Li and Qirun Wang

    Abstract:Quantum authorization management (QAM)is the quantum scheme for privilege management infrastructure (PMI)problem.Privilege management (authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center (AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob (the owner of resources)authenticates the legality of Alice (the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.

    Keywords:Quantum authorization management,entanglement swapping,fin-grained rights division.

    1 Introduction

    Now,data and communications are omnipresent.The problems of security have come to assume an unprecedented importance.Cryptography is the approach to protect data secrecy in public environment.Both classical cryptosystems and quantum cryptography can solve the problems of security.However,the latter has shown the advantage of higher security because of the strong security basis assured by physical principles.Therefore,quantum cryptography has attracted a great deal of attention now.

    Quantum cryptography,such as quantum key distribution (QKD)[Bennett and Brassard (1984)],quantum secure direct communication (QSDC)[Long and Liu (2002)],quantum identity authentication (QIA)[Dusek,Haderka,Hendrych et al.(1999)],quantum secret sharing (QSS)[Hillery,Buzek and Berthiaume (1999)],quantum signature (QS)[Yang,Lei and Liu (2016)],quantum private query (QPQ)[Gao,Qin,Huang et al.(2019);Wei,Cai,Liu et al.(2018);Gao,Liu,Huang et al.(2015)] provide unconditional security in theory,since the security is assured by the quantum mechanics principles rather than difficulty of computation.Entanglement swapping is a special property of entanglement states,which entangles two quantum systems that originate from independent source and do not share any common past.Entanglement swapping as an important characteristic of entangled particles has been widely used in constructing quantum repeaters and many other -quantum cryptographic protocols.By using EPR pairs and entanglement swapping,[Zhang and Man (2004)] presented DQSDC schema.Later,Wang et al.[Wang,Zhang and Tang (2007)] put forward QSDC schema and multiparty QSS protocol also by using EPR pairs and entanglement swapping.Alexander et al.[Alexander,Claudia and Zhang (2008)] proposed multistage entanglement swapping,which was used as quantum repeater,improved the distance of quantum transmission.

    Privilege management infrastructure (PMI)is an application to provide authorization service management.In classical network,authorization is the act of verifying that a user is allowed to access a resource,which confirms that a user has a permission to carry out an action,such as to gain access to a specific online resource.In fact,privilege management (authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that an authenticated user has the authority to perform an operation,it is more fine-grained [Mark (2005)].In most classical schemes,the authority management center (AMC)manages the resources permissions for all network nodes within the jurisdiction.If the user Alice wants to access the resources of the owner node Bob,Alice must issue a request to the AMC.The AMC will confirm the identity of Alice,then with the help of AMC,Bob and Alice share a key for accessing resources.However,the existence of AMC may likely be the weakest link of the whole scheme.

    Quantum authorization management (QAM)is the quantum scheme for PMI problem.At present,the relevant reports are very few.Zhang et al.[Zhang,Xu,Tang et al.(2007)] proposed a simple quantum authorization scheme,which is a quantum scheme of password passing in basic digest authorization scheme.In Zhang’s scheme,the user either can access all the resources of the owner,or they can access none.This is a coarser-grained rights division.They do not divide the rights further.Akshata et al.[Akshata,Srikanth and Srinivas (2014)] put forward a multipartite protocol in a counterfactual paradigm,which is essentially a quantum scheme of certificate authorization (CA)in e-commerce.In Akshata’s protocol a semi-honest third party is introduced.Alice issues certificates in the form of digital signatures and public-private keys.

    In our protocol,we propose a quantum authorization management (QAM)scheme based on entanglement swapping.Bob (the owner of resources)authenticates the legality of Alice (the user)and then shares the right key for the resources with Alice.Compared with the other two QAM protocols [Zhang,Xu,Tang et al.(2007);Akshata,Srikanth and Srinivas (2014)],our protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.Our authority division is more detailed (fine-grained rights division).We analyze our security from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.

    2 The description of the protocol

    On assumption that,Mresources are included in Bob’s site,each resource can be denoted as binary stringXiL={x1,x2,...,xL} with lengthL,wherexL∈{0,1},i={1,2,...,M};Bob maintains a list of resource access rights for each user,while Bob has the identity information of each user.Alice is one of the user with identity information IDA(a binary string),she can access the resourcesand.Our idea is to help Bob confirm the identity of Alice and distribute a pair of secret key between Alice and Bob which is known completely to Bob and partly to Alice.Here we define Bob’s key asKM={K1L,,...,},where={k1,k2,...,kL},kL∈{0,1}.Then Alice’s key should beKiLand.The scheme is to help them to complete the task safely.

    To start with,we describe entanglement swapping of EPR pairs simply.Suppose that |0> and |1> are the horizontal and vertical polarization states of a photon,respectively.Four Bell states are represented as

    Suppose that photon pairs 1 and 2,3 and 4 are instates.The following equation holds:

    If we perform Bell basis measurements on the photon pair 2 and 3,photon pair 1 and 4 entangles.For example,if the measurement result isthe state of photon pair 1 and 4 isThe entanglement swapping characteristic is also workable for multi-EPR-pairs.

    Step 1.Bob prepares a series of Bell statesandAll particle 1 (particle 2)instates compose particle 1 (particle 2)sequence.All particle 3 (particle 4)instates compose particle 3 (particle 4)sequence.Then Bob sends particle 1 sequence to Alice,and retains particles 2,3 and 4 sequence in his own hand.

    Step 2.Bob measures all particle pairs 2 and 3 with Bell basis,and records the measurement results.By doing so,all particle pairs 1 and 4 entangle.

    Step3.Bob chooses a random subset4BTUof particle 4 sequence and tells Alice the positions.Particles 1 at the corresponding positions form subset1ATU.Particles inUBT4andUAT1compose a random subsetUTof EPR pairs.These EPR pairs are used to detect the entanglement of EPR pairs that Alice and Bob share.Bob measures particles inUBT4withB0=σZorB1=σXbasis randomly.Alice measures particles inUAT1withbasis randomly.Alice and Bob announce their basis/measurement-result pairs inTU.We define {0,1}x=as binary input of Alice’s device,where 0x=and 1x=denote the measurement basis0Aand1Arespectively;y={0,1} is defined as binary input of Bob’s device,wherey=0andy=1denote the measurement basis0Band1Brespectively.We define {0,1}a=and {0,1}b=as the binary outputs of Alice and Bob respectively.Bob calculates the CHSH polynomialWhere the 〈axby〉 is defined asP(a=b|xy)-if the joint state of particles 2 and 3 isAs analyzed in [Pironio,Acin,Brunner et al.(2009)],the qubit measurementsZσ,andXσmaximize the CHSH polynomial for Bell states.Therefore,if the results violate the CHSH inequality (S≤2),Bob thinks that they share the correct entangled states,Bob continues to implement the protocol.These particles for eavesdropping detection inUTand the corresponding particles 2 and 3 are discarded.Otherwise,it is indicated that the particle pairs are not correct entangled pairs,so Bob terminates the protocol.

    By detecting in this step,even if the source and measuring equipment are completely controlled by Eve or provided by Eve,we can find whether the particles 1 and 4 that Alice and Bob share are in the correct entangled states.Then,in the following steps,because of monogamy of non-local correlations,Bob can confirm the identity of Alice correctly and a pair of keys used for accessing resources with correct right can be distributed between Alice and Bob securely.

    Step 4.Bob verify the identity of Alice by means of quantum teleportation.The detailed procedure is as follows:

    (1)Alice prepares a single photon sequence SIDAaccording to IDA(identity information of Alice),the rule is:if theith bit of IDAis 0,Alice prepares |0> state,otherwise Alice prepares |1> state.

    (2)Alice chooses some particles from particle 1 sequence randomly,and performs Bell basis measurement on particles in SIDAand particles she chooses from particle 1 sequence.(3)Alice publishes the positions she chooses and the corresponding measurement results.Then Bob can recover SIDAon particle 4 sequence by performing unitary operations on particles 4 according to Alice’s measurement results.For example,if theith measurement result of Alice isBob performs unitary operationon theith particle 4,by doing so Bob teleports the state of theith particle in SIDAon theith particle 4.

    (4)Bob measures SIDA(he recovered in (3))in Z basis and converts it to binary sequence ID’A,the rule is:If the Bell basis measurement result of particle 2 and 3 in step 2 isBob uses |0> to denote 0,and|1> to denote 1;otherwise,he uses |0> to denote 1,and |1> to denote 0.

    (5)By comparing ID’Aand IDA,Bob can know Alice is legitimate or not.

    If Alice is legitimate,Alice and Bob discard the EPR pairs they used to verify the identity of Alice,and the protocol continues.

    Step 5.Alice and Bob randomly select Z-basis or X-basis to measure particles 4 and 1 respectively.Alice and Bob publish their measurement basis one particle by one particle,until they have 2Lpairs of particles with the same basis,then Alice and Bob stop publishing the measurement basis.Alice and Bob record the measurement basis and measurement results of the 2Lpairs respectively.

    Step 6.Alice and Bob drop the EPR pairs that have been measured.Then Alice and Bob convert the 2Lmeasurement result pairs to binary string keysand,whereKiL={k1,k2,...,kL},kL∈{0,1}.The detailed process is as follows:

    According to the Bell basis measurement results of particles 2 and 3 at the 2Lpositions which are obtained in Step 2,Bob can infer each other’s measurement results.For example,if the state of 2-3 pair isBob infers that the state of 1-4 pair isthen Bob knows that his measurement result is the same with Alice’s result,thus he records his result aski,i∈{1,...2L},ki∈{0,1} (the rule:|0> or |+> denote 0,|1> or |-> denote 1);otherwise Bob knows that his measurement result is contrary to Alice’s result,thus he records his result as.

    According to the rule:|0> or |+> denote 0,|1> or |-> denote 1,Alice also records her results aski,i∈{1,...2L},ki∈{0,1}.By doing so,Alice and Bob share a raw key {k1,k2,...,k2L} with length 2L.Bob and Alice divide the raw key {k1,k2,...,k2L} into two parts,each with lengthL.Then,Alice and Bob know={k1,k2,...,kL} and={k1+L,k2+L,...,k2L},ki∈{0,1}.

    Step 7.Bob divides his remaining measurement results intoM-2 parts,each part hasLresults.According to the rule:|0> or |+> denote 0,|1> or |-> denote 1,Bob converts theM-2 parts intoM-2 binary string keyseach key with lengthL.Then Bob insertsandin front of theith andjth key inKM-2respectively.So far,Alice and Bob have shared a set of keysKM={K1L,K2L,...,},which is known completely to Bob and only theith andjth keys to Alice.Then Bob encrypts his resources with the secret keysK1L,K2L,...,KMLin order,Alice can only access theith andjth resources.

    3 Security analysis

    3.1 The outsider's attack

    First of all,the outsider eavesdropper Eve cannot attack successfully by providing not perfect quantum carriers (EPR pair)[Wang,Yang and Mousoli (2018)] when she provides or controlling the equipment.The reason lies in:If Eve provides not perfect EPR pairs,Alice and Bob will find her behavior by checking the violation of CHSH inequality in Step 3.

    Secondly,in our protocol,the illegal user Eve cannot pass the identity authentication in Step 4,therefore the protocol will not distribute right key for him.

    Thirdly,the identity of Alice is passed to Bob by means of quantum teleportation,which ensures the validity of authentication and absolute security of the identity,therefore the identity can be reused securely.

    3.2 Alice's attack

    In a secure quantum authorization management protocol,Alice is not wanted to access additional resources outside of her rights.Then the purpose of Alice’s attack is to try to access additional resources.

    If Alice is untrustworthy,she can collaborate with Eve,or they are the same person.In this case,Alice will provide untrustworthy devices and try to trick Bob by sending him pure states.However,if Alice sends Bob pure states,the CHSH inequality violation check of Bob in Step 3 will fail,then Alice’s behavior is found by Bob,which leads to a termination of the protocol.Furthermore,Alice cannot publish unreal inputs and outputs in Step 3 to escape the CHSH check of Bob,because the Bell basis measurement in Step 2 will lead to four stateswith equal probability 1/4,Alice does not know the state of each new EPR pair after entanglement swapping.That is to say,Alice does not know the relationship between particle 1 and 4.Therefore,wrong publishing of inputs and outputs of Alice will lead to failure of CHSH inequality violation check of Bob,which also results in a termination of the protocol.

    To know more keys inKM-2,Alice may perform individual attack.For example,in Step 5 Alice measures particles dishonestly inbasis.Here,

    By doing so,Alice can bias the measurement result of Bob.After Alice’s dishonest measurement,Bob’s corresponding particles collapse into stateorFor each particle,the probabilities that Bob obtains results+orare (1 sin 2 )2θ+or (1 sin 2 )2θ- respectively;the probabilities that Bob obtains resultsare cos2θor sin2θrespectively.Because in Step 5,Bob does not publish the measurement basis of the remaining (M-2)Lparticles,Alice guesses right the basis of each particle with probability 1/2.Alice will record the state with larger probability as Bob’s measurement result.For example,if Alice guesses the measurement basis of Bob is X-basis,and (1+sin 2θ)2>(1-sin 2θ)2is satisfied,Alice will recordas Bob’s measurement result.However,because Alice does not know the relationship between particle 1 and 4,she cannot infer Bob’s key.Therefore,if Alice guesses the measurement basis of Bob is X-basis,the probability that Alice knows one bit ofisp=(1+sin 2θ)4when (1+sin 2θ)2>(1-sin 2θ)2 is satisfied;and isp=(1-sin 2θ)4when (1-sin 2θ)2>(1+sin 2θ)2is satisfied;if Alice guesses the measurement basis of Bob is Z-basis,the probability that Alice knows one bit ofisp=cos2θ2when cos2θ> sin2θis satisfied;and isp=sin2θ2when sin2θ> cos2θis satisfied.Obviously the four probabilityp=(1+sin 2θ)4,p=(1-sin 2θ)4,p=cos2θ2 andp=sin2θ2 are all less than 1/2.Therefore,the probability that Alice obtains the keyKiLis less thanThat is to say,through this attack,Alice cannot get a better result than guess.The probability that the eavesdropper guesses right the keyis.WhenL=4,=0.0625,that is to say,whenL≥ 4,the probability that the eavesdropper guesses right the keyKiLis close to zero.

    Furthermore,this attack will lead to error bits which contribute a key for Alice,and thus Alice’s key is inconsistent with Bob,which will cause Alice fails to access resourcesXiLand.Therefore,we think that the user Alice will not cheat to access extra resources at the cost of getting failed access of resourcesand.

    3.3 The analysis of authentication

    Bob kept the binary identity information of Alice (IDA)in advance.When Bob authenticates the identity of Alice,the identity information is converted to single phone sequence and passed to Bob by means of quantum teleportation,which ensures the validity of authentication and absolute security of the identity information,so that the identity information can be reused securely.

    3.4 Comparison with the other two QAM protocols

    In Tab.1,we compare our protocol with the other two QAM protocols [Zhang,Xu,Tang et al.(2007);Akshata,Srikanth and Srinivas (2014)].

    Table 1:The comparison of our protocol with the other two QAM protocols

    In Zhang et al.[Zhang,Xu,Tang et al.(2007)],Alice is an authenticated user of a server Bob.Alice is supposed to have shared a key with Bob previously.Bob does the authorization checking.Once Alice passes Bob’s authorization checking,she can access all resouces at Bob’s site.It is a coarse-grained rights division.Zhang et al.[Zhang,Xu,Tang et al.(2007)] can implement authorization checking without the help of the semihonest third party.However,if Eve controls or provides the source and equipment,the side-channel attack of Eve cannot be resisted.

    In Akshata et al.[Akshata,Srikanth and Srinivas (2014)],Alice is supposed to be an authenticated user in advance.With the help of the semi-honest third party,Alice and Bob share a key.Therefore,Akshata et al.[Akshata,Srikanth and Srinivas (2014)] is a quantum key distribution scheme in essence.If Eve controls or provides the source and equipment,the side-channel attack of Eve also cannot be resisted.

    In our protocol,Alice is not supposed to be an authenticated user in advance.Bob does the authentication checking firstly.Then Alice and Bob share a pair of secret keys which is known completely to Bob but partly to Alice.Our protocol can implement authentication and fin-grained rights division without the help of the semi-honest third party.Furthermore,because of the checking of CHSH’s inequality violation,even if Eve controls or provides the source and equipment,the side-channel attack of Eve can be resisted.

    4 Conclusion

    Here,the protocol has extended the authority division to fin-grained rights division.The protocol not only implements authentication,but also authorizes the user permission to access certain resources.Security of the protocol have been analyzed against the user’s attack and outsider’s attack.

    Acknowledgments:This work is supported by NSFC (Grant Nos.61572086,61402058),the Application Foundation Project of Sichuan Province of China (Grant No.2017JY0168),the National Key Research and Development Program (No.2017YFB0802302),Sichuan innovation team of quantum security communication (No.17TD0009),Sichuan academic and technical leaders training funding support projects (No.2016120080102643),the Fund for Middle and Young Academic Leaders of CUIT (Grant No.J201511).

    日本黄色视频三级网站网址| 又爽又黄无遮挡网站| 国产精品1区2区在线观看.| 秋霞在线观看毛片| 黄色日韩在线| 日本a在线网址| 蜜臀久久99精品久久宅男| 国产在线男女| 成熟少妇高潮喷水视频| 少妇猛男粗大的猛烈进出视频 | 欧美三级亚洲精品| 黄色一级大片看看| 91精品国产九色| 欧美丝袜亚洲另类| 卡戴珊不雅视频在线播放| 91av网一区二区| 别揉我奶头 嗯啊视频| 久久韩国三级中文字幕| 国产精品无大码| 免费无遮挡裸体视频| 亚洲欧美成人精品一区二区| 午夜爱爱视频在线播放| 男女啪啪激烈高潮av片| 国产精品久久久久久久久免| 亚洲精品亚洲一区二区| 国产中年淑女户外野战色| 高清午夜精品一区二区三区 | 色哟哟·www| 99视频精品全部免费 在线| 精品人妻熟女av久视频| 日韩中字成人| 午夜日韩欧美国产| 久久人人爽人人片av| 俄罗斯特黄特色一大片| 国产精品久久久久久亚洲av鲁大| 又黄又爽又刺激的免费视频.| 一级毛片我不卡| 99在线人妻在线中文字幕| 天天躁夜夜躁狠狠久久av| 国产免费男女视频| 简卡轻食公司| 午夜亚洲福利在线播放| 精品国产三级普通话版| 国产午夜精品论理片| 色哟哟·www| 最近最新中文字幕大全电影3| 中国国产av一级| 午夜福利18| 欧美日韩国产亚洲二区| 久久久久久久久久久丰满| 久久久久国内视频| 日日摸夜夜添夜夜爱| 国内少妇人妻偷人精品xxx网站| 2021天堂中文幕一二区在线观| 国产成人freesex在线 | 国产国拍精品亚洲av在线观看| 免费不卡的大黄色大毛片视频在线观看 | 99久国产av精品国产电影| 在线观看午夜福利视频| 性色avwww在线观看| 久久午夜亚洲精品久久| 老司机影院成人| 亚洲成人久久爱视频| 国模一区二区三区四区视频| 国产精品一区www在线观看| 91麻豆精品激情在线观看国产| 色哟哟哟哟哟哟| 成年女人看的毛片在线观看| 在线观看av片永久免费下载| 午夜福利高清视频| 精品人妻偷拍中文字幕| 国产精品综合久久久久久久免费| 精品人妻视频免费看| 国产三级在线视频| 国产精品一区二区性色av| 国产三级中文精品| 国产极品精品免费视频能看的| 亚洲av五月六月丁香网| 亚洲中文字幕一区二区三区有码在线看| 此物有八面人人有两片| 草草在线视频免费看| 日韩欧美三级三区| 久久久久久久久久黄片| 欧美性猛交╳xxx乱大交人| 丝袜美腿在线中文| 六月丁香七月| 亚洲va在线va天堂va国产| 午夜福利在线观看吧| 日韩 亚洲 欧美在线| 成人av在线播放网站| 人妻少妇偷人精品九色| 免费看av在线观看网站| 亚洲久久久久久中文字幕| 晚上一个人看的免费电影| 亚洲第一电影网av| 人妻丰满熟妇av一区二区三区| 国产亚洲精品综合一区在线观看| 在线a可以看的网站| 久久欧美精品欧美久久欧美| 久久久成人免费电影| 亚洲精品粉嫩美女一区| 亚洲av第一区精品v没综合| 午夜精品在线福利| 成人av在线播放网站| av女优亚洲男人天堂| 日本撒尿小便嘘嘘汇集6| 欧美成人精品欧美一级黄| 色av中文字幕| 少妇的逼水好多| 精品少妇黑人巨大在线播放 | 黑人高潮一二区| 一区福利在线观看| 国内精品美女久久久久久| 久久久久国产网址| 亚洲丝袜综合中文字幕| 在线播放无遮挡| 特级一级黄色大片| 人妻丰满熟妇av一区二区三区| 亚洲久久久久久中文字幕| 欧美国产日韩亚洲一区| 又黄又爽又刺激的免费视频.| 成人欧美大片| 免费观看精品视频网站| 欧美日本视频| 色综合色国产| 日本黄大片高清| 国产高潮美女av| 成人毛片a级毛片在线播放| 日本成人三级电影网站| 中文亚洲av片在线观看爽| 99久久九九国产精品国产免费| 亚洲经典国产精华液单| 久久久久国产网址| 国产精品不卡视频一区二区| 亚洲无线观看免费| 欧美日韩国产亚洲二区| 亚洲性久久影院| 国产伦精品一区二区三区四那| 联通29元200g的流量卡| 亚洲人成网站在线观看播放| 亚洲三级黄色毛片| 人妻丰满熟妇av一区二区三区| 成人美女网站在线观看视频| 国产精品一区二区免费欧美| 丝袜喷水一区| 午夜日韩欧美国产| 国产成人一区二区在线| 欧美日韩国产亚洲二区| 欧美+日韩+精品| 久久鲁丝午夜福利片| 身体一侧抽搐| 最新中文字幕久久久久| 麻豆国产97在线/欧美| 丝袜美腿在线中文| 老司机影院成人| 午夜精品国产一区二区电影 | 男女啪啪激烈高潮av片| 亚洲精品成人久久久久久| 国产蜜桃级精品一区二区三区| 日韩欧美免费精品| 亚洲欧美清纯卡通| 国产视频内射| av黄色大香蕉| 亚洲欧美日韩东京热| 国产精品久久久久久亚洲av鲁大| 国产精品一及| 亚洲国产精品成人综合色| 51国产日韩欧美| 欧美高清性xxxxhd video| av专区在线播放| 国产黄片美女视频| 12—13女人毛片做爰片一| 大型黄色视频在线免费观看| 五月伊人婷婷丁香| 亚洲无线在线观看| 亚洲精品影视一区二区三区av| 1024手机看黄色片| 老司机影院成人| 中出人妻视频一区二区| 久久久久久久久久久丰满| 大又大粗又爽又黄少妇毛片口| 一级毛片aaaaaa免费看小| 网址你懂的国产日韩在线| 精华霜和精华液先用哪个| 少妇的逼好多水| 日本一二三区视频观看| 欧美另类亚洲清纯唯美| 日韩在线高清观看一区二区三区| 此物有八面人人有两片| 麻豆国产97在线/欧美| 天天躁日日操中文字幕| 久久久国产成人免费| 欧美高清性xxxxhd video| 日本一本二区三区精品| 午夜日韩欧美国产| 两个人的视频大全免费| 大型黄色视频在线免费观看| 久久亚洲精品不卡| av在线天堂中文字幕| 人妻少妇偷人精品九色| 久久精品国产亚洲av天美| 亚洲,欧美,日韩| 欧美不卡视频在线免费观看| 午夜福利在线观看免费完整高清在 | 欧美在线一区亚洲| 性插视频无遮挡在线免费观看| 好男人在线观看高清免费视频| 高清毛片免费看| 三级经典国产精品| 免费看a级黄色片| 变态另类丝袜制服| 男插女下体视频免费在线播放| 国产单亲对白刺激| 国产大屁股一区二区在线视频| 国产激情偷乱视频一区二区| 精品人妻一区二区三区麻豆 | 亚洲国产精品合色在线| 国产高清视频在线播放一区| av免费在线看不卡| 我要看日韩黄色一级片| 精品一区二区三区视频在线| 99热这里只有是精品在线观看| 在线看三级毛片| 精品久久久噜噜| 网址你懂的国产日韩在线| ponron亚洲| 此物有八面人人有两片| 色哟哟·www| 高清毛片免费观看视频网站| 国产精品久久电影中文字幕| 亚洲av不卡在线观看| 亚洲av免费高清在线观看| 麻豆乱淫一区二区| 成人欧美大片| 日本-黄色视频高清免费观看| 亚洲中文字幕一区二区三区有码在线看| 国产蜜桃级精品一区二区三区| 一区福利在线观看| 69av精品久久久久久| 欧美xxxx性猛交bbbb| 看黄色毛片网站| 小说图片视频综合网站| 丰满人妻一区二区三区视频av| 97人妻精品一区二区三区麻豆| 国产精品一区二区三区四区久久| 免费观看的影片在线观看| 别揉我奶头~嗯~啊~动态视频| 精品久久久久久久久久久久久| 亚洲色图av天堂| 自拍偷自拍亚洲精品老妇| 有码 亚洲区| 精品无人区乱码1区二区| 欧美高清成人免费视频www| 我的老师免费观看完整版| 在线免费观看的www视频| 色综合亚洲欧美另类图片| АⅤ资源中文在线天堂| 女人十人毛片免费观看3o分钟| 99riav亚洲国产免费| 九九爱精品视频在线观看| 久久久久久久久中文| 亚洲成a人片在线一区二区| 精品99又大又爽又粗少妇毛片| 国产精品亚洲美女久久久| 嫩草影视91久久| 免费不卡的大黄色大毛片视频在线观看 | 久久亚洲国产成人精品v| 成人av一区二区三区在线看| 亚洲精品色激情综合| 成人无遮挡网站| 亚洲真实伦在线观看| 国产精品三级大全| 国产精品一二三区在线看| 天天一区二区日本电影三级| 婷婷精品国产亚洲av在线| 免费人成视频x8x8入口观看| 久久久精品大字幕| 少妇人妻一区二区三区视频| videossex国产| 天堂av国产一区二区熟女人妻| 男人舔奶头视频| 久久精品综合一区二区三区| 久久人人爽人人片av| 99热这里只有精品一区| 国产精品女同一区二区软件| 国产亚洲精品久久久com| 亚洲av电影不卡..在线观看| 国产av麻豆久久久久久久| 中文亚洲av片在线观看爽| 黑人高潮一二区| 麻豆国产av国片精品| 国产高清三级在线| 全区人妻精品视频| 久久中文看片网| 亚洲aⅴ乱码一区二区在线播放| 国产亚洲欧美98| 亚洲国产日韩欧美精品在线观看| 国产乱人视频| 久久精品综合一区二区三区| 给我免费播放毛片高清在线观看| 亚洲av不卡在线观看| 亚洲成av人片在线播放无| 国产女主播在线喷水免费视频网站 | 日韩欧美免费精品| 性色avwww在线观看| 欧美中文日本在线观看视频| 免费av观看视频| 亚洲精品日韩av片在线观看| av卡一久久| 日本三级黄在线观看| 欧美绝顶高潮抽搐喷水| 在线观看一区二区三区| 少妇猛男粗大的猛烈进出视频 | 99九九线精品视频在线观看视频| 美女高潮的动态| 日韩,欧美,国产一区二区三区 | 美女高潮的动态| 国产在线男女| 国产高潮美女av| 99在线人妻在线中文字幕| 国产黄色视频一区二区在线观看 | 色哟哟哟哟哟哟| 久久精品夜夜夜夜夜久久蜜豆| 有码 亚洲区| 春色校园在线视频观看| 性欧美人与动物交配| 真人做人爱边吃奶动态| 国产亚洲精品久久久久久毛片| av中文乱码字幕在线| 精品久久国产蜜桃| 高清毛片免费观看视频网站| 99热这里只有精品一区| 国产伦一二天堂av在线观看| 两个人的视频大全免费| 亚洲美女视频黄频| 69人妻影院| 99热全是精品| 欧美一级a爱片免费观看看| 亚洲精品一卡2卡三卡4卡5卡| 亚洲精品在线观看二区| 哪里可以看免费的av片| 日韩高清综合在线| 亚洲av不卡在线观看| 成人永久免费在线观看视频| 国产成人精品久久久久久| 国产高清激情床上av| 观看美女的网站| 韩国av在线不卡| 啦啦啦韩国在线观看视频| 成人特级黄色片久久久久久久| 亚洲欧美成人综合另类久久久 | 欧美又色又爽又黄视频| 国产蜜桃级精品一区二区三区| 日本免费a在线| 热99re8久久精品国产| 欧美最黄视频在线播放免费| av天堂中文字幕网| 精品久久久久久久久亚洲| 欧美日韩乱码在线| 欧美xxxx性猛交bbbb| 成人一区二区视频在线观看| 国产亚洲精品久久久久久毛片| 久久精品夜夜夜夜夜久久蜜豆| 69人妻影院| 国产精品久久久久久久久免| 亚洲无线观看免费| 国产精品久久久久久亚洲av鲁大| 成年女人永久免费观看视频| 亚洲av免费高清在线观看| 亚洲美女搞黄在线观看 | 69av精品久久久久久| 晚上一个人看的免费电影| 欧美三级亚洲精品| 丰满乱子伦码专区| 亚洲五月天丁香| 成人性生交大片免费视频hd| 中文字幕人妻熟人妻熟丝袜美| 日韩人妻高清精品专区| 床上黄色一级片| 最近2019中文字幕mv第一页| 国产精品不卡视频一区二区| 嫩草影视91久久| 久久久久久久久大av| 欧美成人一区二区免费高清观看| 99热这里只有精品一区| 看黄色毛片网站| 18禁黄网站禁片免费观看直播| 一级毛片我不卡| 精品久久久久久久人妻蜜臀av| 美女免费视频网站| 两个人视频免费观看高清| 国产亚洲欧美98| 亚洲国产精品合色在线| 男女下面进入的视频免费午夜| 男人舔女人下体高潮全视频| 免费大片18禁| 色av中文字幕| 日本黄大片高清| 日日摸夜夜添夜夜爱| 久久久久久久亚洲中文字幕| ponron亚洲| 91久久精品国产一区二区三区| 欧美色欧美亚洲另类二区| 亚洲无线观看免费| avwww免费| 18禁裸乳无遮挡免费网站照片| 久久久久久久亚洲中文字幕| 精品人妻偷拍中文字幕| 亚洲av一区综合| av女优亚洲男人天堂| 麻豆一二三区av精品| 国产一级毛片七仙女欲春2| 男人舔女人下体高潮全视频| 国产精品爽爽va在线观看网站| 午夜福利视频1000在线观看| 亚洲久久久久久中文字幕| 午夜日韩欧美国产| 国内精品美女久久久久久| 婷婷六月久久综合丁香| 日本a在线网址| 亚洲av成人精品一区久久| 国产精品亚洲一级av第二区| 国产精品,欧美在线| 久久久色成人| 国产av麻豆久久久久久久| av在线蜜桃| 成人特级av手机在线观看| 亚洲美女搞黄在线观看 | 草草在线视频免费看| 精品久久久久久久末码| av专区在线播放| 日韩一本色道免费dvd| 亚洲av熟女| 99久国产av精品| 亚洲成人av在线免费| 丰满人妻一区二区三区视频av| 国产精华一区二区三区| 精品久久久噜噜| 在线天堂最新版资源| 国产高清激情床上av| 日日摸夜夜添夜夜爱| 最近2019中文字幕mv第一页| 成人性生交大片免费视频hd| 国产欧美日韩精品一区二区| 欧美三级亚洲精品| 亚洲精品色激情综合| 久久午夜亚洲精品久久| 免费av观看视频| 亚洲av中文av极速乱| 日本一二三区视频观看| 搞女人的毛片| avwww免费| 精品欧美国产一区二区三| 人妻丰满熟妇av一区二区三区| 国产高清视频在线播放一区| 日日摸夜夜添夜夜爱| 日韩欧美在线乱码| 欧美精品国产亚洲| 亚洲av电影不卡..在线观看| 日本成人三级电影网站| 亚洲欧美成人综合另类久久久 | 天堂av国产一区二区熟女人妻| 久久这里只有精品中国| 美女 人体艺术 gogo| 在线天堂最新版资源| 亚洲熟妇熟女久久| 内地一区二区视频在线| 日日啪夜夜撸| 成人无遮挡网站| 久久久欧美国产精品| 在线免费观看的www视频| 成人二区视频| 91久久精品电影网| 欧美zozozo另类| 欧美高清成人免费视频www| 国产精品人妻久久久影院| 欧美极品一区二区三区四区| 欧美日本亚洲视频在线播放| 乱系列少妇在线播放| 亚洲av五月六月丁香网| 舔av片在线| 日日摸夜夜添夜夜添小说| 色综合亚洲欧美另类图片| 国产91av在线免费观看| 人人妻,人人澡人人爽秒播| 亚洲人与动物交配视频| 成人高潮视频无遮挡免费网站| 免费观看人在逋| 欧美日本视频| 最近视频中文字幕2019在线8| 中文字幕av在线有码专区| 亚洲国产欧洲综合997久久,| 国产欧美日韩一区二区精品| 亚洲欧美精品自产自拍| 免费搜索国产男女视频| 免费看光身美女| 欧美一区二区亚洲| 亚洲人成网站在线观看播放| 午夜a级毛片| 国产v大片淫在线免费观看| 午夜福利在线在线| 免费观看人在逋| 免费观看精品视频网站| 在线免费观看的www视频| 中文在线观看免费www的网站| 国产三级在线视频| 国产亚洲欧美98| 亚洲精品在线观看二区| 三级毛片av免费| 国产女主播在线喷水免费视频网站 | 亚洲无线观看免费| 变态另类丝袜制服| 成人美女网站在线观看视频| 少妇丰满av| 精品无人区乱码1区二区| av在线蜜桃| 麻豆国产av国片精品| 欧美三级亚洲精品| 精品欧美国产一区二区三| 极品教师在线视频| 嫩草影视91久久| 亚洲欧美日韩卡通动漫| 免费看av在线观看网站| 蜜臀久久99精品久久宅男| a级毛色黄片| 在线观看免费视频日本深夜| 一夜夜www| 久久久久免费精品人妻一区二区| 久久久久久大精品| 国产69精品久久久久777片| 久久精品人妻少妇| 最近2019中文字幕mv第一页| 91久久精品电影网| 夜夜爽天天搞| 国产 一区 欧美 日韩| 国内揄拍国产精品人妻在线| 熟女人妻精品中文字幕| 亚洲欧美精品自产自拍| 亚洲av一区综合| 欧美最黄视频在线播放免费| 99久久精品热视频| 如何舔出高潮| 人妻制服诱惑在线中文字幕| 欧美性感艳星| 日本一本二区三区精品| 黑人高潮一二区| 国产高清三级在线| 草草在线视频免费看| 亚洲国产精品成人久久小说 | 尾随美女入室| 久久久久久国产a免费观看| 亚洲人成网站高清观看| 精品一区二区免费观看| 国产精品久久电影中文字幕| 亚洲精品一区av在线观看| 99热这里只有是精品在线观看| 九九在线视频观看精品| 欧美性猛交╳xxx乱大交人| 联通29元200g的流量卡| 久久精品影院6| 99精品在免费线老司机午夜| 国产欧美日韩精品亚洲av| 久久久久久久久久久丰满| 国产精品国产三级国产av玫瑰| 又爽又黄a免费视频| 91麻豆精品激情在线观看国产| 日本三级黄在线观看| avwww免费| 麻豆av噜噜一区二区三区| 91av网一区二区| 99热6这里只有精品| 欧美+亚洲+日韩+国产| 最新在线观看一区二区三区| 日本与韩国留学比较| 99热全是精品| av在线观看视频网站免费| 麻豆成人午夜福利视频| 欧美区成人在线视频| 超碰av人人做人人爽久久| 日韩,欧美,国产一区二区三区 | 欧洲精品卡2卡3卡4卡5卡区| 3wmmmm亚洲av在线观看| 亚洲av免费高清在线观看| 全区人妻精品视频| 成人无遮挡网站| 熟女人妻精品中文字幕| 国产精品无大码| 男人狂女人下面高潮的视频| 精华霜和精华液先用哪个| 男人和女人高潮做爰伦理| 在线观看av片永久免费下载| 亚洲四区av| 国产一级毛片七仙女欲春2| 国内精品宾馆在线| 日本免费一区二区三区高清不卡| 能在线免费观看的黄片| 国产高潮美女av| 一进一出抽搐动态| 久久精品人妻少妇| 两个人视频免费观看高清| h日本视频在线播放| 插阴视频在线观看视频| 国产极品精品免费视频能看的| 欧美成人一区二区免费高清观看| 熟女电影av网| 精品欧美国产一区二区三| 波多野结衣高清无吗| 国产v大片淫在线免费观看| 国产 一区精品| 亚洲国产精品国产精品| 亚洲一级一片aⅴ在线观看| 成人综合一区亚洲| a级毛片免费高清观看在线播放| 国内精品一区二区在线观看| 午夜福利在线观看吧|