• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States

    2019-11-26 06:47:38LiliYanYanChangShibinZhangQirunWangZhiweiShengandYuhuaSun
    Computers Materials&Continua 2019年11期

    Lili Yan,Yan ChangShibin ZhangQirun Wang,Zhiwei Sheng and Yuhua Sun

    Abstract:Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger (GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party (server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’ activi ties are restricted to either measuring a quantum state or reflecting it in the classical basis In addition,security and efficiency of the proposed schemes have been discussed.

    Keywords:Quantum private comparison,semi-quantum protocol,semi-honest third party,GHZ class states.

    1 Introduction

    Since Bennett and Brassard proposed the first quantum key distribution (QKD)protocol[Bennett and Brassard (1984)],various facets of secure communication have been explored using quantum technology,such as QKD [Ekert (1991);Bennett (1992)],Quantum secret sharing (QSS)[Long and Liu (2002);Guo (2002);Karlsson,Koashi and Imoto (1999)],Quantum secure direct communication (QSDC)[Deng,Gui and Liu(2003);Deng and Gui (2004);Zhong,Liu and Xu (2018);Man and Xia (2004)] and quantum private comparison (QPC).The main goal of QPCs is to compare the equality of parties’ private information in pubic without revealing their information.The first QPC protocol was proposed by Yang et al.[Yang and Wen (2009)] using Einstein-Podolsky-Rosen (EPR)pairs.Many QPC protocol have been proposed with different quantum states in recent years,such as single particles [Yang,Gao and Wen (2009);Chen,Su,Niu et al.(2014);Liu,Gao,Jia et al.(2013);Yang,Xia,Jia et al.(2012)],Bell states [Yang and Wen (2009);Liu,Wang and Cui (2012);Tseng,Lin and Hwang (2012);Wang,Xu and Yang (2013);Lin,Yang and Hwang (2014)],GHZ states [Chen,Xu,Niu et al.(2010);Liu and Wang (2012);Chang,Tsai and Hwang (2013)] and multiple particle state.A pioneering work of Lo [Lo(2007)] pointed out two-party secure QPC is not possible.This implies that to implement secure QPC,we must have a third party,who would assist the users to compare the equality of their secrets.

    It is easy to find out that all above QPC protocols require all the participants to have quantum capabilities.That is,all the participants equip advance quantum devices such as qubit generating devices and quantum memory,unitary operation and so on.So,how much quantumness is needed for participants? Alternatively,whether all the participants are required to have quantum capabilities? However,such expensive quantum resources and operations cannot be afforded by all parties.In this case,it will be difficult to apply these protocols in real environments.In 2007,Boyer et al.[Boyer,Kenigsberg and Mor(2007)] proposed the first semi-quantum key distribution.There are two participants in Boyer et al.’s schemes.One is a powerful quantum operator and the other one has only classical capabilities.The classic party can either reflect the qubits without disturbed or perform measurement and prepare a new qubit in the classical basis {0,1}.In Boyer’s protocol,it assumes that the classical party has access to a segment of the quantum channel that leads from the lab of the powerful quantum operator to the outside world and then goes back.

    Soon after,many researches based on the semi-quantum have been proposed,such as semi-quantum secret sharing (SQSS),semi-quantum key distribution (SQKD),semiquantum secure direct communication (SQSDC)and semi-quantum private comparison(SQPC).Recently,Chou et al.[Chou,Hwang and Gu (2016)]put forward a SQPC protocol based on Bell states.But the protocol employs quantum entanglement swapping.Thapliyala et al.[Thapliyala,Sharmab and Pathak (2016)] proposed a SQPC protocol using Bell entangled states,and Lang[Lang (2018)] proposed a SQPC protocol using single photons.Ye et al.[Ye and Ye (2018)] designed a multi-user SQPC protocol based on two-particle product states.Moreover,two classical participants need to prepare a shared key before work in the SQPC protocols [Thapliyala,Sharmab and Pathak (2016);Lang (2018);Ye and Ye (2018)].

    Traditionally,it is assumed that a classical party can only perform a restricted set of classical operations over a quantum channel.Specifically,a classical party can measure a qubit in the classical basisand reflect a qubit back without disturbance.Furthermore,the classical user does not require quantum memory.In the paper,we propose a two-party semi-quantum private comparison protocol based on GHZ states.There are three participants in the protocol,where server has all quantum powers,but Alice and Bob are classical.Alice and Bob compare the equality of their private secret with the help of server.Furthermore,server is semi-honest which means that he will follow the protocol honestly,but he may try to learn additional information from the protocol execution.

    The rest of this paper is outlined as follows.In the next section,we give the description of the two-party semi-quantum private comparison protocol in detail.Section 3,we demonstrate the security and efficiency of our protocol.Finally,a conclusion is given in Section 4.

    2 Protocol for two-party semi-quantum private comparison

    In this section,we propose a two-party semi-quantum private comparison scheme.There are three participants in the protocol Alice,Bob and server.Alice and Bob are classic.They want to compare the equality of their private secret.Server is a semi-honest third party who may try to disclose the secret key during executing of the protocol,but he cannot public a fake result or collude with the participants.

    Before giving our scheme,we first describe three-particle GHZ states which will be used in our protocol.

    The three-particle GHZ states can be denoted as

    It is assumed in the proposed protocol that the quantum channels is ideal (i.e.,non-lossy and noiseless)and an authenticated classical channel is shared among all the legitimate participants.An adversary can eavesdrop a message communicated through this channel.Based on the scenario described above,the process of the proposed scheme will be described in steps as follows.

    Step 1:Server prepares4nGHZ states,each of whichiswherei= 1 to 8.He extracts allthefirst particlesin the GHZ states,and formsa sequenceS1inorder.The second particles form a sequenceS2in order,and the third particles form a sequenceS3in order.

    Server keeps the sequenceS1,sendsS2to Alice andS3to Bob.S1,S2andS3containN=4nqubits.

    Step 2:Upon receiving the particles from server,Alice and Bob can perform one of the following operations (Measure or Reflect).

    Measure:Measures the particle in the classical basisand saves the measurement results.

    Reflect:Reflects the qubits back without disturbance.

    Step 3:eavesdropping checking Server restores the returning qubits.Alice and Bob announce their operations on all qubits.In the same position ofS2andS3,only one of them perform a measurement,they need to announce the measurement result.If both of them perform a measurement,they must keep the measurement results confidential.

    Based on the announcement of Alice and Bob,server begins to detect eavesdropping.If both Alice and Bob reflect the qubits,server will perform a GHZ measurement on the reflected particles with his own one (i.e.,the original entangled GHZ state).In other word,if one of them measures the qubit,server will measure his own particle and the reflected particle in the classical basis.Finally,server checks his measurement results,if the error rate exceeds a pre-defined threshold,they proceed to the next step,otherwise terminate the protocol.

    Step 4:After ensuring that there is no eavesdropping,Alice and Bob discard the decoy photons.For the remaining qubits,Alice and Bob perform a measurement in the same positon ofS2andS3.They can use them measurement resultsrAandrB(each of n bit length)to compare their private secret.

    To ensure that Alice and Bob secretly compare their information without exposing their actual contents,Alice and Bob employ the one-way hash function [Damgard (1990)](i.e.,h():{0,1}m→{0,1}n,where m denotes the length of the inputted data,and n denotes the length of the hash code)on their binary representation of secret messageMAandMBto obtain two hash codesh(MA)andh(MB),each of n bit length.Finally,they compute theRA=rA⊕h(MA)andRB=rB⊕h(MB).Finally,Alice and Bob publishRAandRBto server,whereRAandRBcontain n bit.

    Step 5:Server generates a classical bit stringCof n-bits corresponding to the choice of the initial GHZ states,for the ith GHZ state beinghe generatesith bit value inCas 0 (1).Server computesR,which is now exclusive-OR result ofRA,RBandCasR=C⊕RA⊕RB.The bit value 0 (1)ofRicorresponds to the same (different)values ofandThus,if server found out thatRi=0for all,he will public 0,otherwise public 1.

    The process of the proposed protocol is shown in Fig.1,and Tab.1 demonstrates the detailed process,where the parameters “M” and “R” denote measurement and reflection,“GHZ” denotes GHZ measurement.

    Figure1:The process of the proposed protocol

    Table1:The detailed process of the proposed protocol

    Here it is important to note that Alice and Bob cannot announce the measurement results when both of them perform measurement operation in the same position.

    3 Security and efficiency analysis

    In this section,we first analyze the security of the eavesdropping detection to show that the proposed protocol can avoid the outside attacks.Therefore,the efficiency of the protocol is analyzed.

    3.1 The detection probability of eavesdropping information

    Now,let us analyze the efficiency of the eavesdropping detection in the proposed protocol.If there is an outside eavesdropper (Eve)who attempts to derive the session key.She can only use the chance of the transmission ofS2andS3to steal qubits,Eve performs the unitary attack operationon the composed system firstly,and then Alice,Bob and server perform the corresponding operation on these qubits.All the transmitted particles are sent together before eavesdropping is detected.Because Eve does not know which particles are used to detect eavesdropping,she can only perform the same attack operation on all the particles.As for Eve,the state of qubits is distinguishable from the complete mixture,so all qubits are considered in either of the states |0> or |1> with an equal probabilityp=0.5.

    Generally speaking,suppose there is a group of decoy photons in GHZ states |ψ1〉.And we assume that after the attack operationis performed,the state |0> and |1> become

    where |xi>and |yi>are the pure ancillary states determined byuniquely,and

    Then let us compute the detection probability.After attacked by Eve,the state of the composed system becomes

    Obviously,when Alice,Bob and server perform measurement on the decoy photons,the probability without an eavesdropper is

    So the lower bound of the detection probability is

    Suppose |α|2=aand |n|2=b,whereaandbare positive real numbers,anda=b= 1.

    Then

    In the case ofp0=p1=0.5,the maximal amount of information is equal to the Shannon entropy of a binary channel [Gisin,Ribordy and Tittel et al.(2002)],

    After some simple mathematical calculations,we can get

    The maximumIis

    The above results show that if Eve wants to obtain the full information (I=1),the probabilities of the eavesdropping detection isd=0.75.When Eve gains the information,the detection probability is shown in Fig.2.

    Figure2:Detection probability of eavesdropping information

    3.2 Intercept-measure-resend attack

    In the proposed protocol,Alice and Bob randomly perform measurement and reflected operation.Without knowing the position of these operation,Eve will be detected inevitably if Eve performs a projective measurement on them.

    Supposed server prepares Bell statesand send the first and second photon to Alice and Bob,respectively.If Eve intercepts this qubit and performs a measurement on it in the basiswill collapsed intoEve retransmits this result state to Alice and Bob.Accordingly the protocol,Alice and Bob choose randomly either Measurement or Reflected.If one of Alice and Bob decides to Measurement,Eve induces no error.In view ofif both Alice and Bob decide to Reflected,server performs GHZ basis measurement and obtainsoreach with probability of 1/2.Thus,the error rate introduced by Eve is 50%.Therefore,the probability for Eve to pass the security checking isAnd Eve only can obtain the valuable information when both Alice and Bob perform measurement operation,the probability is 1/4.Thus,the probability for Eve to pass the security checking and obtain the valuable information isfor Eve’s interceptmeasure-resend attack,the probability of being detected isThis probability is approximate to 1,ifnis large enough.

    3.3 Flip attack

    When the sequenceS2andS3are transmitted from server to Alice and Bob,Eve can cause Alice and Bob to obtain the wrong bit value of the message by flipping some particles in the sequence.Suppose server prepares GHZ statesand sends the first and second photon to Alice and Bob respectively.Eve intercepts and flips the qubit.Accordingly the protocol,Alice and Bob choose randomly either measurement or reflected operation.If both Alice and Bob decide to measure,Eve induces no error.If one of them decides to reflect,server can find the flip attack with the help of the announcement of Alice and Bob.Thus,the error rate introduced by Eve is 100%.

    Therefore,the probability for Eve to pass the security checking is.Thus,fornencoded message qubits,the probability of being detected isWith the increase ofn,the probability of Eve being detected is also increasing.

    3.4 Man-in-the-middle attack

    If Eve captures the qubit from server to Alice and Bob.She prepares another Bell statesends them to Alice and Bob.Then Eve also catches that qubits back to server.Because we just send back the reflected qubits,and the order of the reflected particle sequence is completely secret to Eve.Even if Eve catches these qubits,she also cannot obtain any secret information.

    3.5 Trojan horse attack

    Since the proposed protocol is a two-way communication protocol,Eve may implement a Trojan horse attack to get the secret message.In order to resist the attack,a photon number splitter (PNS)and a wavelength filter could be added before Alice and Bob’s devices [Cai (2006);Li,Deng and Zhou (2006);Deng,Li,Zhou et al.(2005)].

    3.6 Server’s attack

    Our proposed protocol is considered in semi-honest model.Server may try to learn additional information from the protocol execution.In the protocol,server knows the state of GHZ states and Alice and Bob’s operations on each qubit.From these information,server can only correctly obtain Alice and Bob’s measurement results with probabilityIf the length of the secret message isn,server will have a probability ofto get secret message.When the length of the secret message is large enough,the probability that server correctly obtains Alice and Bob’s secret message is negligible.Thus,the protocol is unconditionally secure against the server.

    3.7 Efficiency analysis

    Performance of a quantum protocol can be characterized using qubit efficiency [Cabello(2000)],wherecis the number of secret bits received by the legal receiver,qdenotes the number of transmitted qubits,andbis the number of classical bits for decoding of the message (classical communications used for checking of eavesdropping are not counted).In our protocol,in order to make the Alice and Bob obtainnbits message,server should prepare 4nGHZ states photons and send 4nphotons to Alice and Bob,respectively.Then Alice and Bob reflect 2nphotons back to server.In addition,2nclassical bits are needed for Alice and Bob to inform server their operations on photons,nclassical bits are needed for Alice and Bob to publicRAandRB.Therefore,totalq=4n+4n+2n+2n= 12n,b=2n+n+n+n= 5n,c=n.Thus the efficiency of the proposed protocol would bewhich is 5.88%.

    4 Conclusion

    In the paper,a two-party semi-quantum private comparison scheme is proposed based on GHZ states.In the protocol,Alice and Bob are classical,they are restricted to either measuring a quantum state or reflecting it in the classical basisCompared with the previous SQPC protocols,the advantage of our protocol lies in that the classical participants only send the reflected qubits back to server,it avoids measurement results leakage,and it also does not need the pre-shared key and quantum entanglement swapping.According to the security analysis,the protocol can resist the outside attacks and semi-honest server attack.It can be used to solve a real application problems,because end users are expected to be classical in reality.Therefore,our proposed protocol is more practical and feasible with current technique.

    Acknowledgement:The work was supported by the National Natural Science Foundation of China (Grant No.61572086),Major Project of Education Department in Sichuan (Grant No.18ZA0109),and Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).

    嫩草影院精品99| 日韩欧美免费精品| 国产精品av视频在线免费观看| 五月伊人婷婷丁香| 亚洲 国产 在线| 中文亚洲av片在线观看爽| 女同久久另类99精品国产91| 免费观看在线日韩| 国内少妇人妻偷人精品xxx网站| 日韩欧美 国产精品| 亚洲精品在线观看二区| 亚洲精品一区av在线观看| 亚洲自拍偷在线| 成人国产麻豆网| 亚洲av美国av| 少妇的逼好多水| 18禁在线播放成人免费| 久久久久九九精品影院| 一进一出抽搐动态| 成年女人毛片免费观看观看9| 亚洲欧美日韩高清在线视频| 中文字幕av在线有码专区| 黄色配什么色好看| 日韩,欧美,国产一区二区三区 | 啦啦啦韩国在线观看视频| 18+在线观看网站| 国产午夜精品论理片| 特级一级黄色大片| 亚洲av五月六月丁香网| 成年版毛片免费区| 两个人的视频大全免费| 亚洲精品日韩av片在线观看| 在线免费观看的www视频| 成人特级av手机在线观看| 精品久久国产蜜桃| 美女xxoo啪啪120秒动态图| 日日干狠狠操夜夜爽| 国产欧美日韩一区二区精品| 99热这里只有是精品在线观看| 成人性生交大片免费视频hd| 男人的好看免费观看在线视频| 成人性生交大片免费视频hd| 亚洲一区高清亚洲精品| 观看免费一级毛片| 黄色欧美视频在线观看| 国产av一区在线观看免费| 男人狂女人下面高潮的视频| 精品久久久久久久久av| 最近中文字幕高清免费大全6 | 成人精品一区二区免费| 永久网站在线| 国产一区二区在线观看日韩| 美女黄网站色视频| 中文字幕熟女人妻在线| 成人无遮挡网站| 在线看三级毛片| 亚洲第一电影网av| 日韩在线高清观看一区二区三区 | 国产成年人精品一区二区| 露出奶头的视频| 亚洲自偷自拍三级| 婷婷色综合大香蕉| 一进一出好大好爽视频| 成人特级av手机在线观看| 99久久无色码亚洲精品果冻| 国产真实乱freesex| 蜜桃亚洲精品一区二区三区| 国产精品一区二区免费欧美| 亚洲精华国产精华液的使用体验 | 成人性生交大片免费视频hd| 老司机福利观看| 国内精品久久久久精免费| h日本视频在线播放| 国产精品av视频在线免费观看| 国产精品久久久久久av不卡| 又爽又黄a免费视频| 女同久久另类99精品国产91| 麻豆国产97在线/欧美| 人妻少妇偷人精品九色| 成人永久免费在线观看视频| 美女大奶头视频| av视频在线观看入口| 欧美另类亚洲清纯唯美| 一区二区三区激情视频| 欧美性猛交黑人性爽| 一级黄片播放器| 亚洲国产日韩欧美精品在线观看| 免费在线观看影片大全网站| 22中文网久久字幕| 在线天堂最新版资源| 国产精品久久久久久亚洲av鲁大| 午夜福利18| 国内揄拍国产精品人妻在线| 国产精品人妻久久久影院| 99九九线精品视频在线观看视频| 日本一二三区视频观看| 久久久国产成人精品二区| 99热这里只有是精品50| 日韩国内少妇激情av| 1000部很黄的大片| 精品国产三级普通话版| or卡值多少钱| 久久国内精品自在自线图片| 人妻久久中文字幕网| 国产亚洲精品综合一区在线观看| 1000部很黄的大片| 18禁在线播放成人免费| 日韩欧美国产在线观看| 国产精品综合久久久久久久免费| 哪里可以看免费的av片| 91麻豆av在线| 欧美最新免费一区二区三区| 男女边吃奶边做爰视频| 美女高潮的动态| 天天一区二区日本电影三级| 色吧在线观看| xxxwww97欧美| 九九在线视频观看精品| 欧美精品国产亚洲| 干丝袜人妻中文字幕| 欧美日韩瑟瑟在线播放| 亚洲国产欧洲综合997久久,| 最新在线观看一区二区三区| 欧美日韩瑟瑟在线播放| 高清日韩中文字幕在线| 国内精品久久久久久久电影| 欧美最新免费一区二区三区| 国产一区二区激情短视频| 亚洲欧美激情综合另类| 欧美最新免费一区二区三区| 欧美日韩中文字幕国产精品一区二区三区| 美女高潮的动态| 看十八女毛片水多多多| 国国产精品蜜臀av免费| 又爽又黄无遮挡网站| 成人欧美大片| 中文字幕av成人在线电影| 中文字幕熟女人妻在线| 男插女下体视频免费在线播放| 99久久精品国产国产毛片| videossex国产| 热99re8久久精品国产| 久久久久精品国产欧美久久久| 国产精品亚洲美女久久久| 1000部很黄的大片| 高清日韩中文字幕在线| 女人十人毛片免费观看3o分钟| 麻豆久久精品国产亚洲av| 日韩一本色道免费dvd| 日韩中字成人| 国产精品日韩av在线免费观看| 午夜福利在线观看吧| 中出人妻视频一区二区| 国产精品不卡视频一区二区| 亚洲 国产 在线| 天堂√8在线中文| 午夜福利视频1000在线观看| 亚洲天堂国产精品一区在线| 精品福利观看| 搡老岳熟女国产| 国内毛片毛片毛片毛片毛片| 国内精品久久久久久久电影| 国产伦精品一区二区三区四那| 国产极品精品免费视频能看的| 国产精品一及| 一边摸一边抽搐一进一小说| 久久久久精品国产欧美久久久| 国产伦一二天堂av在线观看| 亚洲精品成人久久久久久| 亚洲人成网站在线播| 亚洲电影在线观看av| 欧美一区二区国产精品久久精品| 老司机福利观看| 国产极品精品免费视频能看的| 久久久精品欧美日韩精品| 精品久久久久久成人av| 精品人妻偷拍中文字幕| 色播亚洲综合网| 国产在线精品亚洲第一网站| av国产免费在线观看| 国产成人影院久久av| 精品一区二区三区av网在线观看| 久久精品国产自在天天线| 久久午夜亚洲精品久久| 国产毛片a区久久久久| 天堂动漫精品| 一级av片app| 亚洲专区国产一区二区| 女生性感内裤真人,穿戴方法视频| 91麻豆av在线| 999久久久精品免费观看国产| 99九九线精品视频在线观看视频| 成人美女网站在线观看视频| 3wmmmm亚洲av在线观看| 国产成人aa在线观看| 欧美激情久久久久久爽电影| 狂野欧美激情性xxxx在线观看| 免费黄网站久久成人精品| 麻豆久久精品国产亚洲av| 精品免费久久久久久久清纯| av专区在线播放| 男女下面进入的视频免费午夜| 好男人在线观看高清免费视频| 级片在线观看| 亚洲精品亚洲一区二区| 最近最新免费中文字幕在线| 成人亚洲精品av一区二区| 国产精品一区二区三区四区免费观看 | 亚洲性久久影院| 国产精品,欧美在线| 欧美色欧美亚洲另类二区| 免费av不卡在线播放| 成人特级av手机在线观看| 日本三级黄在线观看| 久久热精品热| 久久国内精品自在自线图片| 少妇熟女aⅴ在线视频| 亚洲18禁久久av| 国产单亲对白刺激| 国产乱人视频| 成年人黄色毛片网站| 欧美绝顶高潮抽搐喷水| 国产一区二区亚洲精品在线观看| 乱码一卡2卡4卡精品| 日本与韩国留学比较| 嫁个100分男人电影在线观看| 91狼人影院| 日本精品一区二区三区蜜桃| 别揉我奶头 嗯啊视频| 男女啪啪激烈高潮av片| 久久久久九九精品影院| 老熟妇乱子伦视频在线观看| a级毛片a级免费在线| 又爽又黄a免费视频| 最好的美女福利视频网| 亚洲成人久久爱视频| 国产乱人伦免费视频| 日韩强制内射视频| 联通29元200g的流量卡| 丰满的人妻完整版| 精品99又大又爽又粗少妇毛片 | 久久久久九九精品影院| 在现免费观看毛片| 免费高清视频大片| 男插女下体视频免费在线播放| 九色国产91popny在线| 亚洲中文字幕一区二区三区有码在线看| 国产精品一区二区三区四区久久| 真人一进一出gif抽搐免费| 可以在线观看毛片的网站| 久久久久久九九精品二区国产| 亚洲av日韩精品久久久久久密| 国产日本99.免费观看| 日本黄色片子视频| 亚洲国产日韩欧美精品在线观看| 久久欧美精品欧美久久欧美| 国产一区二区三区在线臀色熟女| 色视频www国产| 91狼人影院| 亚洲 国产 在线| 久久久久久大精品| 亚洲成a人片在线一区二区| 韩国av一区二区三区四区| 午夜免费成人在线视频| 在线观看美女被高潮喷水网站| 91精品国产九色| 亚洲精品一卡2卡三卡4卡5卡| 久久99热这里只有精品18| 亚洲va在线va天堂va国产| 国产成人a区在线观看| 日韩欧美 国产精品| a级毛片a级免费在线| 又爽又黄无遮挡网站| 婷婷精品国产亚洲av| 我的女老师完整版在线观看| av女优亚洲男人天堂| 日韩在线高清观看一区二区三区 | 在线免费观看的www视频| 精品人妻熟女av久视频| 91狼人影院| 黄色女人牲交| 99在线视频只有这里精品首页| 赤兔流量卡办理| 18禁黄网站禁片免费观看直播| 欧美xxxx黑人xx丫x性爽| 人妻丰满熟妇av一区二区三区| 99国产极品粉嫩在线观看| 91久久精品国产一区二区成人| 中文字幕人妻熟人妻熟丝袜美| 我的老师免费观看完整版| 亚洲最大成人av| 精品久久久久久成人av| 白带黄色成豆腐渣| 国产精品av视频在线免费观看| videossex国产| 99热这里只有是精品50| 精品人妻1区二区| 亚洲欧美日韩高清专用| 色哟哟哟哟哟哟| 日韩高清综合在线| 在线观看66精品国产| 国产高清有码在线观看视频| 国产亚洲精品综合一区在线观看| a级毛片免费高清观看在线播放| 国产色爽女视频免费观看| 男人舔女人下体高潮全视频| 国产单亲对白刺激| 成人三级黄色视频| 一级av片app| 精品人妻1区二区| 熟女人妻精品中文字幕| 国产精品综合久久久久久久免费| av女优亚洲男人天堂| 亚洲国产高清在线一区二区三| 免费人成视频x8x8入口观看| 人妻制服诱惑在线中文字幕| 黄色视频,在线免费观看| 啦啦啦观看免费观看视频高清| 婷婷六月久久综合丁香| 亚洲人成网站在线播| 亚洲精品日韩av片在线观看| 麻豆av噜噜一区二区三区| 亚洲精品亚洲一区二区| 精品无人区乱码1区二区| 99久久久亚洲精品蜜臀av| 国产亚洲精品久久久com| .国产精品久久| 日韩av在线大香蕉| 一个人看的www免费观看视频| 精品免费久久久久久久清纯| 欧美+日韩+精品| 国产精品自产拍在线观看55亚洲| 国产亚洲精品综合一区在线观看| 我要看日韩黄色一级片| 亚洲成av人片在线播放无| 欧美日韩中文字幕国产精品一区二区三区| a级一级毛片免费在线观看| 我的女老师完整版在线观看| 亚洲天堂国产精品一区在线| 美女黄网站色视频| 欧美一级a爱片免费观看看| 国产精品国产三级国产av玫瑰| 国产精品永久免费网站| 他把我摸到了高潮在线观看| 中文在线观看免费www的网站| 久久精品国产亚洲av香蕉五月| 蜜桃亚洲精品一区二区三区| 国产精品久久久久久久电影| 丰满乱子伦码专区| 两人在一起打扑克的视频| 少妇熟女aⅴ在线视频| 美女黄网站色视频| 夜夜夜夜夜久久久久| 一区二区三区激情视频| 中文字幕熟女人妻在线| 九九爱精品视频在线观看| 全区人妻精品视频| 亚洲无线在线观看| 在线看三级毛片| 国产老妇女一区| 国产精品精品国产色婷婷| 尤物成人国产欧美一区二区三区| 精品人妻偷拍中文字幕| 啪啪无遮挡十八禁网站| 成人欧美大片| 久久这里只有精品中国| 简卡轻食公司| 国产精品一区二区三区四区免费观看 | 亚洲电影在线观看av| 免费大片18禁| 精品一区二区三区av网在线观看| 精品人妻视频免费看| 桃红色精品国产亚洲av| 亚洲国产日韩欧美精品在线观看| 他把我摸到了高潮在线观看| 很黄的视频免费| 国产熟女欧美一区二区| 免费观看人在逋| 亚洲av成人精品一区久久| 少妇人妻一区二区三区视频| 亚洲欧美日韩高清专用| 国内精品一区二区在线观看| 床上黄色一级片| 久久精品国产99精品国产亚洲性色| 欧美三级亚洲精品| 嫩草影院新地址| 男女那种视频在线观看| 自拍偷自拍亚洲精品老妇| 美女cb高潮喷水在线观看| 一个人看视频在线观看www免费| 国产av不卡久久| 亚洲精品乱码久久久v下载方式| 日韩人妻高清精品专区| 俄罗斯特黄特色一大片| av在线老鸭窝| 自拍偷自拍亚洲精品老妇| 在现免费观看毛片| 精品福利观看| 国产精品精品国产色婷婷| 亚洲在线自拍视频| 亚洲欧美日韩无卡精品| 俺也久久电影网| 免费看光身美女| 国产成人福利小说| 日本在线视频免费播放| 亚洲自拍偷在线| 精品人妻熟女av久视频| 国产亚洲精品久久久久久毛片| 国产精品女同一区二区软件 | 十八禁网站免费在线| 一卡2卡三卡四卡精品乱码亚洲| 亚洲一区二区三区色噜噜| 麻豆国产97在线/欧美| 又爽又黄a免费视频| 久久热精品热| 午夜福利在线观看吧| 国产在线男女| 香蕉av资源在线| 欧美3d第一页| 日韩人妻高清精品专区| 桃红色精品国产亚洲av| 人妻制服诱惑在线中文字幕| 男女边吃奶边做爰视频| 九色国产91popny在线| 少妇丰满av| 免费看av在线观看网站| 国产爱豆传媒在线观看| 性色avwww在线观看| 亚洲国产精品合色在线| 舔av片在线| 午夜精品一区二区三区免费看| 国产蜜桃级精品一区二区三区| 老司机午夜福利在线观看视频| 成人国产一区最新在线观看| 99久久精品国产国产毛片| 看十八女毛片水多多多| 搡老妇女老女人老熟妇| 看黄色毛片网站| 亚洲熟妇熟女久久| av在线老鸭窝| 91av网一区二区| 亚洲美女搞黄在线观看 | 午夜免费激情av| 一进一出抽搐gif免费好疼| 非洲黑人性xxxx精品又粗又长| 自拍偷自拍亚洲精品老妇| 在线播放国产精品三级| 国产精品免费一区二区三区在线| 成人一区二区视频在线观看| 欧美一区二区亚洲| 婷婷精品国产亚洲av| 给我免费播放毛片高清在线观看| 大型黄色视频在线免费观看| 久久草成人影院| 搡女人真爽免费视频火全软件 | 欧美潮喷喷水| 在线观看美女被高潮喷水网站| 看十八女毛片水多多多| 国产欧美日韩一区二区精品| 日本与韩国留学比较| 99热这里只有精品一区| 国产高清视频在线观看网站| 韩国av一区二区三区四区| 久久久久久久精品吃奶| 国产午夜福利久久久久久| bbb黄色大片| 日本色播在线视频| 真实男女啪啪啪动态图| a级毛片a级免费在线| 欧美精品啪啪一区二区三区| 国产亚洲av嫩草精品影院| 亚洲精品亚洲一区二区| 欧美另类亚洲清纯唯美| 亚洲熟妇中文字幕五十中出| 伦精品一区二区三区| 久久天躁狠狠躁夜夜2o2o| 日本黄大片高清| 韩国av在线不卡| 一a级毛片在线观看| 日本一本二区三区精品| 我要看日韩黄色一级片| 在线观看舔阴道视频| 最近视频中文字幕2019在线8| 99久久精品一区二区三区| 国产精品人妻久久久影院| 国产淫片久久久久久久久| av天堂中文字幕网| 啪啪无遮挡十八禁网站| 伦理电影大哥的女人| 岛国在线免费视频观看| 国产精品亚洲美女久久久| 日韩强制内射视频| 亚洲av中文字字幕乱码综合| 国产黄a三级三级三级人| 欧美最黄视频在线播放免费| 美女高潮喷水抽搐中文字幕| 精品人妻一区二区三区麻豆 | 久久热精品热| 在线免费十八禁| 日本黄色视频三级网站网址| 97热精品久久久久久| 国内精品一区二区在线观看| 日韩欧美免费精品| 国产亚洲精品av在线| 极品教师在线免费播放| 国产亚洲精品av在线| 欧美性猛交╳xxx乱大交人| 尾随美女入室| 深爱激情五月婷婷| 国产伦在线观看视频一区| 免费大片18禁| 国产精品亚洲美女久久久| 少妇裸体淫交视频免费看高清| 欧美人与善性xxx| 69人妻影院| 欧美激情久久久久久爽电影| 亚洲黑人精品在线| 色综合色国产| 日韩av在线大香蕉| h日本视频在线播放| www.www免费av| 一区二区三区激情视频| 给我免费播放毛片高清在线观看| 成年女人看的毛片在线观看| 一本一本综合久久| 免费在线观看影片大全网站| 亚洲四区av| 动漫黄色视频在线观看| 18禁裸乳无遮挡免费网站照片| 网址你懂的国产日韩在线| 免费搜索国产男女视频| 国产精品98久久久久久宅男小说| 日韩欧美精品免费久久| av天堂在线播放| 尤物成人国产欧美一区二区三区| 舔av片在线| 国产亚洲精品久久久久久毛片| 在线看三级毛片| 国产私拍福利视频在线观看| 欧美日韩国产亚洲二区| 久久国内精品自在自线图片| 91av网一区二区| 大又大粗又爽又黄少妇毛片口| 日日干狠狠操夜夜爽| 亚洲成人久久性| 女的被弄到高潮叫床怎么办 | 欧美日韩国产亚洲二区| 毛片女人毛片| 少妇人妻一区二区三区视频| 免费在线观看日本一区| 丝袜美腿在线中文| 97碰自拍视频| 老师上课跳d突然被开到最大视频| 欧美性感艳星| 日本-黄色视频高清免费观看| 美女高潮的动态| 国产精品一区二区三区四区久久| 欧美日韩瑟瑟在线播放| 国产精品美女特级片免费视频播放器| 精品国产三级普通话版| 日韩欧美在线乱码| 高清毛片免费观看视频网站| 日本与韩国留学比较| 亚洲av成人精品一区久久| 最近中文字幕高清免费大全6 | 日韩欧美精品免费久久| 亚洲乱码一区二区免费版| 国产成人a区在线观看| 两个人视频免费观看高清| ponron亚洲| 国产av一区在线观看免费| 18禁在线播放成人免费| av在线蜜桃| 亚洲精品乱码久久久v下载方式| 日韩强制内射视频| 一区二区三区激情视频| 婷婷丁香在线五月| 88av欧美| 成人精品一区二区免费| 少妇裸体淫交视频免费看高清| 婷婷亚洲欧美| 中亚洲国语对白在线视频| 欧美日韩黄片免| 亚洲人成伊人成综合网2020| 国产 一区精品| 国内久久婷婷六月综合欲色啪| 亚洲精品色激情综合| 国产伦精品一区二区三区四那| 欧美一区二区亚洲| 欧美最新免费一区二区三区| 99久久精品国产国产毛片| 悠悠久久av| 久久99热6这里只有精品| 搡老岳熟女国产| 国产av一区在线观看免费| 国产欧美日韩精品亚洲av| 国产亚洲精品av在线| 搡老妇女老女人老熟妇| 白带黄色成豆腐渣| 免费观看的影片在线观看| 日本免费一区二区三区高清不卡| 美女高潮的动态| 久久久成人免费电影| 久久久精品大字幕| 极品教师在线免费播放| h日本视频在线播放| 欧美色视频一区免费| 色在线成人网| 欧洲精品卡2卡3卡4卡5卡区| 十八禁网站免费在线| 亚洲性久久影院| www.www免费av| 亚洲av中文av极速乱 | 欧美日韩精品成人综合77777| 老女人水多毛片|