• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States

    2019-11-26 06:47:38LiliYanYanChangShibinZhangQirunWangZhiweiShengandYuhuaSun
    Computers Materials&Continua 2019年11期

    Lili Yan,Yan ChangShibin ZhangQirun Wang,Zhiwei Sheng and Yuhua Sun

    Abstract:Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger (GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party (server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’ activi ties are restricted to either measuring a quantum state or reflecting it in the classical basis In addition,security and efficiency of the proposed schemes have been discussed.

    Keywords:Quantum private comparison,semi-quantum protocol,semi-honest third party,GHZ class states.

    1 Introduction

    Since Bennett and Brassard proposed the first quantum key distribution (QKD)protocol[Bennett and Brassard (1984)],various facets of secure communication have been explored using quantum technology,such as QKD [Ekert (1991);Bennett (1992)],Quantum secret sharing (QSS)[Long and Liu (2002);Guo (2002);Karlsson,Koashi and Imoto (1999)],Quantum secure direct communication (QSDC)[Deng,Gui and Liu(2003);Deng and Gui (2004);Zhong,Liu and Xu (2018);Man and Xia (2004)] and quantum private comparison (QPC).The main goal of QPCs is to compare the equality of parties’ private information in pubic without revealing their information.The first QPC protocol was proposed by Yang et al.[Yang and Wen (2009)] using Einstein-Podolsky-Rosen (EPR)pairs.Many QPC protocol have been proposed with different quantum states in recent years,such as single particles [Yang,Gao and Wen (2009);Chen,Su,Niu et al.(2014);Liu,Gao,Jia et al.(2013);Yang,Xia,Jia et al.(2012)],Bell states [Yang and Wen (2009);Liu,Wang and Cui (2012);Tseng,Lin and Hwang (2012);Wang,Xu and Yang (2013);Lin,Yang and Hwang (2014)],GHZ states [Chen,Xu,Niu et al.(2010);Liu and Wang (2012);Chang,Tsai and Hwang (2013)] and multiple particle state.A pioneering work of Lo [Lo(2007)] pointed out two-party secure QPC is not possible.This implies that to implement secure QPC,we must have a third party,who would assist the users to compare the equality of their secrets.

    It is easy to find out that all above QPC protocols require all the participants to have quantum capabilities.That is,all the participants equip advance quantum devices such as qubit generating devices and quantum memory,unitary operation and so on.So,how much quantumness is needed for participants? Alternatively,whether all the participants are required to have quantum capabilities? However,such expensive quantum resources and operations cannot be afforded by all parties.In this case,it will be difficult to apply these protocols in real environments.In 2007,Boyer et al.[Boyer,Kenigsberg and Mor(2007)] proposed the first semi-quantum key distribution.There are two participants in Boyer et al.’s schemes.One is a powerful quantum operator and the other one has only classical capabilities.The classic party can either reflect the qubits without disturbed or perform measurement and prepare a new qubit in the classical basis {0,1}.In Boyer’s protocol,it assumes that the classical party has access to a segment of the quantum channel that leads from the lab of the powerful quantum operator to the outside world and then goes back.

    Soon after,many researches based on the semi-quantum have been proposed,such as semi-quantum secret sharing (SQSS),semi-quantum key distribution (SQKD),semiquantum secure direct communication (SQSDC)and semi-quantum private comparison(SQPC).Recently,Chou et al.[Chou,Hwang and Gu (2016)]put forward a SQPC protocol based on Bell states.But the protocol employs quantum entanglement swapping.Thapliyala et al.[Thapliyala,Sharmab and Pathak (2016)] proposed a SQPC protocol using Bell entangled states,and Lang[Lang (2018)] proposed a SQPC protocol using single photons.Ye et al.[Ye and Ye (2018)] designed a multi-user SQPC protocol based on two-particle product states.Moreover,two classical participants need to prepare a shared key before work in the SQPC protocols [Thapliyala,Sharmab and Pathak (2016);Lang (2018);Ye and Ye (2018)].

    Traditionally,it is assumed that a classical party can only perform a restricted set of classical operations over a quantum channel.Specifically,a classical party can measure a qubit in the classical basisand reflect a qubit back without disturbance.Furthermore,the classical user does not require quantum memory.In the paper,we propose a two-party semi-quantum private comparison protocol based on GHZ states.There are three participants in the protocol,where server has all quantum powers,but Alice and Bob are classical.Alice and Bob compare the equality of their private secret with the help of server.Furthermore,server is semi-honest which means that he will follow the protocol honestly,but he may try to learn additional information from the protocol execution.

    The rest of this paper is outlined as follows.In the next section,we give the description of the two-party semi-quantum private comparison protocol in detail.Section 3,we demonstrate the security and efficiency of our protocol.Finally,a conclusion is given in Section 4.

    2 Protocol for two-party semi-quantum private comparison

    In this section,we propose a two-party semi-quantum private comparison scheme.There are three participants in the protocol Alice,Bob and server.Alice and Bob are classic.They want to compare the equality of their private secret.Server is a semi-honest third party who may try to disclose the secret key during executing of the protocol,but he cannot public a fake result or collude with the participants.

    Before giving our scheme,we first describe three-particle GHZ states which will be used in our protocol.

    The three-particle GHZ states can be denoted as

    It is assumed in the proposed protocol that the quantum channels is ideal (i.e.,non-lossy and noiseless)and an authenticated classical channel is shared among all the legitimate participants.An adversary can eavesdrop a message communicated through this channel.Based on the scenario described above,the process of the proposed scheme will be described in steps as follows.

    Step 1:Server prepares4nGHZ states,each of whichiswherei= 1 to 8.He extracts allthefirst particlesin the GHZ states,and formsa sequenceS1inorder.The second particles form a sequenceS2in order,and the third particles form a sequenceS3in order.

    Server keeps the sequenceS1,sendsS2to Alice andS3to Bob.S1,S2andS3containN=4nqubits.

    Step 2:Upon receiving the particles from server,Alice and Bob can perform one of the following operations (Measure or Reflect).

    Measure:Measures the particle in the classical basisand saves the measurement results.

    Reflect:Reflects the qubits back without disturbance.

    Step 3:eavesdropping checking Server restores the returning qubits.Alice and Bob announce their operations on all qubits.In the same position ofS2andS3,only one of them perform a measurement,they need to announce the measurement result.If both of them perform a measurement,they must keep the measurement results confidential.

    Based on the announcement of Alice and Bob,server begins to detect eavesdropping.If both Alice and Bob reflect the qubits,server will perform a GHZ measurement on the reflected particles with his own one (i.e.,the original entangled GHZ state).In other word,if one of them measures the qubit,server will measure his own particle and the reflected particle in the classical basis.Finally,server checks his measurement results,if the error rate exceeds a pre-defined threshold,they proceed to the next step,otherwise terminate the protocol.

    Step 4:After ensuring that there is no eavesdropping,Alice and Bob discard the decoy photons.For the remaining qubits,Alice and Bob perform a measurement in the same positon ofS2andS3.They can use them measurement resultsrAandrB(each of n bit length)to compare their private secret.

    To ensure that Alice and Bob secretly compare their information without exposing their actual contents,Alice and Bob employ the one-way hash function [Damgard (1990)](i.e.,h():{0,1}m→{0,1}n,where m denotes the length of the inputted data,and n denotes the length of the hash code)on their binary representation of secret messageMAandMBto obtain two hash codesh(MA)andh(MB),each of n bit length.Finally,they compute theRA=rA⊕h(MA)andRB=rB⊕h(MB).Finally,Alice and Bob publishRAandRBto server,whereRAandRBcontain n bit.

    Step 5:Server generates a classical bit stringCof n-bits corresponding to the choice of the initial GHZ states,for the ith GHZ state beinghe generatesith bit value inCas 0 (1).Server computesR,which is now exclusive-OR result ofRA,RBandCasR=C⊕RA⊕RB.The bit value 0 (1)ofRicorresponds to the same (different)values ofandThus,if server found out thatRi=0for all,he will public 0,otherwise public 1.

    The process of the proposed protocol is shown in Fig.1,and Tab.1 demonstrates the detailed process,where the parameters “M” and “R” denote measurement and reflection,“GHZ” denotes GHZ measurement.

    Figure1:The process of the proposed protocol

    Table1:The detailed process of the proposed protocol

    Here it is important to note that Alice and Bob cannot announce the measurement results when both of them perform measurement operation in the same position.

    3 Security and efficiency analysis

    In this section,we first analyze the security of the eavesdropping detection to show that the proposed protocol can avoid the outside attacks.Therefore,the efficiency of the protocol is analyzed.

    3.1 The detection probability of eavesdropping information

    Now,let us analyze the efficiency of the eavesdropping detection in the proposed protocol.If there is an outside eavesdropper (Eve)who attempts to derive the session key.She can only use the chance of the transmission ofS2andS3to steal qubits,Eve performs the unitary attack operationon the composed system firstly,and then Alice,Bob and server perform the corresponding operation on these qubits.All the transmitted particles are sent together before eavesdropping is detected.Because Eve does not know which particles are used to detect eavesdropping,she can only perform the same attack operation on all the particles.As for Eve,the state of qubits is distinguishable from the complete mixture,so all qubits are considered in either of the states |0> or |1> with an equal probabilityp=0.5.

    Generally speaking,suppose there is a group of decoy photons in GHZ states |ψ1〉.And we assume that after the attack operationis performed,the state |0> and |1> become

    where |xi>and |yi>are the pure ancillary states determined byuniquely,and

    Then let us compute the detection probability.After attacked by Eve,the state of the composed system becomes

    Obviously,when Alice,Bob and server perform measurement on the decoy photons,the probability without an eavesdropper is

    So the lower bound of the detection probability is

    Suppose |α|2=aand |n|2=b,whereaandbare positive real numbers,anda=b= 1.

    Then

    In the case ofp0=p1=0.5,the maximal amount of information is equal to the Shannon entropy of a binary channel [Gisin,Ribordy and Tittel et al.(2002)],

    After some simple mathematical calculations,we can get

    The maximumIis

    The above results show that if Eve wants to obtain the full information (I=1),the probabilities of the eavesdropping detection isd=0.75.When Eve gains the information,the detection probability is shown in Fig.2.

    Figure2:Detection probability of eavesdropping information

    3.2 Intercept-measure-resend attack

    In the proposed protocol,Alice and Bob randomly perform measurement and reflected operation.Without knowing the position of these operation,Eve will be detected inevitably if Eve performs a projective measurement on them.

    Supposed server prepares Bell statesand send the first and second photon to Alice and Bob,respectively.If Eve intercepts this qubit and performs a measurement on it in the basiswill collapsed intoEve retransmits this result state to Alice and Bob.Accordingly the protocol,Alice and Bob choose randomly either Measurement or Reflected.If one of Alice and Bob decides to Measurement,Eve induces no error.In view ofif both Alice and Bob decide to Reflected,server performs GHZ basis measurement and obtainsoreach with probability of 1/2.Thus,the error rate introduced by Eve is 50%.Therefore,the probability for Eve to pass the security checking isAnd Eve only can obtain the valuable information when both Alice and Bob perform measurement operation,the probability is 1/4.Thus,the probability for Eve to pass the security checking and obtain the valuable information isfor Eve’s interceptmeasure-resend attack,the probability of being detected isThis probability is approximate to 1,ifnis large enough.

    3.3 Flip attack

    When the sequenceS2andS3are transmitted from server to Alice and Bob,Eve can cause Alice and Bob to obtain the wrong bit value of the message by flipping some particles in the sequence.Suppose server prepares GHZ statesand sends the first and second photon to Alice and Bob respectively.Eve intercepts and flips the qubit.Accordingly the protocol,Alice and Bob choose randomly either measurement or reflected operation.If both Alice and Bob decide to measure,Eve induces no error.If one of them decides to reflect,server can find the flip attack with the help of the announcement of Alice and Bob.Thus,the error rate introduced by Eve is 100%.

    Therefore,the probability for Eve to pass the security checking is.Thus,fornencoded message qubits,the probability of being detected isWith the increase ofn,the probability of Eve being detected is also increasing.

    3.4 Man-in-the-middle attack

    If Eve captures the qubit from server to Alice and Bob.She prepares another Bell statesends them to Alice and Bob.Then Eve also catches that qubits back to server.Because we just send back the reflected qubits,and the order of the reflected particle sequence is completely secret to Eve.Even if Eve catches these qubits,she also cannot obtain any secret information.

    3.5 Trojan horse attack

    Since the proposed protocol is a two-way communication protocol,Eve may implement a Trojan horse attack to get the secret message.In order to resist the attack,a photon number splitter (PNS)and a wavelength filter could be added before Alice and Bob’s devices [Cai (2006);Li,Deng and Zhou (2006);Deng,Li,Zhou et al.(2005)].

    3.6 Server’s attack

    Our proposed protocol is considered in semi-honest model.Server may try to learn additional information from the protocol execution.In the protocol,server knows the state of GHZ states and Alice and Bob’s operations on each qubit.From these information,server can only correctly obtain Alice and Bob’s measurement results with probabilityIf the length of the secret message isn,server will have a probability ofto get secret message.When the length of the secret message is large enough,the probability that server correctly obtains Alice and Bob’s secret message is negligible.Thus,the protocol is unconditionally secure against the server.

    3.7 Efficiency analysis

    Performance of a quantum protocol can be characterized using qubit efficiency [Cabello(2000)],wherecis the number of secret bits received by the legal receiver,qdenotes the number of transmitted qubits,andbis the number of classical bits for decoding of the message (classical communications used for checking of eavesdropping are not counted).In our protocol,in order to make the Alice and Bob obtainnbits message,server should prepare 4nGHZ states photons and send 4nphotons to Alice and Bob,respectively.Then Alice and Bob reflect 2nphotons back to server.In addition,2nclassical bits are needed for Alice and Bob to inform server their operations on photons,nclassical bits are needed for Alice and Bob to publicRAandRB.Therefore,totalq=4n+4n+2n+2n= 12n,b=2n+n+n+n= 5n,c=n.Thus the efficiency of the proposed protocol would bewhich is 5.88%.

    4 Conclusion

    In the paper,a two-party semi-quantum private comparison scheme is proposed based on GHZ states.In the protocol,Alice and Bob are classical,they are restricted to either measuring a quantum state or reflecting it in the classical basisCompared with the previous SQPC protocols,the advantage of our protocol lies in that the classical participants only send the reflected qubits back to server,it avoids measurement results leakage,and it also does not need the pre-shared key and quantum entanglement swapping.According to the security analysis,the protocol can resist the outside attacks and semi-honest server attack.It can be used to solve a real application problems,because end users are expected to be classical in reality.Therefore,our proposed protocol is more practical and feasible with current technique.

    Acknowledgement:The work was supported by the National Natural Science Foundation of China (Grant No.61572086),Major Project of Education Department in Sichuan (Grant No.18ZA0109),and Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).

    少妇高潮的动态图| 久久人妻熟女aⅴ| 国产欧美亚洲国产| 全区人妻精品视频| 日本与韩国留学比较| 午夜av观看不卡| 观看av在线不卡| 精品国产一区二区三区久久久樱花| 国产又色又爽无遮挡免| 国产欧美日韩精品一区二区| 亚洲在久久综合| 国产成人一区二区在线| 欧美高清成人免费视频www| 99久久精品一区二区三区| 久热这里只有精品99| 一级黄片播放器| 黑人高潮一二区| 欧美最新免费一区二区三区| 日韩视频在线欧美| 熟女人妻精品中文字幕| 日日爽夜夜爽网站| 国产精品女同一区二区软件| 精品国产一区二区久久| 一级,二级,三级黄色视频| 免费在线观看成人毛片| 久久综合国产亚洲精品| 性色av一级| 精品人妻一区二区三区麻豆| 欧美区成人在线视频| 日日啪夜夜撸| 美女国产视频在线观看| 99九九线精品视频在线观看视频| 一区二区三区免费毛片| 国产精品伦人一区二区| 成年女人在线观看亚洲视频| 亚洲成人av在线免费| 成人毛片60女人毛片免费| 国产精品福利在线免费观看| 国产男人的电影天堂91| 最近中文字幕高清免费大全6| 精品久久久精品久久久| 51国产日韩欧美| 国产欧美日韩一区二区三区在线 | 在现免费观看毛片| 中文字幕制服av| 日韩 亚洲 欧美在线| 国产亚洲5aaaaa淫片| 欧美日韩亚洲高清精品| 夜夜骑夜夜射夜夜干| 国产亚洲午夜精品一区二区久久| 亚洲av.av天堂| 亚洲精品日韩av片在线观看| 性高湖久久久久久久久免费观看| 国产av一区二区精品久久| 蜜桃久久精品国产亚洲av| 美女福利国产在线| 99久久中文字幕三级久久日本| 男人舔奶头视频| 色5月婷婷丁香| 欧美成人精品欧美一级黄| 亚洲av在线观看美女高潮| 成人综合一区亚洲| 三级经典国产精品| 午夜日本视频在线| 一本—道久久a久久精品蜜桃钙片| 成人特级av手机在线观看| 午夜老司机福利剧场| 黄色视频在线播放观看不卡| 亚洲国产精品国产精品| 亚洲av综合色区一区| 乱码一卡2卡4卡精品| 老司机影院毛片| 91久久精品电影网| 精品国产一区二区久久| 人人妻人人添人人爽欧美一区卜| 人妻少妇偷人精品九色| 乱人伦中国视频| 性高湖久久久久久久久免费观看| 国产精品成人在线| 伦理电影免费视频| 成年人午夜在线观看视频| 亚洲国产成人一精品久久久| 蜜桃久久精品国产亚洲av| 日日摸夜夜添夜夜添av毛片| 精品国产露脸久久av麻豆| 男女边摸边吃奶| 色婷婷av一区二区三区视频| 亚洲欧美日韩卡通动漫| 国产成人精品婷婷| 亚洲欧美日韩卡通动漫| 免费黄色在线免费观看| 99国产精品免费福利视频| 国产一区二区三区av在线| 在线观看三级黄色| 王馨瑶露胸无遮挡在线观看| 亚洲精品国产av成人精品| 99热全是精品| 男人添女人高潮全过程视频| 九草在线视频观看| 国产一区二区三区av在线| 午夜激情久久久久久久| 欧美日韩视频高清一区二区三区二| 国产精品99久久99久久久不卡 | 五月开心婷婷网| 国产乱人偷精品视频| 少妇精品久久久久久久| 国产成人精品福利久久| 久久99精品国语久久久| 久久久国产一区二区| 美女内射精品一级片tv| 丰满饥渴人妻一区二区三| 99久久人妻综合| 国产精品国产av在线观看| 国产男女超爽视频在线观看| 免费观看a级毛片全部| 又粗又硬又长又爽又黄的视频| 久久青草综合色| 亚洲四区av| 中文字幕制服av| 成人午夜精彩视频在线观看| 国产免费一级a男人的天堂| 成人毛片60女人毛片免费| 国产一区二区在线观看av| 欧美另类一区| 亚洲国产精品成人久久小说| 成人美女网站在线观看视频| 国产男女超爽视频在线观看| 亚洲欧洲国产日韩| 久久97久久精品| 久久久久网色| 日本91视频免费播放| 麻豆成人av视频| 免费观看在线日韩| 亚洲精品色激情综合| 国产av国产精品国产| 最后的刺客免费高清国语| 人妻系列 视频| 又黄又爽又刺激的免费视频.| 人人妻人人爽人人添夜夜欢视频 | 久久久亚洲精品成人影院| 天天躁夜夜躁狠狠久久av| 男的添女的下面高潮视频| 深夜a级毛片| 夫妻午夜视频| 亚洲国产精品一区三区| 狂野欧美激情性bbbbbb| 免费人成在线观看视频色| 色网站视频免费| 欧美亚洲 丝袜 人妻 在线| 高清黄色对白视频在线免费看 | 中文字幕免费在线视频6| 久久狼人影院| 国产成人精品无人区| 一级毛片电影观看| 国产亚洲一区二区精品| 国产一区有黄有色的免费视频| 久久久欧美国产精品| 黄色一级大片看看| 日日啪夜夜撸| 亚洲情色 制服丝袜| 下体分泌物呈黄色| 亚洲第一av免费看| 国产免费一级a男人的天堂| 女人精品久久久久毛片| 亚洲,一卡二卡三卡| av在线app专区| 岛国毛片在线播放| 日韩制服骚丝袜av| 国产成人a∨麻豆精品| 青春草国产在线视频| 久久韩国三级中文字幕| 蜜桃久久精品国产亚洲av| 欧美日本中文国产一区发布| 91aial.com中文字幕在线观看| 最黄视频免费看| 中国国产av一级| 一区二区三区乱码不卡18| 久久久久久久国产电影| 日韩,欧美,国产一区二区三区| 一级,二级,三级黄色视频| 2018国产大陆天天弄谢| 国产美女午夜福利| 国产成人午夜福利电影在线观看| 免费观看a级毛片全部| 97在线视频观看| 大香蕉97超碰在线| 成人综合一区亚洲| 日韩欧美 国产精品| 国产精品女同一区二区软件| 人妻系列 视频| 成人午夜精彩视频在线观看| 亚洲av中文av极速乱| 免费久久久久久久精品成人欧美视频 | 欧美xxⅹ黑人| 大码成人一级视频| 久久午夜综合久久蜜桃| 国产日韩欧美视频二区| 国产伦在线观看视频一区| 自拍偷自拍亚洲精品老妇| a级毛片免费高清观看在线播放| 99久久精品国产国产毛片| a级毛色黄片| 亚洲欧美成人精品一区二区| 久久99精品国语久久久| 高清不卡的av网站| 肉色欧美久久久久久久蜜桃| 久久99精品国语久久久| 亚洲欧美日韩卡通动漫| 国产av一区二区精品久久| 婷婷色麻豆天堂久久| 国产免费视频播放在线视频| 国产免费又黄又爽又色| av在线观看视频网站免费| 亚洲精品国产成人久久av| 国产美女午夜福利| 亚洲在久久综合| 国产精品偷伦视频观看了| 久久精品国产自在天天线| 国产精品无大码| 18禁在线无遮挡免费观看视频| 丝瓜视频免费看黄片| 成人免费观看视频高清| 七月丁香在线播放| 精品一区二区三区视频在线| 欧美97在线视频| 国产有黄有色有爽视频| 久久久国产一区二区| 在线 av 中文字幕| 久久精品熟女亚洲av麻豆精品| 制服丝袜香蕉在线| 搡老乐熟女国产| 狂野欧美激情性bbbbbb| 国产精品不卡视频一区二区| 亚洲美女黄色视频免费看| 一级毛片久久久久久久久女| 中文字幕免费在线视频6| av有码第一页| av免费在线看不卡| 亚洲精品国产av成人精品| 精品亚洲成国产av| 人妻夜夜爽99麻豆av| 国产成人精品婷婷| 久久人人爽人人片av| 亚洲欧美成人精品一区二区| 久久久久精品久久久久真实原创| 国产在视频线精品| 亚洲三级黄色毛片| 亚洲精品亚洲一区二区| 亚洲精品国产色婷婷电影| 91精品国产国语对白视频| 纯流量卡能插随身wifi吗| 国产一区二区三区综合在线观看 | 热99国产精品久久久久久7| 亚洲国产毛片av蜜桃av| 国产女主播在线喷水免费视频网站| 自拍欧美九色日韩亚洲蝌蚪91 | 久久99蜜桃精品久久| 久久影院123| 免费看av在线观看网站| 两个人免费观看高清视频 | 国产综合精华液| 在线免费观看不下载黄p国产| 成人综合一区亚洲| a级毛片在线看网站| 久久久精品94久久精品| 啦啦啦啦在线视频资源| 日本欧美视频一区| 国产探花极品一区二区| 亚洲欧洲国产日韩| 在线 av 中文字幕| 国产在线男女| 日本午夜av视频| 卡戴珊不雅视频在线播放| 精品99又大又爽又粗少妇毛片| 三级经典国产精品| 纵有疾风起免费观看全集完整版| 在线观看美女被高潮喷水网站| 国产精品久久久久久久久免| 亚洲第一区二区三区不卡| 桃花免费在线播放| 亚洲四区av| 成人亚洲精品一区在线观看| av免费在线看不卡| 狂野欧美白嫩少妇大欣赏| 伦精品一区二区三区| 国产一区二区在线观看日韩| 亚洲,一卡二卡三卡| 99久国产av精品国产电影| 亚洲国产毛片av蜜桃av| 亚洲天堂av无毛| 男人狂女人下面高潮的视频| 国产精品一区二区在线观看99| 最近最新中文字幕免费大全7| 国语对白做爰xxxⅹ性视频网站| 国产伦精品一区二区三区四那| 日日摸夜夜添夜夜爱| 蜜桃久久精品国产亚洲av| 街头女战士在线观看网站| 亚洲,一卡二卡三卡| 日本91视频免费播放| 日韩一本色道免费dvd| 精品少妇久久久久久888优播| 自线自在国产av| 人人妻人人看人人澡| 国产真实伦视频高清在线观看| 亚洲色图综合在线观看| 97精品久久久久久久久久精品| 人人妻人人看人人澡| 观看av在线不卡| 大片电影免费在线观看免费| 香蕉精品网在线| 九草在线视频观看| 我的女老师完整版在线观看| 日韩 亚洲 欧美在线| 国产精品99久久久久久久久| 99久久中文字幕三级久久日本| 久久久久精品性色| 亚洲久久久国产精品| 国产欧美日韩综合在线一区二区 | 亚洲国产色片| 人人妻人人爽人人添夜夜欢视频 | 26uuu在线亚洲综合色| 久久久国产一区二区| 欧美3d第一页| 亚洲成人av在线免费| 免费久久久久久久精品成人欧美视频 | 国产欧美日韩综合在线一区二区 | 高清欧美精品videossex| 日韩视频在线欧美| 少妇人妻 视频| 男人和女人高潮做爰伦理| 极品少妇高潮喷水抽搐| 亚洲精品视频女| 国产老妇伦熟女老妇高清| 在线播放无遮挡| 国产精品秋霞免费鲁丝片| 婷婷色综合www| 赤兔流量卡办理| 欧美精品一区二区免费开放| 王馨瑶露胸无遮挡在线观看| 日韩熟女老妇一区二区性免费视频| 欧美精品国产亚洲| 欧美成人精品欧美一级黄| 天堂中文最新版在线下载| 欧美性感艳星| 国产乱人偷精品视频| 成人综合一区亚洲| 国产精品国产三级国产av玫瑰| 精品亚洲乱码少妇综合久久| 国内揄拍国产精品人妻在线| 蜜桃久久精品国产亚洲av| 3wmmmm亚洲av在线观看| 九九爱精品视频在线观看| 日本午夜av视频| 91精品国产九色| 日本色播在线视频| 久久久久久人妻| 五月伊人婷婷丁香| 国产爽快片一区二区三区| 3wmmmm亚洲av在线观看| 蜜桃久久精品国产亚洲av| 又大又黄又爽视频免费| 高清毛片免费看| 视频区图区小说| 黄色视频在线播放观看不卡| 免费观看a级毛片全部| 国产精品久久久久成人av| 97超碰精品成人国产| 男女边吃奶边做爰视频| 国产精品人妻久久久久久| 欧美另类一区| 又黄又爽又刺激的免费视频.| 国产精品成人在线| 少妇人妻久久综合中文| 久久韩国三级中文字幕| 国产精品蜜桃在线观看| 成年美女黄网站色视频大全免费 | 国产亚洲午夜精品一区二区久久| 亚洲国产成人一精品久久久| 婷婷色麻豆天堂久久| 18禁在线无遮挡免费观看视频| 久久久欧美国产精品| 搡女人真爽免费视频火全软件| 老司机影院成人| 熟女av电影| 桃花免费在线播放| 99热这里只有是精品在线观看| 人人妻人人澡人人爽人人夜夜| 一级片'在线观看视频| 妹子高潮喷水视频| 老司机影院毛片| 观看美女的网站| 免费少妇av软件| 少妇丰满av| 校园人妻丝袜中文字幕| 免费大片黄手机在线观看| 高清av免费在线| 亚洲av不卡在线观看| 亚洲电影在线观看av| 成人影院久久| 中国美白少妇内射xxxbb| 成人国产av品久久久| 久久精品国产亚洲av涩爱| 菩萨蛮人人尽说江南好唐韦庄| 熟女人妻精品中文字幕| 中文字幕人妻丝袜制服| 视频中文字幕在线观看| 欧美变态另类bdsm刘玥| 欧美性感艳星| 精品一区二区三卡| 精品久久久久久久久av| 涩涩av久久男人的天堂| 日本午夜av视频| 欧美xxxx性猛交bbbb| 亚洲成色77777| 我要看日韩黄色一级片| 男人添女人高潮全过程视频| 久久精品国产自在天天线| 99久久人妻综合| 黄片无遮挡物在线观看| 简卡轻食公司| 国产av码专区亚洲av| 99九九线精品视频在线观看视频| 国产精品麻豆人妻色哟哟久久| 亚洲精品亚洲一区二区| 黄色视频在线播放观看不卡| 中文字幕人妻丝袜制服| 大片免费播放器 马上看| 国产伦理片在线播放av一区| 高清av免费在线| 国产乱人偷精品视频| 欧美日韩视频精品一区| 亚洲国产成人一精品久久久| 国产精品福利在线免费观看| 狂野欧美白嫩少妇大欣赏| 亚洲中文av在线| 青春草亚洲视频在线观看| 寂寞人妻少妇视频99o| 最近最新中文字幕免费大全7| 久久久久久人妻| 国产黄色免费在线视频| 亚洲欧美成人综合另类久久久| 九九爱精品视频在线观看| 丰满人妻一区二区三区视频av| 久久国产精品男人的天堂亚洲 | 久久久久精品久久久久真实原创| 亚洲人与动物交配视频| 国产熟女午夜一区二区三区 | 97精品久久久久久久久久精品| 免费高清在线观看视频在线观看| 大香蕉97超碰在线| 欧美最新免费一区二区三区| 日韩欧美精品免费久久| 亚洲国产日韩一区二区| 中文字幕久久专区| 国产精品无大码| 少妇人妻精品综合一区二区| 日本-黄色视频高清免费观看| 色吧在线观看| 亚洲av不卡在线观看| 亚洲精品久久久久久婷婷小说| 久久久久网色| 制服丝袜香蕉在线| 婷婷色综合www| 少妇高潮的动态图| 偷拍熟女少妇极品色| av线在线观看网站| 黄片无遮挡物在线观看| 国产乱来视频区| 久久久久久久久久久久大奶| 国产免费一区二区三区四区乱码| 久久久久久久久久成人| 我要看日韩黄色一级片| 久久久精品免费免费高清| 各种免费的搞黄视频| 国产爽快片一区二区三区| 欧美日韩视频精品一区| 国产美女午夜福利| 哪个播放器可以免费观看大片| 麻豆乱淫一区二区| 天天操日日干夜夜撸| 99久国产av精品国产电影| 国产av精品麻豆| 99热6这里只有精品| 夫妻性生交免费视频一级片| av在线播放精品| 日日摸夜夜添夜夜添av毛片| 亚洲国产av新网站| 亚洲精品成人av观看孕妇| 永久免费av网站大全| 亚洲四区av| 全区人妻精品视频| 午夜老司机福利剧场| 亚洲成色77777| 免费av中文字幕在线| 99热这里只有是精品50| 亚洲精品日韩av片在线观看| 麻豆精品久久久久久蜜桃| 美女大奶头黄色视频| 中文乱码字字幕精品一区二区三区| 免费观看av网站的网址| 精品久久久精品久久久| 大香蕉久久网| 男女边吃奶边做爰视频| 十八禁网站网址无遮挡 | av在线app专区| 亚洲美女黄色视频免费看| 水蜜桃什么品种好| 22中文网久久字幕| 老司机影院成人| 一级毛片黄色毛片免费观看视频| 国产成人a∨麻豆精品| 亚洲国产日韩一区二区| 黑人猛操日本美女一级片| 国产一级毛片在线| √禁漫天堂资源中文www| 十八禁高潮呻吟视频 | av线在线观看网站| 精品久久国产蜜桃| 看十八女毛片水多多多| 美女xxoo啪啪120秒动态图| 精品酒店卫生间| 王馨瑶露胸无遮挡在线观看| 亚洲国产日韩一区二区| av女优亚洲男人天堂| 午夜av观看不卡| 午夜影院在线不卡| 校园人妻丝袜中文字幕| 三级国产精品欧美在线观看| 国产精品伦人一区二区| 啦啦啦在线观看免费高清www| 久久av网站| 一级毛片我不卡| 日产精品乱码卡一卡2卡三| 亚洲不卡免费看| 激情五月婷婷亚洲| 国产精品一区二区三区四区免费观看| 2021少妇久久久久久久久久久| 欧美日韩在线观看h| 观看免费一级毛片| 丰满迷人的少妇在线观看| 国产熟女欧美一区二区| 国产精品一二三区在线看| 日本vs欧美在线观看视频 | 一级毛片久久久久久久久女| 高清午夜精品一区二区三区| 建设人人有责人人尽责人人享有的| 精品久久久久久电影网| 熟女av电影| 一区二区三区乱码不卡18| 亚洲av中文av极速乱| 精品人妻一区二区三区麻豆| 偷拍熟女少妇极品色| 午夜福利在线观看免费完整高清在| 一级av片app| 久久人人爽人人爽人人片va| 女人久久www免费人成看片| 在现免费观看毛片| 少妇丰满av| 国产午夜精品一二区理论片| 国产免费视频播放在线视频| 日韩av在线免费看完整版不卡| 自线自在国产av| 国产高清国产精品国产三级| 99视频精品全部免费 在线| 最近的中文字幕免费完整| 一区二区av电影网| 欧美老熟妇乱子伦牲交| 精品国产国语对白av| 最新的欧美精品一区二区| 免费黄频网站在线观看国产| 少妇裸体淫交视频免费看高清| 大话2 男鬼变身卡| 晚上一个人看的免费电影| 大码成人一级视频| 伦理电影大哥的女人| 亚洲精品第二区| 亚洲av.av天堂| 99re6热这里在线精品视频| 久久国产亚洲av麻豆专区| 人人妻人人澡人人爽人人夜夜| 免费观看的影片在线观看| 天天操日日干夜夜撸| 亚洲精品成人av观看孕妇| 亚洲美女黄色视频免费看| 亚洲精品国产av蜜桃| av免费在线看不卡| 男人添女人高潮全过程视频| 精品久久国产蜜桃| 日韩在线高清观看一区二区三区| 日本爱情动作片www.在线观看| 亚洲中文av在线| 一本大道久久a久久精品| 久久久久久久久久久久大奶| 久久人人爽人人片av| 看非洲黑人一级黄片| av在线app专区| 国产男女内射视频| 亚洲人成网站在线观看播放| 国产精品女同一区二区软件| 日韩熟女老妇一区二区性免费视频| 亚洲国产最新在线播放| 三级国产精品欧美在线观看| 在线免费观看不下载黄p国产| 观看av在线不卡| 亚洲国产毛片av蜜桃av| 色哟哟·www| 午夜福利,免费看| 国产精品久久久久久av不卡| 亚洲国产精品一区二区三区在线| 丝袜脚勾引网站| 日产精品乱码卡一卡2卡三| 内地一区二区视频在线| 一级片'在线观看视频| 亚洲欧美日韩东京热|