• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution

    2019-11-06 00:44:18YiBoZhao趙義博WanLiZhang張萬里DongWang王東XiaoTianSong宋蕭天LiangJiangZhou周良將andChiBiaoDing丁赤飚
    Chinese Physics B 2019年10期
    關鍵詞:王東

    Yi-Bo Zhao(趙義博), Wan-Li Zhang(張萬里), Dong Wang(王東), Xiao-Tian Song(宋蕭天),Liang-Jiang Zhou(周良將),3,?, and Chi-Biao Ding(丁赤飚),3

    1National Key Laboratory of Microwave Imaging Technology,Beijing 100190,China

    2Institute of Electronics,Chinese Academy of Sciences,Beijing 100190,China

    3University of Chinese Academy of Sciences,Beijing 100049,China

    Keywords:quantum secure imaging(QSI),quantum key distribution(QKD),digital micro-mirror device(DMD),quantum bit error rate(QBER)

    1.Introduction

    How to enhance the anti-jamming ability of radar is an urgent problem to be solved in the traditional radar countermeasures technology.[1,2]In the last two decades,with the intensive research and development of the techniques of quantum communication,[3–5]quantum imaging,[6–22]and quantum radar,[23,24]a series of results have been obtained,which provide a solution for improving the anti-jamming ability of radar.

    In 1995,quantum imaging was first observed,[6]also known as ghost imaging(GI).Entangled photon pairs produced by spontaneous parametric down-conversion were used,while one of the photons passing through the object was collected by a photon counter or a bucket detector with no spatial resolution(called the signal beam or object beam),its twin photon was detected by a multipixel detector[e.g.,a chargecoupled device(CCD)camera]without ever passing through the object(called the reference beam).Nevertheless,by correlating the intensities measured by the bucket detector with the intensities of each pixel in the multipixel detector,an image of the object was reconstructed.[6]In a long time,entanglement swapping was considered as the necessary condition for GI.[25]However,from 2002 GI was implemented by classical light sources,[9–18]especially the groups of Wang,[12]Wu,[13]and Han[14,15]accomplished a large numbers of GI experiments based on pseudo-thermal or real thermal light sources,which proved that entanglement is not the one and only way to achieve GI.After then,computational ghost imaging(CGI)was proposed[19]and verified by experiments,[20,21]which could be deployed with only one optical beam and one detector with no spatial resolution by replacing the reference beam with a controllable and pre-modulated light source.[22]The greatly simplified imaging system reduces the number of preset patterns and the imaging computational complexity,and then raises the imaging efficiency.[22]Based on the above,CGI and quantum secure imaging(QSI)could be applied to radar imaging faultlessly.Reference[8]introduced an anti-jamming quantum radar imaging(QRI)that utilized the BB84 protocol quantum key distribution(QKD)based on polarization encoding,which could verify the authenticity of imaging information by detecting the consistency of photon polarization states between the sender and the receiver. Up to now,the BB84 protocol is the most mature and widely used quantum key distribution protocol and its theoretical security has been fully proved.[26,27]Therefore,intercept-resend attacks are exposed immediately and the authenticity of the imaging information can be guaranteed through combining the CGI and QKD on radar technology.In addition,the quantum imaging technology has many advantages of higher resolution,higher contrast,higher signal-to-noise ratio(SNR),and less influence of atmospheric turbulence[7]compared with the traditional imaging.QSI will has great application value in the fields of aerial detection,military reconnaissance,and battlefield imaging in the future.

    Inspired by Ref.[8],we present a QSI scheme combining the phase-encoding BB84 QKD and CGI technology.Unlike the original scheme,our scheme adopt phase-encoding QKD,in which the relative phase is rather stable against disturbance.Moreover,owing to the fact that perfect single-photon source is still unavailable,a pulsed laser source with Poisson distribution is used in the QKD system.By combing the decoy-state method,we can estimate the contribution of the multi-photon part to obtain the lower bound of QBER under the interceptresend jamming attack,which is tighter than the origin one.In our experiment,a digital micro-mirror device(DMD)with quick response speed is used to preset the specific spatial distribution of the light intensity,and a single-photon detector(SPD)with quick response speed is used to measure the total light intensity,eventually the image of the object is retrieved through calculating the intensity distribution and the total intensity of light.Comparing with the traditional ghost imaging(TGI),QSI has been greatly improved in the data sampling rate and reduced in the imaging algorithm complexity and shortened the imaging time.More importantly,the quantum bit error rate(QBER)and the secure key rate of QKD are obtained in the experiment to see through the intercept-resend jamming attacks and ensure the authenticity of the imaging information.

    2.Theory and method

    The QSI system contains the imaging system and the QKD system,as shown in Fig.1,which mainly includes a QKD sender(Alice),a QKD receiver(Bob),and the spatial light path of CGI in more details.In our scheme,Alice sends out strongly attenuated coherent states with key bits information,which is encoded into the relative phase of a pair of coherent states shifted in time that are generated by an asymmetric interferometer.These photons pass through the beam expanding lens,the obtained speckle is then modulated into a specific spatial distribution of intensity with a DMD.The pulse with certain intensity distribution illuminates the object,and is coupled into the receiver,performs the decoding and detecting procedure.Finally we can reconstruct the image of the object with the detected counts.It should be stressed that in the QKD procedure,the key bits information is encoded into the relative phase between the two time-bin mode of signal pulses,which is rather stable during the display time of one frame of the DMD,since the modulation of DMD just changes the global phase of the whole two-time-bin pulses rather than the relative phase between them. Therefore,the pulses passing through the imaging optical path and arrive at Bob without changing the coding information,and can be further correctly decoded by Bob.Compared with the conventional CGI system,the major difference is that the light source and detector are replaced by a QKD sender and receiver in our QSI scheme,with which the security of imaging can be promoted.As it is necessary to measure the photon counts and QBER during the display time of every pattern loaded in the DMD,the trigger signals of the laser,the DMD,and the SPDs should be synchronized.The image of the object is reconstructed through calculating the pre-modulated intensity distribution of the DMD and the measured total intensity of the SPDs,while the QBER is monitored to estimate whether the imaging process is safe and real.

    Fig.1. Schematic of the quantum secure imaging system. Polarized single-photon from Alice passes through the beam expanding lens,is modulated into specific spatial intensity distribution by the DMD,then transmits through the object,finally is coupled into Bob and detected by SPDs.The image of the object is reconstructed and the QBER is monitored to estimate whether the imaging process is safe and real. The angle of reflection from the DMD is exaggerated in the figure for clarity but is about 24?in reality.

    2.1.Quantum key distribution system

    Quantum key distribution technology is one of the most mature and commonly used communication methods in quantum communication,as well as the BB84 protocol in QKD protocol,whose theoretical security has been fully proved.[26,27]So,we adopt the scheme based on the phase encoding BB84 protocol of QKD.[3,4]Our QKD system is shown in Fig.2.It is composed of two parts of Alice and Bob.Alice uses a pulsed laser to produce coherent pulses.An intensity modulator is used to produce signal and decoy pulses of differing intensities.The vacuum pulse is produced by omitting trigger signal to the laser.An unbalanced Mach–Zehnder interferometer(UMZI)with a phase modulator(PM)in the long arm plays the role of encoder,while there is an identical UMZI in Bob.[3]SPDs are deployed by Bob to detect the interferometric outcomes from the interferometer.Moreover,an electronic variable optical attenuator(EVOA)is used to attenuate the intensity of the laser pulses to the single-photon level before sending out from the sender.[26]In the experiment,the intensities of the signal and decoy pulses are set asμand ν to perform the weak+vacuum decoy-state BB84 QKD protocol.[28]

    Fig.2.Schematic of the phase encoding and weak+vacuum decoy-state BB84 protocol QKD.IM:intensity modulator;BS:beam splitter;PM:phase modulator;EVOA:electronic variable optical attenuator;SPD:single-photon detector.The signal and decoy pulses are produced by IM.Two identical UMZIs in Alice and Bob play roles of encoder.An EVOA is used to attenuate the intensity of the laser pulses to the singlephoton level.

    According to the phase encoding BB84 protocol,the relative phase on Alice is selected randomly from four values 0,π/2,π,and 3π/2,where 0,π are in the Z basis,and π/2,π/2 are in the X basis.Bob measures the incoming quantum states from Alice also in Z or X basis randomly.Whenever Alice and Bob use the same basis,the two SPDs will get correct results with a small QBER.However,when they use different bases,the two SPDs will get an uncertain result together.Alice then reveals only whether or not the state in which she encoded that qubit is compatible with the basis announced by Bob.If the state is compatible,they keep the bit;if not,they disregard it.In this way,fifty percent of the bit string is discarded.This shorter key obtained after basis reconciliation is called the sifted key.

    2.2.Intercept-resend eavesdropping strategy

    In the practical QKD system,Alice uses the weak coherent source(WCS)together with the decoy-state method to substitute the unavailable single-photon source. The photon number of each pulse follows the Poisson distribution. The probability of finding an n-photon state in a pulse is given bywhereμis the mean photon number.With the phases randomization,the states sent by Alice are described by

    In the case of quantum secure imaging or quantum radar,the potential attacker usually adopts the intercept-resend strategy to forge the target.Since the QKD system is applied to enhance its security,here we just consider the intercept-resend quantum eavesdropping strategy that was proposed by Curty et al.[29]Eve’s attack strategy can be decomposed into three steps. In the first step,Eve obtains the total photon number n of each pulse sent by Alice via a quantum non-demolition(QND)measurement without introducing any errors. Then she performs a filter operation on the statewith the intention to make them distinguishable with some finite probability.Finally,in the third step,Eve measures each filtered state with the so-called square-root measurement(SRM).This measurement gives her the minimum value of the error probability when distinguishing symmetric states.After deciding which state was used by Alice,Eve needs to prepare a new signal in the state identified and gives it to Bob. The error rate introduced by Eve with this eavesdropping strategy for a signal state containing n photons is given by

    The analysis for the case of n=2 is similar.The coefficients cj(2)of the signal statesare of the formsandrespectively.The partial error rate e2is given by

    In order to give the lower bound of total error rate of the signal state at the present of intercept-resend attack,we adopt the model of decoy-state method to estimate the yield of photon pulses.[28]In the weak+vacuum decoy-state method,Alice randomly prepares the signal,decoy,and vacuum state with intensities ofμ,ν,and 0,respectively.For 0<ν<μ≤1,the following inequalities hold for all n ≥3:

    The overall gains of the signal and decoy state are given by

    where Ynis the yield of an n-photon state,i.e.,the conditional probability of a detection event at Bob’s side given that Alice sends out an i-photon state.

    By using the inequalities(6)and Eq.(8),the joint contribution of one-photon and two-photon components can be deduced as follows:

    where Y0is the background rate,which includes the detector dark count and other background contributions such as the stray light from timing pulses.

    The total error rate of the decoy state when Eve performs the intercept-resend attack is given by

    where eiis the error rate of the i-photon state,and the error rate of the background e0=1/2.Thus we can obtain the lower bound of the decoy state total error rate

    Therefore,one can monitor the error rate of the decoy state,when the error rate of our QSI system is greater thanit implies the existence of Eve and the images obtained from a signal cannot be considered secure.In addition,whether our QKD system obtains secure keys can also be a criterion of secure imaging.

    2.3.Computational quantum imaging system

    CGI is an improvement from TGI.A spatial light modulator(SLM)or a CCD is used to preset the specific spatial distribution of the light intensity.Disregarding the reference beam,so just a single-pixel detector is needed.[20]In this imaging scheme,take the DMD to be a part of Alice. According to the security requirement of the decoy state BB84 protocol,the intensity of the laser pulses has to be lowered to the singlephoton level at the exit of the DMD by an EVOA.

    As in our scheme,a DMD is used to preset intensity patterns of speckles,and single-photon detectors are employed to measure the counts corresponding to each pattern. Suppose N is the number of intensity patterns modulated by the DMD,one can obtain the total count Bi(1 ≤i ≤N)during the display time of the i-th pattern,whose intensity distribution is denoted by Ii(x,y)(1 ≤i ≤N).Then the image of the object can be obtained by summing the calculated intensities Iiwith the appropriate weights Bi[20]

    where

    is the mean value of Bi,and Bimeets the following formula:

    where T(x,y)is the transmission function of the object.

    3.Experiment and results

    The QSI system is set up as shown in Fig.3.In the QKD system,the pulsed laser is working at a frequency of 40 MHz and a central wavelength of 1550.12 nm.The SPD is working at Geiger mode and has a detection efficiency of 10%for photons.The intensities of the signal,decoy,and vacuum state are set toμ=0.68,ν=0.18,and 0 with the probabilities of 13/16,2/16,and 1/16,respectively.In the quantum imaging part,the array of the DMD micro-mirrors(G4100 from TI,the control board is made by x-digit)is 1024×768,and the size of every micro-mirror(one pixel)is 13.68μm×13.68μm.Since each micro-mirror is so small that the laser energy reflected from it is extremely low,a new array of 24×24 pixels is reselected and controlled with the same state in any case.The size of the new block is approximately 328.32μm×328.32μm when ignoring the gaps between the micro-mirrors.We choose only the square areas wherever covered by the light spot and the intensity is adequate enough.So,the DMD is divided into 20×20=400 blocks,Figure 4 shows the simplest binary pattern loaded into the DMD that only one block is in the“on”state and the others are in the“off”state. In all the binary patterns,each block appears just only once,which is similar to spot scanning. In this way,only 400 binary patterns are needed,which can reduce the complexity of the imaging algorithm and greatly save the imaging time.

    After completing the connection of experimental devices as shown in Fig.3,set up the frames number N=400 and frame frequency f=200 Hz.Run the DMD in the fully open mode,and make the QKD work normally through scanning,and set up every parameter within QKD before placing the object.Then,put the“+”type object into this system,and load 400 random binary patterns into the DMD.Run the whole system synchronously.The signal photon counts and QBER are measured during the display time of each pattern frame.The corresponding results of the QKD procedure are shown in Table 1,which are obtained by following the standard decoystate BB84 QKD protocol.According to Eq.(11),the reconstructed image of the object is shown in Fig.5.The SNR is 23 dB,where SNR is defined asis the average of the signal intensity,and σnis the variance of the background intensity. The difference between the average intensities of the bright and dark regions of the images is regarded as the signal,and the variation of dark background is considered as the noise.[22,30]The lower bound of the error rate is calculated to be 14.51%according to Eq.(10),and a secure key rate of 571.0 bps is achieved during the imaging period.

    As can be seen from Table 1 and Fig.5,the image information of the object can be obtained by using the QSI scheme,and the average QBER is 3.99%,which is below the lower bound and proves that the imaging process is safe and real.Once the jammer of object tries to carry out the interceptresend strategy,it is bound to lead to the over threshold increase of QBER under the premise of presence of photon counts. In general,we think that the jammer of object has carried on the intercept-resend strategy and the imaging is no longer safe and real when the average of QBER is higher than 14.51%.Therefore,our QSI system can be used as quantum secure radar against jammers.

    Fig.3.Experimental setup of the QSI system.The red arrows indicate the path of light roughly.

    Fig.4.The simplest binary pattern loaded into the DMD that only one block is in the on state and the others are in the off state.

    Table 1.Experimental results of QKD procedure.

    Fig.5.Results of numerical simulation and QSI experiment of a“+”type object.(a)The result of numerical simulation of imaging the object according to Eq.(11).(b)The result of using the measured signal intensity distribution for imaging the object directly.(c)The result of calculating the measured signal intensity and the presetting intensity distribution for imaging the object according to Eq.(11),which is better than(b).

    At the same time,we can see that the image resolution is not high.The main reason is the serious diffraction effect of the DMD.As we know,the DMD is composed of many micro mirrors,which is similar to a two-dimensional diffraction grating.It has a strong diffraction effect on monochromatic light,and becomes stronger with the increase of the wavelength,[31]which can hardly even be used for imaging in the mid-infrared band. Therefore,even if all the micro mirrors of the DMD keep in the off state,the detector will still measure much energy due to the diffraction effect,which will greatly reduce the SNR and the imaging quality. As a result,neither the new block of the binary patterns can be too small,otherwise the diffraction noise will drown out the signal energy which makes the SNR relatively low.Nor the new block can be too large,otherwise the imaging resolution will be dissatisfactory.Therefore,it is necessary to find a balanced block in the experiment that makes the imaging quality best.In our experiment,the block with size of 328.32μm×328.32μm is relatively appropriate.In addition,we can minimize the diffraction effect by the following three methods. Firstly,we can change the distribution of the diffraction spots and energy by adjusting the incident angle of light on the DMD to minimize the diffraction effect.Secondly,we can increase the distance between the DMD and the detector to reduce the diffraction effect,because the diffraction spots are distributed at some certain angles.The farther away the distance,the larger deviation of the diffraction spots,and the less stray light coupled into the detector.Finally,we can design the wavelength of the light to match the DMD to reduce the diffraction effect,but all the devices need to be matched to this wavelength,such as the DMD,the laser,and the detector of QKD,which is a troublesome and complex thing.In the future works,we will focus on the research how to reduce the diffraction effect of DMD to make the imaging quality optimal.

    4.Conclusion

    We propose a QSI scheme based on the phase encoding and weak+vacuum decoy-state BB84 protocol QKD that can resist the intercept-resend strategy of the jammers. The authenticity and safety of the imaging process are ensured by the theoretical unconditional security of QKD,and the QBER and the secure key rate analytical functions of QKD are used to estimate whether the jammer of object carries out the interceptresend attacks.In our experiment,we obtain a secure key rate of 571.0 bps and a secure average QBER of 3.99%,which is below the lower bound of 14.51%. In the imaging system,we synthetically use the CGI scheme,SPDs and DMD both with faster response speed that greatly improve the imaging efficiency.This scheme is suitable for both objects with transmission or reflection. Furthermore,the system uses a WCS with invisible wavelength of 1550 nm,which can realize weak-light imaging and be immune to the stray light or air turbulence.Thus,it will become a better choice for quantum secure radar against jammers.But at the same time,it is undeniable that the more obvious diffraction effect of the DMD on the longer wavelength light will reduce the imaging SNR and quality.We believe that the diffraction effect can be minimized and the imaging quality can be improved by continuously adjusting the incident angle of light on the DMD,increasing the distance between the DMD and the detector,or designing the wavelength of the light to match the DMD.

    Acknowledgment

    We acknowledge Xiaoming Lu,Di Jiang,and Bin Chen for fruitful discussions and software support.

    猜你喜歡
    王東
    段玉裁《說文解字注》校訂《古今韻會舉要》探略
    天中學刊(2022年4期)2022-09-29 07:21:22
    我是老宋
    安徽文學(2022年7期)2022-07-14 09:51:33
    迷彩色在通信基站天線美化中的應用探析
    瘋狂暗示
    愛你(2020年7期)2020-11-18 12:36:13
    瘋狂暗示
    暗示
    故事會(2019年23期)2019-12-05 05:37:17
    體 檢
    山東文學(2019年9期)2019-11-14 01:16:16
    天降富爸,“貧窮貴公子”三兄弟相殘
    跳樓男
    文藝論壇(2016年1期)2016-11-21 20:19:14
    跳樓男
    午夜福利乱码中文字幕| 久久久久久亚洲精品国产蜜桃av| 精品欧美一区二区三区在线| 咕卡用的链子| 日韩中文字幕欧美一区二区| 啦啦啦免费观看视频1| 久久久国产精品麻豆| 黄片大片在线免费观看| 国产在线精品亚洲第一网站| 亚洲三区欧美一区| tube8黄色片| 日韩视频一区二区在线观看| 免费在线观看亚洲国产| 久久国产亚洲av麻豆专区| 久久国产精品影院| 亚洲av美国av| 成人手机av| 国产高清videossex| www日本在线高清视频| av天堂在线播放| 成年人免费黄色播放视频| 18禁裸乳无遮挡免费网站照片 | 九色亚洲精品在线播放| 两个人免费观看高清视频| 久久精品国产亚洲av高清一级| 免费在线观看亚洲国产| 搡老熟女国产l中国老女人| ponron亚洲| 十八禁网站免费在线| 久久久久久久久久久久大奶| 色尼玛亚洲综合影院| 色婷婷久久久亚洲欧美| 国产蜜桃级精品一区二区三区 | 精品一区二区三区视频在线观看免费 | 成人永久免费在线观看视频| 一级a爱片免费观看的视频| 久久久久久久午夜电影 | 精品国内亚洲2022精品成人 | 人成视频在线观看免费观看| 高清在线国产一区| 久久久精品区二区三区| 亚洲精品美女久久av网站| 欧美乱妇无乱码| 两个人看的免费小视频| 男人舔女人的私密视频| 精品国产一区二区三区久久久樱花| 三级毛片av免费| 91精品国产国语对白视频| ponron亚洲| 久久香蕉国产精品| 日本vs欧美在线观看视频| 9191精品国产免费久久| 亚洲国产毛片av蜜桃av| av超薄肉色丝袜交足视频| 亚洲综合色网址| 欧美乱色亚洲激情| 巨乳人妻的诱惑在线观看| 国产亚洲精品久久久久5区| 性少妇av在线| 无限看片的www在线观看| 国产亚洲精品第一综合不卡| 男女下面插进去视频免费观看| 精品久久蜜臀av无| 久热爱精品视频在线9| 一区二区日韩欧美中文字幕| 久久久久国内视频| 看免费av毛片| ponron亚洲| 女性生殖器流出的白浆| 免费在线观看亚洲国产| 欧美日韩瑟瑟在线播放| 精品国产美女av久久久久小说| 夜夜爽天天搞| 国产日韩一区二区三区精品不卡| av在线播放免费不卡| 精品国内亚洲2022精品成人 | av不卡在线播放| 亚洲精品成人av观看孕妇| 丝瓜视频免费看黄片| 成年动漫av网址| 久久久久精品人妻al黑| 亚洲七黄色美女视频| 一级作爱视频免费观看| 老司机午夜福利在线观看视频| 亚洲欧美日韩高清在线视频| 欧美日韩瑟瑟在线播放| 久久久久久人人人人人| 国产不卡一卡二| 成在线人永久免费视频| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品国产区一区二| 叶爱在线成人免费视频播放| 老司机福利观看| 一二三四在线观看免费中文在| 午夜免费观看网址| 欧美人与性动交α欧美精品济南到| 最近最新中文字幕大全电影3 | 电影成人av| 国产片内射在线| 国产视频一区二区在线看| 午夜福利,免费看| 久久午夜亚洲精品久久| av电影中文网址| 天天躁狠狠躁夜夜躁狠狠躁| 丝袜人妻中文字幕| 亚洲精品av麻豆狂野| 成人国产一区最新在线观看| 亚洲av熟女| 欧洲精品卡2卡3卡4卡5卡区| 中文字幕制服av| 精品久久久久久久毛片微露脸| 国产单亲对白刺激| 亚洲精品一卡2卡三卡4卡5卡| 亚洲视频免费观看视频| 两性夫妻黄色片| 啦啦啦视频在线资源免费观看| 久久精品国产a三级三级三级| 精品国产一区二区三区久久久樱花| 久久久久国产一级毛片高清牌| 免费在线观看视频国产中文字幕亚洲| 久久中文看片网| 69精品国产乱码久久久| 一区在线观看完整版| 一级毛片女人18水好多| 在线视频色国产色| 一区二区三区精品91| 亚洲 欧美一区二区三区| 91字幕亚洲| 日韩视频一区二区在线观看| 黄色丝袜av网址大全| 动漫黄色视频在线观看| 90打野战视频偷拍视频| 国产精品免费大片| 丝袜在线中文字幕| 亚洲国产精品一区二区三区在线| 怎么达到女性高潮| 免费黄频网站在线观看国产| 老鸭窝网址在线观看| xxx96com| 色在线成人网| 十八禁人妻一区二区| 高潮久久久久久久久久久不卡| 国产欧美日韩一区二区三区在线| 亚洲国产精品一区二区三区在线| 精品国内亚洲2022精品成人 | 免费观看a级毛片全部| 9191精品国产免费久久| 91麻豆精品激情在线观看国产 | 脱女人内裤的视频| 精品久久久久久,| 啪啪无遮挡十八禁网站| 国产成人免费无遮挡视频| 久久久国产欧美日韩av| 欧美乱妇无乱码| 黑人操中国人逼视频| 国产精品香港三级国产av潘金莲| 免费观看a级毛片全部| 女人爽到高潮嗷嗷叫在线视频| 精品视频人人做人人爽| 如日韩欧美国产精品一区二区三区| 美女福利国产在线| 亚洲精品国产区一区二| 久久香蕉国产精品| 男女高潮啪啪啪动态图| 国产高清视频在线播放一区| 精品福利永久在线观看| 少妇猛男粗大的猛烈进出视频| 国产又爽黄色视频| 99热国产这里只有精品6| 久久精品亚洲精品国产色婷小说| 亚洲熟妇中文字幕五十中出 | 99国产精品一区二区三区| 国产精品国产av在线观看| 欧美日韩一级在线毛片| 岛国在线观看网站| 国产精品九九99| 精品久久蜜臀av无| 老司机靠b影院| 少妇裸体淫交视频免费看高清 | 黑人操中国人逼视频| av欧美777| 一区在线观看完整版| 美国免费a级毛片| 久久天堂一区二区三区四区| 两人在一起打扑克的视频| 水蜜桃什么品种好| 精品国产一区二区三区久久久樱花| www.熟女人妻精品国产| 人人妻,人人澡人人爽秒播| 亚洲精华国产精华精| 精品国内亚洲2022精品成人 | 日韩一卡2卡3卡4卡2021年| 欧美日韩av久久| 国产午夜精品久久久久久| 大码成人一级视频| 亚洲 国产 在线| 国产成人精品无人区| 免费观看精品视频网站| 亚洲精品久久成人aⅴ小说| 久9热在线精品视频| 免费在线观看视频国产中文字幕亚洲| av有码第一页| 在线播放国产精品三级| 午夜福利视频在线观看免费| 欧美日韩一级在线毛片| 亚洲中文字幕日韩| 亚洲av熟女| 啦啦啦在线免费观看视频4| 巨乳人妻的诱惑在线观看| 亚洲熟女精品中文字幕| 国产99久久九九免费精品| 久久婷婷成人综合色麻豆| 亚洲国产精品sss在线观看 | 少妇粗大呻吟视频| 午夜免费观看网址| 久久精品成人免费网站| 国产亚洲欧美精品永久| 老司机亚洲免费影院| 在线观看一区二区三区激情| 少妇裸体淫交视频免费看高清 | 亚洲熟妇熟女久久| 久9热在线精品视频| 真人做人爱边吃奶动态| 嫩草影视91久久| 成人18禁高潮啪啪吃奶动态图| 久久久久精品国产欧美久久久| 中文字幕精品免费在线观看视频| 日本欧美视频一区| 午夜福利在线观看吧| 成人18禁在线播放| 中文亚洲av片在线观看爽 | 国产97色在线日韩免费| 麻豆成人av在线观看| 国产真人三级小视频在线观看| 欧美日韩乱码在线| 制服诱惑二区| 黑人操中国人逼视频| 午夜福利视频在线观看免费| а√天堂www在线а√下载 | tube8黄色片| 黄频高清免费视频| √禁漫天堂资源中文www| 国产精品1区2区在线观看. | 一区二区三区精品91| 精品第一国产精品| 亚洲成人免费电影在线观看| 久久亚洲精品不卡| 久久午夜亚洲精品久久| 亚洲av成人一区二区三| 国产精品香港三级国产av潘金莲| 国产黄色免费在线视频| 黄片大片在线免费观看| 91老司机精品| 建设人人有责人人尽责人人享有的| 国产精品98久久久久久宅男小说| av线在线观看网站| 久久人妻福利社区极品人妻图片| 99久久综合精品五月天人人| 一级毛片高清免费大全| 天天躁夜夜躁狠狠躁躁| 欧美激情 高清一区二区三区| 视频在线观看一区二区三区| 成人三级做爰电影| 在线观看免费视频日本深夜| 91麻豆精品激情在线观看国产 | 99香蕉大伊视频| 色播在线永久视频| 日韩 欧美 亚洲 中文字幕| 男女下面插进去视频免费观看| 免费在线观看亚洲国产| 一本大道久久a久久精品| 无遮挡黄片免费观看| 国产精品久久久久久人妻精品电影| 黄色丝袜av网址大全| 亚洲精品中文字幕在线视频| 五月开心婷婷网| 男人的好看免费观看在线视频 | 嫁个100分男人电影在线观看| 亚洲欧美激情综合另类| 韩国av一区二区三区四区| 精品亚洲成a人片在线观看| 国产有黄有色有爽视频| 成人国语在线视频| 亚洲一区中文字幕在线| 久久精品国产a三级三级三级| 精品久久久久久久毛片微露脸| 中文欧美无线码| xxx96com| 精品一区二区三区视频在线观看免费 | 正在播放国产对白刺激| 热re99久久精品国产66热6| 一本一本久久a久久精品综合妖精| 青草久久国产| 黄色a级毛片大全视频| 韩国精品一区二区三区| 69av精品久久久久久| 欧美大码av| 久热爱精品视频在线9| 午夜福利视频在线观看免费| 男女之事视频高清在线观看| 狂野欧美激情性xxxx| 在线观看66精品国产| 亚洲男人天堂网一区| 操出白浆在线播放| 一本大道久久a久久精品| 亚洲片人在线观看| 后天国语完整版免费观看| 窝窝影院91人妻| 国产精品影院久久| 国产男女超爽视频在线观看| 色尼玛亚洲综合影院| 婷婷精品国产亚洲av在线 | 亚洲自偷自拍图片 自拍| 两个人免费观看高清视频| 成年人黄色毛片网站| 亚洲一区二区三区不卡视频| 亚洲国产精品sss在线观看 | 精品国产一区二区三区久久久樱花| 大片电影免费在线观看免费| 身体一侧抽搐| 高清黄色对白视频在线免费看| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品中文字幕在线视频| 日韩视频一区二区在线观看| 最新在线观看一区二区三区| 欧美日韩精品网址| 99国产精品免费福利视频| 欧美日韩视频精品一区| 欧美乱码精品一区二区三区| 亚洲美女黄片视频| 夜夜爽天天搞| 亚洲中文日韩欧美视频| 欧美精品高潮呻吟av久久| 国产有黄有色有爽视频| 国产精品 欧美亚洲| 亚洲 国产 在线| 性色av乱码一区二区三区2| 成熟少妇高潮喷水视频| 女同久久另类99精品国产91| 19禁男女啪啪无遮挡网站| bbb黄色大片| 亚洲一区中文字幕在线| 天堂√8在线中文| 精品欧美一区二区三区在线| 精品国产超薄肉色丝袜足j| 精品免费久久久久久久清纯 | 日韩欧美一区视频在线观看| 又大又爽又粗| 国产99久久九九免费精品| 一级a爱片免费观看的视频| 欧美日韩福利视频一区二区| 亚洲一区中文字幕在线| 19禁男女啪啪无遮挡网站| 亚洲精品国产一区二区精华液| 少妇 在线观看| 亚洲精品美女久久av网站| 日韩一卡2卡3卡4卡2021年| 女同久久另类99精品国产91| 久久久精品免费免费高清| 三级毛片av免费| 亚洲色图av天堂| 午夜福利,免费看| e午夜精品久久久久久久| a级毛片黄视频| 另类亚洲欧美激情| 精品无人区乱码1区二区| 国产99白浆流出| 91av网站免费观看| 国产日韩一区二区三区精品不卡| 巨乳人妻的诱惑在线观看| 大型av网站在线播放| 99久久国产精品久久久| 亚洲一区二区三区不卡视频| 精品乱码久久久久久99久播| 最新的欧美精品一区二区| 夫妻午夜视频| 手机成人av网站| 欧美精品高潮呻吟av久久| 午夜亚洲福利在线播放| 亚洲在线自拍视频| 丁香欧美五月| 高清黄色对白视频在线免费看| svipshipincom国产片| 激情视频va一区二区三区| 亚洲,欧美精品.| 久99久视频精品免费| 午夜精品在线福利| 成人18禁在线播放| 欧美+亚洲+日韩+国产| 中亚洲国语对白在线视频| 人妻丰满熟妇av一区二区三区 | 91成人精品电影| 一夜夜www| 国产精品永久免费网站| 热re99久久精品国产66热6| 日本精品一区二区三区蜜桃| 操美女的视频在线观看| 欧美精品啪啪一区二区三区| 在线免费观看的www视频| 国产成人一区二区三区免费视频网站| 久久久久国产精品人妻aⅴ院 | bbb黄色大片| 少妇猛男粗大的猛烈进出视频| 日韩制服丝袜自拍偷拍| 亚洲国产欧美一区二区综合| 亚洲色图综合在线观看| 午夜福利欧美成人| 如日韩欧美国产精品一区二区三区| 国产成+人综合+亚洲专区| 一进一出好大好爽视频| 一进一出抽搐动态| 国产精品久久久久成人av| 国产精品久久久av美女十八| 十八禁人妻一区二区| 国产免费男女视频| 美女高潮喷水抽搐中文字幕| 国产成人免费观看mmmm| 激情视频va一区二区三区| 亚洲中文av在线| 午夜久久久在线观看| 乱人伦中国视频| 成年人黄色毛片网站| 国产精品久久久久成人av| 欧美激情极品国产一区二区三区| 91大片在线观看| av在线播放免费不卡| 久久久国产成人精品二区 | 一进一出抽搐gif免费好疼 | 欧美日韩亚洲综合一区二区三区_| 久久 成人 亚洲| 91麻豆精品激情在线观看国产 | www.精华液| 18禁观看日本| 老鸭窝网址在线观看| 美国免费a级毛片| 深夜精品福利| 黄色丝袜av网址大全| 欧美精品高潮呻吟av久久| 日韩有码中文字幕| 动漫黄色视频在线观看| 最近最新免费中文字幕在线| 老司机亚洲免费影院| 国产精品.久久久| 9色porny在线观看| 日韩制服丝袜自拍偷拍| 亚洲av电影在线进入| 最近最新中文字幕大全电影3 | 999久久久国产精品视频| 嫁个100分男人电影在线观看| 亚洲va日本ⅴa欧美va伊人久久| 久久香蕉国产精品| 国产日韩一区二区三区精品不卡| 丰满的人妻完整版| 精品欧美一区二区三区在线| 天天躁夜夜躁狠狠躁躁| 在线观看午夜福利视频| 不卡av一区二区三区| 国产欧美亚洲国产| 制服人妻中文乱码| 天天影视国产精品| 性少妇av在线| 午夜视频精品福利| 久久精品91无色码中文字幕| 99国产精品一区二区三区| av视频免费观看在线观看| 大码成人一级视频| 免费看a级黄色片| 成年人黄色毛片网站| 色老头精品视频在线观看| 国产成人精品在线电影| 亚洲精品久久午夜乱码| 午夜福利一区二区在线看| 成年女人毛片免费观看观看9 | 在线看a的网站| 一边摸一边做爽爽视频免费| 国产成人av教育| 一级a爱片免费观看的视频| 制服人妻中文乱码| 日韩视频一区二区在线观看| 亚洲精品一卡2卡三卡4卡5卡| 后天国语完整版免费观看| 涩涩av久久男人的天堂| 男女高潮啪啪啪动态图| 女性生殖器流出的白浆| 欧美不卡视频在线免费观看 | 日日爽夜夜爽网站| 在线看a的网站| 激情视频va一区二区三区| 精品久久久久久电影网| 国产主播在线观看一区二区| 丁香六月欧美| 在线看a的网站| 精品一区二区三区视频在线观看免费 | 最近最新免费中文字幕在线| 三上悠亚av全集在线观看| 大码成人一级视频| 天堂动漫精品| 老司机深夜福利视频在线观看| 18禁裸乳无遮挡免费网站照片 | 免费观看a级毛片全部| 精品久久久久久,| 国产精品一区二区在线不卡| 久久国产精品大桥未久av| 国产精品98久久久久久宅男小说| 操出白浆在线播放| 精品一品国产午夜福利视频| 啦啦啦在线免费观看视频4| 亚洲国产精品一区二区三区在线| 亚洲精品国产区一区二| 可以免费在线观看a视频的电影网站| 国产91精品成人一区二区三区| 在线国产一区二区在线| 1024视频免费在线观看| 久久久久久久国产电影| 国产激情久久老熟女| 亚洲精品粉嫩美女一区| 欧美不卡视频在线免费观看 | 午夜日韩欧美国产| 亚洲精品自拍成人| 午夜免费成人在线视频| 国产人伦9x9x在线观看| 亚洲性夜色夜夜综合| 侵犯人妻中文字幕一二三四区| 国产成人一区二区三区免费视频网站| 亚洲精品在线观看二区| 久久久久久亚洲精品国产蜜桃av| 久久久国产欧美日韩av| 人人妻人人澡人人看| 妹子高潮喷水视频| 成年人黄色毛片网站| 欧美日韩亚洲高清精品| 精品无人区乱码1区二区| 久久精品国产a三级三级三级| 久久久久久亚洲精品国产蜜桃av| 国产在线观看jvid| 精品午夜福利视频在线观看一区| 国产一区在线观看成人免费| 老司机午夜福利在线观看视频| 精品亚洲成国产av| 午夜免费鲁丝| 国产一区二区三区综合在线观看| 窝窝影院91人妻| 老司机影院毛片| 国产精品久久久久成人av| 人成视频在线观看免费观看| 亚洲欧美精品综合一区二区三区| 91国产中文字幕| 亚洲 国产 在线| 国产区一区二久久| 国产淫语在线视频| 国内久久婷婷六月综合欲色啪| 国产一卡二卡三卡精品| 国产99久久九九免费精品| 19禁男女啪啪无遮挡网站| 日日摸夜夜添夜夜添小说| 亚洲成av片中文字幕在线观看| 91老司机精品| 精品人妻熟女毛片av久久网站| 啦啦啦在线免费观看视频4| 日本黄色日本黄色录像| 午夜免费鲁丝| 国产亚洲欧美在线一区二区| 精品国内亚洲2022精品成人 | av福利片在线| 日本五十路高清| 777米奇影视久久| 一进一出好大好爽视频| 窝窝影院91人妻| 男女之事视频高清在线观看| 一级黄色大片毛片| 亚洲熟女精品中文字幕| 自线自在国产av| 黄色片一级片一级黄色片| 精品久久久久久,| 夫妻午夜视频| 中文字幕人妻丝袜一区二区| 精品高清国产在线一区| 中文字幕另类日韩欧美亚洲嫩草| 欧美日韩瑟瑟在线播放| 丝袜人妻中文字幕| 一进一出抽搐gif免费好疼 | 国内久久婷婷六月综合欲色啪| 国产深夜福利视频在线观看| 在线av久久热| 精品一品国产午夜福利视频| 制服人妻中文乱码| 国产有黄有色有爽视频| 黄色 视频免费看| 夫妻午夜视频| 午夜福利在线免费观看网站| 日韩中文字幕欧美一区二区| 精品午夜福利视频在线观看一区| 亚洲精品美女久久久久99蜜臀| 热re99久久国产66热| 在线看a的网站| 每晚都被弄得嗷嗷叫到高潮| 色尼玛亚洲综合影院| 国产精品一区二区在线观看99| 久久久久国产精品人妻aⅴ院 | 午夜精品国产一区二区电影| 国产人伦9x9x在线观看| 日本a在线网址| www.自偷自拍.com| 制服人妻中文乱码| 最近最新中文字幕大全免费视频| 成人av一区二区三区在线看| 亚洲精品国产色婷婷电影| 免费女性裸体啪啪无遮挡网站| 久久久久久久国产电影| 国产aⅴ精品一区二区三区波| 久久99一区二区三区| av线在线观看网站| 黄色a级毛片大全视频| 亚洲五月天丁香| 亚洲国产精品sss在线观看 |