• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution

    2019-11-06 00:44:18YiBoZhao趙義博WanLiZhang張萬里DongWang王東XiaoTianSong宋蕭天LiangJiangZhou周良將andChiBiaoDing丁赤飚
    Chinese Physics B 2019年10期
    關鍵詞:王東

    Yi-Bo Zhao(趙義博), Wan-Li Zhang(張萬里), Dong Wang(王東), Xiao-Tian Song(宋蕭天),Liang-Jiang Zhou(周良將),3,?, and Chi-Biao Ding(丁赤飚),3

    1National Key Laboratory of Microwave Imaging Technology,Beijing 100190,China

    2Institute of Electronics,Chinese Academy of Sciences,Beijing 100190,China

    3University of Chinese Academy of Sciences,Beijing 100049,China

    Keywords:quantum secure imaging(QSI),quantum key distribution(QKD),digital micro-mirror device(DMD),quantum bit error rate(QBER)

    1.Introduction

    How to enhance the anti-jamming ability of radar is an urgent problem to be solved in the traditional radar countermeasures technology.[1,2]In the last two decades,with the intensive research and development of the techniques of quantum communication,[3–5]quantum imaging,[6–22]and quantum radar,[23,24]a series of results have been obtained,which provide a solution for improving the anti-jamming ability of radar.

    In 1995,quantum imaging was first observed,[6]also known as ghost imaging(GI).Entangled photon pairs produced by spontaneous parametric down-conversion were used,while one of the photons passing through the object was collected by a photon counter or a bucket detector with no spatial resolution(called the signal beam or object beam),its twin photon was detected by a multipixel detector[e.g.,a chargecoupled device(CCD)camera]without ever passing through the object(called the reference beam).Nevertheless,by correlating the intensities measured by the bucket detector with the intensities of each pixel in the multipixel detector,an image of the object was reconstructed.[6]In a long time,entanglement swapping was considered as the necessary condition for GI.[25]However,from 2002 GI was implemented by classical light sources,[9–18]especially the groups of Wang,[12]Wu,[13]and Han[14,15]accomplished a large numbers of GI experiments based on pseudo-thermal or real thermal light sources,which proved that entanglement is not the one and only way to achieve GI.After then,computational ghost imaging(CGI)was proposed[19]and verified by experiments,[20,21]which could be deployed with only one optical beam and one detector with no spatial resolution by replacing the reference beam with a controllable and pre-modulated light source.[22]The greatly simplified imaging system reduces the number of preset patterns and the imaging computational complexity,and then raises the imaging efficiency.[22]Based on the above,CGI and quantum secure imaging(QSI)could be applied to radar imaging faultlessly.Reference[8]introduced an anti-jamming quantum radar imaging(QRI)that utilized the BB84 protocol quantum key distribution(QKD)based on polarization encoding,which could verify the authenticity of imaging information by detecting the consistency of photon polarization states between the sender and the receiver. Up to now,the BB84 protocol is the most mature and widely used quantum key distribution protocol and its theoretical security has been fully proved.[26,27]Therefore,intercept-resend attacks are exposed immediately and the authenticity of the imaging information can be guaranteed through combining the CGI and QKD on radar technology.In addition,the quantum imaging technology has many advantages of higher resolution,higher contrast,higher signal-to-noise ratio(SNR),and less influence of atmospheric turbulence[7]compared with the traditional imaging.QSI will has great application value in the fields of aerial detection,military reconnaissance,and battlefield imaging in the future.

    Inspired by Ref.[8],we present a QSI scheme combining the phase-encoding BB84 QKD and CGI technology.Unlike the original scheme,our scheme adopt phase-encoding QKD,in which the relative phase is rather stable against disturbance.Moreover,owing to the fact that perfect single-photon source is still unavailable,a pulsed laser source with Poisson distribution is used in the QKD system.By combing the decoy-state method,we can estimate the contribution of the multi-photon part to obtain the lower bound of QBER under the interceptresend jamming attack,which is tighter than the origin one.In our experiment,a digital micro-mirror device(DMD)with quick response speed is used to preset the specific spatial distribution of the light intensity,and a single-photon detector(SPD)with quick response speed is used to measure the total light intensity,eventually the image of the object is retrieved through calculating the intensity distribution and the total intensity of light.Comparing with the traditional ghost imaging(TGI),QSI has been greatly improved in the data sampling rate and reduced in the imaging algorithm complexity and shortened the imaging time.More importantly,the quantum bit error rate(QBER)and the secure key rate of QKD are obtained in the experiment to see through the intercept-resend jamming attacks and ensure the authenticity of the imaging information.

    2.Theory and method

    The QSI system contains the imaging system and the QKD system,as shown in Fig.1,which mainly includes a QKD sender(Alice),a QKD receiver(Bob),and the spatial light path of CGI in more details.In our scheme,Alice sends out strongly attenuated coherent states with key bits information,which is encoded into the relative phase of a pair of coherent states shifted in time that are generated by an asymmetric interferometer.These photons pass through the beam expanding lens,the obtained speckle is then modulated into a specific spatial distribution of intensity with a DMD.The pulse with certain intensity distribution illuminates the object,and is coupled into the receiver,performs the decoding and detecting procedure.Finally we can reconstruct the image of the object with the detected counts.It should be stressed that in the QKD procedure,the key bits information is encoded into the relative phase between the two time-bin mode of signal pulses,which is rather stable during the display time of one frame of the DMD,since the modulation of DMD just changes the global phase of the whole two-time-bin pulses rather than the relative phase between them. Therefore,the pulses passing through the imaging optical path and arrive at Bob without changing the coding information,and can be further correctly decoded by Bob.Compared with the conventional CGI system,the major difference is that the light source and detector are replaced by a QKD sender and receiver in our QSI scheme,with which the security of imaging can be promoted.As it is necessary to measure the photon counts and QBER during the display time of every pattern loaded in the DMD,the trigger signals of the laser,the DMD,and the SPDs should be synchronized.The image of the object is reconstructed through calculating the pre-modulated intensity distribution of the DMD and the measured total intensity of the SPDs,while the QBER is monitored to estimate whether the imaging process is safe and real.

    Fig.1. Schematic of the quantum secure imaging system. Polarized single-photon from Alice passes through the beam expanding lens,is modulated into specific spatial intensity distribution by the DMD,then transmits through the object,finally is coupled into Bob and detected by SPDs.The image of the object is reconstructed and the QBER is monitored to estimate whether the imaging process is safe and real. The angle of reflection from the DMD is exaggerated in the figure for clarity but is about 24?in reality.

    2.1.Quantum key distribution system

    Quantum key distribution technology is one of the most mature and commonly used communication methods in quantum communication,as well as the BB84 protocol in QKD protocol,whose theoretical security has been fully proved.[26,27]So,we adopt the scheme based on the phase encoding BB84 protocol of QKD.[3,4]Our QKD system is shown in Fig.2.It is composed of two parts of Alice and Bob.Alice uses a pulsed laser to produce coherent pulses.An intensity modulator is used to produce signal and decoy pulses of differing intensities.The vacuum pulse is produced by omitting trigger signal to the laser.An unbalanced Mach–Zehnder interferometer(UMZI)with a phase modulator(PM)in the long arm plays the role of encoder,while there is an identical UMZI in Bob.[3]SPDs are deployed by Bob to detect the interferometric outcomes from the interferometer.Moreover,an electronic variable optical attenuator(EVOA)is used to attenuate the intensity of the laser pulses to the single-photon level before sending out from the sender.[26]In the experiment,the intensities of the signal and decoy pulses are set asμand ν to perform the weak+vacuum decoy-state BB84 QKD protocol.[28]

    Fig.2.Schematic of the phase encoding and weak+vacuum decoy-state BB84 protocol QKD.IM:intensity modulator;BS:beam splitter;PM:phase modulator;EVOA:electronic variable optical attenuator;SPD:single-photon detector.The signal and decoy pulses are produced by IM.Two identical UMZIs in Alice and Bob play roles of encoder.An EVOA is used to attenuate the intensity of the laser pulses to the singlephoton level.

    According to the phase encoding BB84 protocol,the relative phase on Alice is selected randomly from four values 0,π/2,π,and 3π/2,where 0,π are in the Z basis,and π/2,π/2 are in the X basis.Bob measures the incoming quantum states from Alice also in Z or X basis randomly.Whenever Alice and Bob use the same basis,the two SPDs will get correct results with a small QBER.However,when they use different bases,the two SPDs will get an uncertain result together.Alice then reveals only whether or not the state in which she encoded that qubit is compatible with the basis announced by Bob.If the state is compatible,they keep the bit;if not,they disregard it.In this way,fifty percent of the bit string is discarded.This shorter key obtained after basis reconciliation is called the sifted key.

    2.2.Intercept-resend eavesdropping strategy

    In the practical QKD system,Alice uses the weak coherent source(WCS)together with the decoy-state method to substitute the unavailable single-photon source. The photon number of each pulse follows the Poisson distribution. The probability of finding an n-photon state in a pulse is given bywhereμis the mean photon number.With the phases randomization,the states sent by Alice are described by

    In the case of quantum secure imaging or quantum radar,the potential attacker usually adopts the intercept-resend strategy to forge the target.Since the QKD system is applied to enhance its security,here we just consider the intercept-resend quantum eavesdropping strategy that was proposed by Curty et al.[29]Eve’s attack strategy can be decomposed into three steps. In the first step,Eve obtains the total photon number n of each pulse sent by Alice via a quantum non-demolition(QND)measurement without introducing any errors. Then she performs a filter operation on the statewith the intention to make them distinguishable with some finite probability.Finally,in the third step,Eve measures each filtered state with the so-called square-root measurement(SRM).This measurement gives her the minimum value of the error probability when distinguishing symmetric states.After deciding which state was used by Alice,Eve needs to prepare a new signal in the state identified and gives it to Bob. The error rate introduced by Eve with this eavesdropping strategy for a signal state containing n photons is given by

    The analysis for the case of n=2 is similar.The coefficients cj(2)of the signal statesare of the formsandrespectively.The partial error rate e2is given by

    In order to give the lower bound of total error rate of the signal state at the present of intercept-resend attack,we adopt the model of decoy-state method to estimate the yield of photon pulses.[28]In the weak+vacuum decoy-state method,Alice randomly prepares the signal,decoy,and vacuum state with intensities ofμ,ν,and 0,respectively.For 0<ν<μ≤1,the following inequalities hold for all n ≥3:

    The overall gains of the signal and decoy state are given by

    where Ynis the yield of an n-photon state,i.e.,the conditional probability of a detection event at Bob’s side given that Alice sends out an i-photon state.

    By using the inequalities(6)and Eq.(8),the joint contribution of one-photon and two-photon components can be deduced as follows:

    where Y0is the background rate,which includes the detector dark count and other background contributions such as the stray light from timing pulses.

    The total error rate of the decoy state when Eve performs the intercept-resend attack is given by

    where eiis the error rate of the i-photon state,and the error rate of the background e0=1/2.Thus we can obtain the lower bound of the decoy state total error rate

    Therefore,one can monitor the error rate of the decoy state,when the error rate of our QSI system is greater thanit implies the existence of Eve and the images obtained from a signal cannot be considered secure.In addition,whether our QKD system obtains secure keys can also be a criterion of secure imaging.

    2.3.Computational quantum imaging system

    CGI is an improvement from TGI.A spatial light modulator(SLM)or a CCD is used to preset the specific spatial distribution of the light intensity.Disregarding the reference beam,so just a single-pixel detector is needed.[20]In this imaging scheme,take the DMD to be a part of Alice. According to the security requirement of the decoy state BB84 protocol,the intensity of the laser pulses has to be lowered to the singlephoton level at the exit of the DMD by an EVOA.

    As in our scheme,a DMD is used to preset intensity patterns of speckles,and single-photon detectors are employed to measure the counts corresponding to each pattern. Suppose N is the number of intensity patterns modulated by the DMD,one can obtain the total count Bi(1 ≤i ≤N)during the display time of the i-th pattern,whose intensity distribution is denoted by Ii(x,y)(1 ≤i ≤N).Then the image of the object can be obtained by summing the calculated intensities Iiwith the appropriate weights Bi[20]

    where

    is the mean value of Bi,and Bimeets the following formula:

    where T(x,y)is the transmission function of the object.

    3.Experiment and results

    The QSI system is set up as shown in Fig.3.In the QKD system,the pulsed laser is working at a frequency of 40 MHz and a central wavelength of 1550.12 nm.The SPD is working at Geiger mode and has a detection efficiency of 10%for photons.The intensities of the signal,decoy,and vacuum state are set toμ=0.68,ν=0.18,and 0 with the probabilities of 13/16,2/16,and 1/16,respectively.In the quantum imaging part,the array of the DMD micro-mirrors(G4100 from TI,the control board is made by x-digit)is 1024×768,and the size of every micro-mirror(one pixel)is 13.68μm×13.68μm.Since each micro-mirror is so small that the laser energy reflected from it is extremely low,a new array of 24×24 pixels is reselected and controlled with the same state in any case.The size of the new block is approximately 328.32μm×328.32μm when ignoring the gaps between the micro-mirrors.We choose only the square areas wherever covered by the light spot and the intensity is adequate enough.So,the DMD is divided into 20×20=400 blocks,Figure 4 shows the simplest binary pattern loaded into the DMD that only one block is in the“on”state and the others are in the“off”state. In all the binary patterns,each block appears just only once,which is similar to spot scanning. In this way,only 400 binary patterns are needed,which can reduce the complexity of the imaging algorithm and greatly save the imaging time.

    After completing the connection of experimental devices as shown in Fig.3,set up the frames number N=400 and frame frequency f=200 Hz.Run the DMD in the fully open mode,and make the QKD work normally through scanning,and set up every parameter within QKD before placing the object.Then,put the“+”type object into this system,and load 400 random binary patterns into the DMD.Run the whole system synchronously.The signal photon counts and QBER are measured during the display time of each pattern frame.The corresponding results of the QKD procedure are shown in Table 1,which are obtained by following the standard decoystate BB84 QKD protocol.According to Eq.(11),the reconstructed image of the object is shown in Fig.5.The SNR is 23 dB,where SNR is defined asis the average of the signal intensity,and σnis the variance of the background intensity. The difference between the average intensities of the bright and dark regions of the images is regarded as the signal,and the variation of dark background is considered as the noise.[22,30]The lower bound of the error rate is calculated to be 14.51%according to Eq.(10),and a secure key rate of 571.0 bps is achieved during the imaging period.

    As can be seen from Table 1 and Fig.5,the image information of the object can be obtained by using the QSI scheme,and the average QBER is 3.99%,which is below the lower bound and proves that the imaging process is safe and real.Once the jammer of object tries to carry out the interceptresend strategy,it is bound to lead to the over threshold increase of QBER under the premise of presence of photon counts. In general,we think that the jammer of object has carried on the intercept-resend strategy and the imaging is no longer safe and real when the average of QBER is higher than 14.51%.Therefore,our QSI system can be used as quantum secure radar against jammers.

    Fig.3.Experimental setup of the QSI system.The red arrows indicate the path of light roughly.

    Fig.4.The simplest binary pattern loaded into the DMD that only one block is in the on state and the others are in the off state.

    Table 1.Experimental results of QKD procedure.

    Fig.5.Results of numerical simulation and QSI experiment of a“+”type object.(a)The result of numerical simulation of imaging the object according to Eq.(11).(b)The result of using the measured signal intensity distribution for imaging the object directly.(c)The result of calculating the measured signal intensity and the presetting intensity distribution for imaging the object according to Eq.(11),which is better than(b).

    At the same time,we can see that the image resolution is not high.The main reason is the serious diffraction effect of the DMD.As we know,the DMD is composed of many micro mirrors,which is similar to a two-dimensional diffraction grating.It has a strong diffraction effect on monochromatic light,and becomes stronger with the increase of the wavelength,[31]which can hardly even be used for imaging in the mid-infrared band. Therefore,even if all the micro mirrors of the DMD keep in the off state,the detector will still measure much energy due to the diffraction effect,which will greatly reduce the SNR and the imaging quality. As a result,neither the new block of the binary patterns can be too small,otherwise the diffraction noise will drown out the signal energy which makes the SNR relatively low.Nor the new block can be too large,otherwise the imaging resolution will be dissatisfactory.Therefore,it is necessary to find a balanced block in the experiment that makes the imaging quality best.In our experiment,the block with size of 328.32μm×328.32μm is relatively appropriate.In addition,we can minimize the diffraction effect by the following three methods. Firstly,we can change the distribution of the diffraction spots and energy by adjusting the incident angle of light on the DMD to minimize the diffraction effect.Secondly,we can increase the distance between the DMD and the detector to reduce the diffraction effect,because the diffraction spots are distributed at some certain angles.The farther away the distance,the larger deviation of the diffraction spots,and the less stray light coupled into the detector.Finally,we can design the wavelength of the light to match the DMD to reduce the diffraction effect,but all the devices need to be matched to this wavelength,such as the DMD,the laser,and the detector of QKD,which is a troublesome and complex thing.In the future works,we will focus on the research how to reduce the diffraction effect of DMD to make the imaging quality optimal.

    4.Conclusion

    We propose a QSI scheme based on the phase encoding and weak+vacuum decoy-state BB84 protocol QKD that can resist the intercept-resend strategy of the jammers. The authenticity and safety of the imaging process are ensured by the theoretical unconditional security of QKD,and the QBER and the secure key rate analytical functions of QKD are used to estimate whether the jammer of object carries out the interceptresend attacks.In our experiment,we obtain a secure key rate of 571.0 bps and a secure average QBER of 3.99%,which is below the lower bound of 14.51%. In the imaging system,we synthetically use the CGI scheme,SPDs and DMD both with faster response speed that greatly improve the imaging efficiency.This scheme is suitable for both objects with transmission or reflection. Furthermore,the system uses a WCS with invisible wavelength of 1550 nm,which can realize weak-light imaging and be immune to the stray light or air turbulence.Thus,it will become a better choice for quantum secure radar against jammers.But at the same time,it is undeniable that the more obvious diffraction effect of the DMD on the longer wavelength light will reduce the imaging SNR and quality.We believe that the diffraction effect can be minimized and the imaging quality can be improved by continuously adjusting the incident angle of light on the DMD,increasing the distance between the DMD and the detector,or designing the wavelength of the light to match the DMD.

    Acknowledgment

    We acknowledge Xiaoming Lu,Di Jiang,and Bin Chen for fruitful discussions and software support.

    猜你喜歡
    王東
    段玉裁《說文解字注》校訂《古今韻會舉要》探略
    天中學刊(2022年4期)2022-09-29 07:21:22
    我是老宋
    安徽文學(2022年7期)2022-07-14 09:51:33
    迷彩色在通信基站天線美化中的應用探析
    瘋狂暗示
    愛你(2020年7期)2020-11-18 12:36:13
    瘋狂暗示
    暗示
    故事會(2019年23期)2019-12-05 05:37:17
    體 檢
    山東文學(2019年9期)2019-11-14 01:16:16
    天降富爸,“貧窮貴公子”三兄弟相殘
    跳樓男
    文藝論壇(2016年1期)2016-11-21 20:19:14
    跳樓男
    久久人妻av系列| 日韩免费av在线播放| 亚洲精品日韩av片在线观看| 丰满乱子伦码专区| 真人一进一出gif抽搐免费| 日本三级黄在线观看| 色5月婷婷丁香| 久久久久久九九精品二区国产| 91麻豆精品激情在线观看国产| 一个人免费在线观看电影| 51国产日韩欧美| 精品人妻一区二区三区麻豆 | 真人一进一出gif抽搐免费| 午夜久久久久精精品| 黄色一级大片看看| 国产高清激情床上av| 搡老妇女老女人老熟妇| 国产视频内射| netflix在线观看网站| 悠悠久久av| 欧美黄色片欧美黄色片| 简卡轻食公司| 国产精品人妻久久久久久| 一进一出抽搐gif免费好疼| 国产中年淑女户外野战色| 国产精品久久久久久久久免 | 天堂动漫精品| 亚洲欧美日韩高清专用| 国产 一区 欧美 日韩| 亚洲经典国产精华液单 | 中文字幕免费在线视频6| 在线观看舔阴道视频| 久久久久亚洲av毛片大全| 久久精品影院6| 俺也久久电影网| 直男gayav资源| 欧美不卡视频在线免费观看| 免费av毛片视频| 性插视频无遮挡在线免费观看| 特大巨黑吊av在线直播| 99国产精品一区二区三区| 自拍偷自拍亚洲精品老妇| 欧美一区二区国产精品久久精品| 成年免费大片在线观看| 亚洲欧美日韩东京热| 亚洲成人精品中文字幕电影| 岛国在线免费视频观看| 国产精品伦人一区二区| 免费无遮挡裸体视频| 午夜福利欧美成人| 成人无遮挡网站| 久久伊人香网站| 国产黄片美女视频| 美女黄网站色视频| 熟女人妻精品中文字幕| 韩国av一区二区三区四区| 99国产极品粉嫩在线观看| 久久久久久久午夜电影| 少妇人妻精品综合一区二区 | 精品乱码久久久久久99久播| 国产淫片久久久久久久久 | 免费av毛片视频| 欧美成人一区二区免费高清观看| 精品久久久久久久久久久久久| 亚洲av二区三区四区| 久久亚洲精品不卡| 性色avwww在线观看| 高清在线国产一区| 变态另类成人亚洲欧美熟女| 国内揄拍国产精品人妻在线| 一本久久中文字幕| 美女被艹到高潮喷水动态| 日韩免费av在线播放| 欧美性猛交黑人性爽| 国产美女午夜福利| netflix在线观看网站| 久久人人精品亚洲av| 免费看美女性在线毛片视频| 蜜桃久久精品国产亚洲av| 激情在线观看视频在线高清| 搡女人真爽免费视频火全软件 | 亚洲精品在线观看二区| 两个人视频免费观看高清| 成熟少妇高潮喷水视频| 夜夜看夜夜爽夜夜摸| 在线免费观看的www视频| 禁无遮挡网站| 少妇的逼水好多| 亚洲精品在线观看二区| 老鸭窝网址在线观看| 午夜久久久久精精品| 永久网站在线| 国产精品一区二区三区四区免费观看 | 简卡轻食公司| 亚洲va日本ⅴa欧美va伊人久久| 成人三级黄色视频| 18禁裸乳无遮挡免费网站照片| 久久久久久久亚洲中文字幕 | 亚洲一区高清亚洲精品| 少妇高潮的动态图| 美女高潮喷水抽搐中文字幕| 午夜激情福利司机影院| 亚洲中文日韩欧美视频| 午夜福利欧美成人| 国产淫片久久久久久久久 | 国产欧美日韩精品亚洲av| 可以在线观看的亚洲视频| 99久久精品一区二区三区| 国产亚洲精品久久久久久毛片| 精品乱码久久久久久99久播| 在线免费观看不下载黄p国产 | 午夜影院日韩av| 国产精品女同一区二区软件 | 国产精品一区二区三区四区免费观看 | 欧美乱色亚洲激情| 亚洲av.av天堂| 午夜免费激情av| 午夜精品一区二区三区免费看| 亚洲专区中文字幕在线| 俄罗斯特黄特色一大片| 日韩有码中文字幕| 国产探花极品一区二区| 久久久成人免费电影| 亚洲五月婷婷丁香| 午夜日韩欧美国产| avwww免费| 久久久久国内视频| 9191精品国产免费久久| 五月伊人婷婷丁香| 在现免费观看毛片| 免费一级毛片在线播放高清视频| 悠悠久久av| 99国产综合亚洲精品| 亚洲精品456在线播放app | 色综合亚洲欧美另类图片| 午夜福利视频1000在线观看| 日日摸夜夜添夜夜添av毛片 | 欧美激情在线99| 国产精品永久免费网站| 久久精品人妻少妇| 免费搜索国产男女视频| 中文字幕高清在线视频| 国产精品av视频在线免费观看| 俺也久久电影网| 亚洲av中文字字幕乱码综合| 最好的美女福利视频网| 一区二区三区免费毛片| 91九色精品人成在线观看| 婷婷色综合大香蕉| 精品一区二区三区视频在线| 日韩国内少妇激情av| 国产免费av片在线观看野外av| 欧美乱妇无乱码| 亚洲国产日韩欧美精品在线观看| 我的女老师完整版在线观看| 99热6这里只有精品| 伊人久久精品亚洲午夜| 亚洲18禁久久av| 热99re8久久精品国产| 欧美乱色亚洲激情| 免费高清视频大片| 老司机福利观看| 国产午夜福利久久久久久| 乱人视频在线观看| 别揉我奶头 嗯啊视频| 人妻夜夜爽99麻豆av| 丰满乱子伦码专区| 国产 一区 欧美 日韩| 久久欧美精品欧美久久欧美| 99riav亚洲国产免费| av专区在线播放| 18禁黄网站禁片免费观看直播| 一区二区三区免费毛片| 亚洲无线观看免费| 深夜精品福利| 如何舔出高潮| 国产精品综合久久久久久久免费| av视频在线观看入口| 国产综合懂色| 欧美在线黄色| 久久午夜亚洲精品久久| 欧美激情久久久久久爽电影| 亚洲精品粉嫩美女一区| 女人被狂操c到高潮| 国产亚洲精品久久久久久毛片| 亚洲无线在线观看| 午夜久久久久精精品| 日韩欧美国产一区二区入口| 在线观看午夜福利视频| 免费看光身美女| 久久中文看片网| 无人区码免费观看不卡| 又黄又爽又免费观看的视频| 成年女人永久免费观看视频| 国产成人啪精品午夜网站| 免费在线观看影片大全网站| 一区二区三区免费毛片| 免费av观看视频| 欧美bdsm另类| 亚洲欧美日韩高清专用| 亚洲精品一卡2卡三卡4卡5卡| 久久人人爽人人爽人人片va | 91字幕亚洲| 久久6这里有精品| 国内精品久久久久精免费| 一级a爱片免费观看的视频| 桃红色精品国产亚洲av| 91在线观看av| 亚州av有码| 久久99热6这里只有精品| 九九在线视频观看精品| 亚洲av第一区精品v没综合| 真实男女啪啪啪动态图| 婷婷色综合大香蕉| 非洲黑人性xxxx精品又粗又长| 免费无遮挡裸体视频| 琪琪午夜伦伦电影理论片6080| 国产成人啪精品午夜网站| 亚洲专区中文字幕在线| 日本一二三区视频观看| 黄色一级大片看看| 一级毛片久久久久久久久女| 别揉我奶头 嗯啊视频| 国产三级中文精品| 久久九九热精品免费| 99国产精品一区二区三区| 丰满人妻一区二区三区视频av| 国产中年淑女户外野战色| 欧美区成人在线视频| 我要看日韩黄色一级片| 中文字幕久久专区| 国产私拍福利视频在线观看| 特大巨黑吊av在线直播| 2021天堂中文幕一二区在线观| www.www免费av| 国产精品99久久久久久久久| 一个人免费在线观看的高清视频| 成人美女网站在线观看视频| 亚洲av.av天堂| 欧美黄色淫秽网站| 午夜福利在线在线| 精品一区二区三区视频在线| 成人特级黄色片久久久久久久| 偷拍熟女少妇极品色| 国产高清三级在线| 久久这里只有精品中国| 亚洲欧美精品综合久久99| 免费在线观看影片大全网站| 男人的好看免费观看在线视频| 亚洲国产日韩欧美精品在线观看| 精品久久久久久久久av| 国产 一区 欧美 日韩| 丁香欧美五月| 免费在线观看成人毛片| 两个人的视频大全免费| a在线观看视频网站| 欧美+日韩+精品| 国产高清视频在线观看网站| 欧美高清性xxxxhd video| 好男人电影高清在线观看| 最近最新免费中文字幕在线| 亚洲欧美日韩东京热| 成人特级av手机在线观看| 国产av一区在线观看免费| 人人妻,人人澡人人爽秒播| 给我免费播放毛片高清在线观看| 精品不卡国产一区二区三区| 欧美成人性av电影在线观看| 精品国内亚洲2022精品成人| 色吧在线观看| 日本在线视频免费播放| 精品国产三级普通话版| 一级av片app| 嫩草影视91久久| 欧美乱妇无乱码| 亚洲av二区三区四区| 欧美一区二区亚洲| 在线国产一区二区在线| 亚洲熟妇中文字幕五十中出| 亚洲av成人精品一区久久| avwww免费| 日本黄色片子视频| 欧美又色又爽又黄视频| 少妇人妻精品综合一区二区 | 18禁裸乳无遮挡免费网站照片| 特级一级黄色大片| 超碰av人人做人人爽久久| 免费在线观看日本一区| 亚洲18禁久久av| 又爽又黄a免费视频| 丁香欧美五月| 性欧美人与动物交配| 老熟妇仑乱视频hdxx| 午夜老司机福利剧场| 日韩精品中文字幕看吧| 天美传媒精品一区二区| 好看av亚洲va欧美ⅴa在| 亚洲国产欧美人成| 免费一级毛片在线播放高清视频| 99在线人妻在线中文字幕| 国产av一区在线观看免费| 午夜福利欧美成人| 成熟少妇高潮喷水视频| 3wmmmm亚洲av在线观看| 老司机福利观看| 午夜影院日韩av| 无人区码免费观看不卡| 97碰自拍视频| 亚洲人与动物交配视频| 欧美+亚洲+日韩+国产| 免费观看的影片在线观看| 少妇高潮的动态图| 免费搜索国产男女视频| 精品福利观看| 亚洲精华国产精华精| 久久久久国产精品人妻aⅴ院| 亚洲五月婷婷丁香| 成人特级黄色片久久久久久久| 夜夜爽天天搞| 老熟妇乱子伦视频在线观看| 欧美在线一区亚洲| 老熟妇乱子伦视频在线观看| 啪啪无遮挡十八禁网站| 国产免费男女视频| а√天堂www在线а√下载| 国产亚洲精品综合一区在线观看| 亚洲av日韩精品久久久久久密| 精品久久久久久久久久免费视频| 国产精品,欧美在线| 蜜桃久久精品国产亚洲av| 美女免费视频网站| 欧美日韩亚洲国产一区二区在线观看| 丁香欧美五月| 一卡2卡三卡四卡精品乱码亚洲| 亚洲乱码一区二区免费版| 可以在线观看的亚洲视频| 三级国产精品欧美在线观看| 欧美成狂野欧美在线观看| 又紧又爽又黄一区二区| 18美女黄网站色大片免费观看| 白带黄色成豆腐渣| 久久午夜福利片| 欧美激情久久久久久爽电影| 免费搜索国产男女视频| 亚洲专区国产一区二区| 听说在线观看完整版免费高清| 小蜜桃在线观看免费完整版高清| 亚洲av电影在线进入| 国产欧美日韩精品一区二区| 久久久久久国产a免费观看| 成人一区二区视频在线观看| 国产成人福利小说| 99精品在免费线老司机午夜| 亚洲av日韩精品久久久久久密| 丁香六月欧美| 国产精品爽爽va在线观看网站| 天堂av国产一区二区熟女人妻| 亚洲国产欧洲综合997久久,| 丁香六月欧美| 舔av片在线| 在线播放无遮挡| 久久久精品欧美日韩精品| 国产激情偷乱视频一区二区| 欧美日韩中文字幕国产精品一区二区三区| 欧美高清成人免费视频www| a级毛片免费高清观看在线播放| 欧美最黄视频在线播放免费| 久久精品影院6| 免费人成在线观看视频色| 亚洲18禁久久av| 午夜精品一区二区三区免费看| 波多野结衣高清作品| 日韩大尺度精品在线看网址| 国产一区二区激情短视频| 脱女人内裤的视频| 综合色av麻豆| 日日摸夜夜添夜夜添av毛片 | 成年女人毛片免费观看观看9| 日韩成人在线观看一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 久久精品久久久久久噜噜老黄 | 熟女电影av网| 给我免费播放毛片高清在线观看| 老熟妇仑乱视频hdxx| 可以在线观看的亚洲视频| 91午夜精品亚洲一区二区三区 | 国产亚洲精品av在线| or卡值多少钱| 亚洲,欧美,日韩| 超碰av人人做人人爽久久| 老司机深夜福利视频在线观看| 亚洲七黄色美女视频| 亚洲va日本ⅴa欧美va伊人久久| 岛国在线免费视频观看| 在线观看66精品国产| 高清毛片免费观看视频网站| 国产极品精品免费视频能看的| 午夜精品在线福利| 成人毛片a级毛片在线播放| 久久久国产成人免费| 日韩欧美 国产精品| 简卡轻食公司| 亚洲乱码一区二区免费版| 成年免费大片在线观看| 最新中文字幕久久久久| 国产 一区 欧美 日韩| 国产高清视频在线观看网站| 赤兔流量卡办理| 露出奶头的视频| netflix在线观看网站| 在线观看美女被高潮喷水网站 | 丰满乱子伦码专区| 熟妇人妻久久中文字幕3abv| 日本 欧美在线| 亚洲成人免费电影在线观看| 真人一进一出gif抽搐免费| 午夜福利高清视频| 性欧美人与动物交配| 色噜噜av男人的天堂激情| 99久久成人亚洲精品观看| 亚洲av.av天堂| 天堂网av新在线| 国产亚洲欧美在线一区二区| 久久久久免费精品人妻一区二区| 男女之事视频高清在线观看| 黄色日韩在线| 美女cb高潮喷水在线观看| 日韩欧美 国产精品| 亚洲欧美激情综合另类| 18禁黄网站禁片免费观看直播| 亚洲不卡免费看| 国产欧美日韩一区二区三| 九色国产91popny在线| 国产高清视频在线观看网站| 国产在线男女| 日本免费a在线| 黄色一级大片看看| 午夜福利视频1000在线观看| 国产三级中文精品| 成人亚洲精品av一区二区| 国产欧美日韩一区二区三| 免费观看精品视频网站| 免费大片18禁| 国产乱人伦免费视频| 国产亚洲av嫩草精品影院| 1000部很黄的大片| 久久久久性生活片| 少妇被粗大猛烈的视频| 久久久久久久亚洲中文字幕 | 国产白丝娇喘喷水9色精品| 色精品久久人妻99蜜桃| 国产精品综合久久久久久久免费| 国产单亲对白刺激| 国产蜜桃级精品一区二区三区| 真实男女啪啪啪动态图| 亚洲av电影在线进入| 黄色配什么色好看| 国产精品亚洲美女久久久| 在线观看美女被高潮喷水网站 | 国产精品98久久久久久宅男小说| 男人的好看免费观看在线视频| 日本免费一区二区三区高清不卡| 国产精品美女特级片免费视频播放器| 久久国产乱子免费精品| 国产又黄又爽又无遮挡在线| 色吧在线观看| 国产 一区 欧美 日韩| 久久久成人免费电影| 久久天躁狠狠躁夜夜2o2o| 直男gayav资源| av欧美777| 桃色一区二区三区在线观看| 1000部很黄的大片| 国产精华一区二区三区| 国产精品1区2区在线观看.| 亚洲国产精品成人综合色| 成人永久免费在线观看视频| 国产精品爽爽va在线观看网站| 国产欧美日韩精品一区二区| 一二三四社区在线视频社区8| 十八禁国产超污无遮挡网站| 国产伦精品一区二区三区视频9| 中文字幕免费在线视频6| 精品久久久久久久久亚洲 | 少妇人妻精品综合一区二区 | 日韩欧美精品v在线| 欧美黄色淫秽网站| 日韩成人在线观看一区二区三区| 国产亚洲欧美98| 午夜免费成人在线视频| 非洲黑人性xxxx精品又粗又长| 日本一本二区三区精品| 乱人视频在线观看| 女同久久另类99精品国产91| 一进一出抽搐动态| 婷婷色综合大香蕉| 国产色婷婷99| 最近中文字幕高清免费大全6 | 日本与韩国留学比较| 亚洲avbb在线观看| 天堂动漫精品| 国产探花极品一区二区| 欧美乱妇无乱码| 色在线成人网| 男女那种视频在线观看| 超碰av人人做人人爽久久| 国产老妇女一区| x7x7x7水蜜桃| 国产伦精品一区二区三区视频9| 国产av麻豆久久久久久久| 岛国在线免费视频观看| 两个人的视频大全免费| 特大巨黑吊av在线直播| 哪里可以看免费的av片| 国产探花极品一区二区| 美女cb高潮喷水在线观看| 亚洲精品一区av在线观看| 亚洲不卡免费看| 国产精品日韩av在线免费观看| 成人国产综合亚洲| 日韩有码中文字幕| 久久亚洲精品不卡| 中文字幕av在线有码专区| 69av精品久久久久久| 成人毛片a级毛片在线播放| 成熟少妇高潮喷水视频| 麻豆国产97在线/欧美| 成人国产综合亚洲| 18禁黄网站禁片午夜丰满| 国产主播在线观看一区二区| 少妇的逼水好多| 狠狠狠狠99中文字幕| 国产精品一区二区性色av| 国产精品久久久久久久久免 | 级片在线观看| 美女xxoo啪啪120秒动态图 | 麻豆av噜噜一区二区三区| 九九久久精品国产亚洲av麻豆| 少妇的逼水好多| 精品久久久久久久末码| 日本五十路高清| 99久久成人亚洲精品观看| 久久久精品欧美日韩精品| 在线观看免费视频日本深夜| 免费在线观看成人毛片| 国产精品免费一区二区三区在线| 国产精品亚洲美女久久久| 亚洲成av人片免费观看| 国产真实伦视频高清在线观看 | 国产一区二区三区视频了| 国产精品久久久久久久久免 | 真人一进一出gif抽搐免费| 国内少妇人妻偷人精品xxx网站| xxxwww97欧美| 窝窝影院91人妻| 黄片小视频在线播放| 国产高清三级在线| or卡值多少钱| h日本视频在线播放| 精品欧美国产一区二区三| 波多野结衣高清无吗| 99热这里只有精品一区| 亚洲美女视频黄频| 免费观看精品视频网站| 99国产综合亚洲精品| 一级黄色大片毛片| 真人一进一出gif抽搐免费| 人人妻,人人澡人人爽秒播| 久久精品国产99精品国产亚洲性色| 搡老岳熟女国产| 内地一区二区视频在线| 日本精品一区二区三区蜜桃| 国产欧美日韩精品一区二区| 亚洲av一区综合| 一个人看的www免费观看视频| 欧美成狂野欧美在线观看| av天堂在线播放| 欧美国产日韩亚洲一区| 琪琪午夜伦伦电影理论片6080| 伊人久久精品亚洲午夜| 亚洲五月婷婷丁香| 国产av在哪里看| 国产精品久久电影中文字幕| 我的女老师完整版在线观看| 免费av观看视频| 午夜福利在线观看吧| 99久久久亚洲精品蜜臀av| 性欧美人与动物交配| 亚洲激情在线av| 亚洲午夜理论影院| 丝袜美腿在线中文| 99久久久亚洲精品蜜臀av| 99久国产av精品| 国产高清视频在线观看网站| 色综合婷婷激情| av视频在线观看入口| 人妻夜夜爽99麻豆av| 亚洲精品456在线播放app | 草草在线视频免费看| 又黄又爽又刺激的免费视频.| 天堂动漫精品| 色5月婷婷丁香| 亚洲五月天丁香| 日韩免费av在线播放| 亚洲久久久久久中文字幕| 五月玫瑰六月丁香| 欧美激情国产日韩精品一区| 日韩av在线大香蕉| 色哟哟哟哟哟哟| 欧美丝袜亚洲另类 | 亚洲熟妇中文字幕五十中出| 国产精品人妻久久久久久| 嫩草影院新地址| 日本成人三级电影网站| 国产美女午夜福利|