• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient self-testing system for quantum computations based on permutations*

    2021-05-06 08:55:52ShuquanMa馬樹泉ChanghuaZhu朱暢華MinNie聶敏andDongxiaoQuan權(quán)東曉
    Chinese Physics B 2021年4期

    Shuquan Ma(馬樹泉), Changhua Zhu(朱暢華),2,?, Min Nie(聶敏), and Dongxiao Quan(權(quán)東曉)

    1State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China

    2Shaanxi Key Laboratory of Information Communication Network and Security,Xi’an University of Posts&Telecommunications,Xi’an 710121,China

    3School of Communications and Information Engineering,Xi’an University of Posts&Telecommunications,Xi’an 710121,China

    Keywords: quantum computation,verification,self-testing systems,complexity theory

    1. Introduction

    It is generally believed that quantum computers can accelerate the solving of some difficult problems that are thought to be intractable on classical computers.[1,2]Nowadays,many experimental implementations of quantum computation have been demonstrated.[3–7]In late 2019, Google Inc. shocked the quantum computing community by announcing that their quantum computer achieved the quantum supremacy.[8]This is the watershed where the quantum computer surpasses the classical computer in processing some specially practical issues. In spite of this declaration aroused a continuing controversy, it brings us an inevitable question: If a problem can not be efficiently solved by a classical computer,how can one believe that the solution obtained by a quantum computer is exactly correct? Indeed,this question has been investigated in complexity theory for many years.[9]However, as far as we know,almost all existing works only concern interactive proof(IP)systems[10](see Ref.[9]). Informally speaking,an interactive proof system traditionally is modeled as a two-party interactive game where two players,an all-powerful prover and a capacity-limited verifier, interact with each other in a backand-forth way. At the end of the game,the verifier accepts or rejects the output of the prover,i.e.,the computation outcome.In this paper, we take a different perspective to analyze this question for the first time by introducing the concept of selftesting systems into the complexity class. Simply speaking,we say a problem has a self-testing system if the computing machine can verify the correctness of the computation by itself according to a part of the computation output. In another word,a self-testing system is a computing machine such that it takes a problem as the input,then after finite steps,outputs the solution of the problem together with a message which can be used to verify if the computation is performed correctly. One may argue that whether it is necessary to define such a model.We give a few reasons to make this point more substantial.

    First, the IP system only suits the scenario where a client and a server, probably in distance, interact with each other,e.g.,one-way quantum computation or delegated quantum computation,[11–15]in which a client remotely instructs a server to perform his private computation. Clearly,this model does not capture a special situation where the computation and the verification are performed by the same party. For instance,imagine that a material company purchases a quantum computer from a quantum computing company, they want to use it to simulate some complicated quantum systems. How can they convince themselves that the result of simulation is correct? Surely, an IP system may still work in this case if we allow workers to interact with the quantum computer back and forth. Nevertheless, they may prefer a way of more direct verification, i.e., they wish they could check the validity of computations according to a part of the output. Second,recall that in delegated quantum computations,most references related to this topic model an untrusted server as an honestbut-curious or malicious server. From the viewpoint of the protocol security,this is a reasonable hypothesis since the data privacy is an important factor in nowadays cloud computing.But, from a business perspective, to maintain a good reputation a sensible server should offer clients a correct computation experience as clients expect. For instance, imagine that two quantum computing companies both promote their quantum cloud services to you, will you choose the one who has a bad reputation due to offering terrible services? So, in this respect, a quantum server should perform a self-testing procedure to make itself sure that the computation task delegated by clients has been accomplished correctly. Even if a malicious server who wants to steal clients’information may plug some backdoor programs in clients’computation,in this case we hope a self-testing system can make the server give up this intention. Finally, self-testing is actually not a new idea in quantum information processing.In 2004,Mayers and Yao introduced the concept of self-testing in quantum apparatus.[16]They showed that a self-testing method can be used to check the unknown quantum apparatus. Then a lot of related works arose(see Ref.[17]for a lately comprehensive review). However, the idea of self-testing in those works is mainly related to device-independence in which the quantum apparatuses are treated as the untrusted devices and the self-testing is mainly used to check if those devices work as we desire. Besides that,we first note that most existing works only consider some special quantum processes,e.g.,generating a certain quantum state,performing a certain quantum measurement, and so on.To generalize those to a general case,we should consider this question from an abstract perspective,which means we should turn back to complexity theory and ask if there is a self-testing system such that given any quantum process it can verify the correctness of executions by itself. Although in Ref.[18]the authors had already put forward the concept of self-testing in quantum circuits.However,they did not promote this idea into the level of complexity classes. Note that Mckague et al. also introduced the concept of self-testing into interactive proofs for BQP problems[19](see Subsection 2.2 for further explanation on BQP problems),but in their work they still considered an interactive proof system with non-communicating quantum provers and a classical verifier.

    Many different verification schemes for quantum computations have been proposed(a lately comprehensive review can be found in Ref. [9]), almost all of them use the language of interactive proof systems to describe the verification. Nevertheless,the basic idea behind these works is somewhat similar.Essentially,to verify whether a computation task f is honestly performed, the method used in the previous work is that the verifier hides some easy question g in the original task f,then the prover is required to compute this mixed task. When appropriate, the verifier retrieves information on the question g and checks if it is the same with his expectation. If so, the computation task f is thought to be performed correctly with a high probability, otherwise the verifier rejects. For example, in Ref. [20], to make sure that the quantum computation is performed correctly,each input qubit is attached by an extra quantum state then they are encrypted by a random Clifford operator,when a basic gate is required to apply on this qubit,the verifier first decrypts the whole state then checks that if the extra state is intact.If all qubits are authenticated,then the verifier accepts the outcome. Similarly,in Ref.[21],to guarantee that the sever performs the computation honestly, the client randomly sets some known qubits called traps in the universal graph state. Once any trap is triggered, the client checks its outcome. If the outcome does not accord with his expectation,the client rejects. From the previous works, we can see that one requirement must be met in this method: the simple question g must be blind for the prover, so that he can not bypass the question g to cheat the verifier. In this paper,we follow the same basic idea. Our main construction technique is to introduce the permutation in the computation. However, since we are considering a self-testing system, we do not need to hide the questions f and g. But, we do hope that the questions f and g are mixed up mutually in a way so that any deviation on f can be projected onto the output of g with a high probability. To do this, we use some extra ancilla qubits as a flag system, then randomly interpolate them into an extended circuit where the ancilla qubits are used to compute the function g while the rest qubits are used to compute the function f. This extended circuit is generated by a sequence of permutations operators and the additional function g is also generated by as a sequence of permutations operators,meanwhile this function g can be efficiently simulated by a classical computer. As a result,we will see that any problem in BQP class can naturally be equipped with a self-testing system if we allow some extra ancilla qubits to be added into the input.

    The rest of this paper is organized as follows. We start by introducing some necessary preliminaries in Section 2. In Section 3,we define the self-testing system and state our main conclusions. Then in Section 4, we describe the construction of the self-testing system. Its completeness and soundness are shown in Section 5. In the final section, we discuss the link between the self-testing system and the interactive proof system.

    2. Preliminaries

    We assume that readers are familiar with the fundamental of quantum computation theory.[22]The n-qubit Pauli group Pnand the n-qubit Clifford group Cnare defined as follows:

    where U(2n) denotes the set of all n-qubit unitary operators.A well-known fact is that the n-qubit Clifford group can be treated as a subset of U(2n) generated by the Hadamard gate H,the phase gate S,and the controlled-NOT gate CX.Besides that,according to the Gottesman–Knill theorem[23]any polynomial size quantum circuit which is composed of H,S, and CX can be efficiently simulated by a classical computer.

    In this paper, we consider the n-qubit quantum circuit in the form of U =UTUT?1...U2U1where each Uiis an n-qubit unitary operator consisting of a tensor product of at most n basic unitary gates from some universal gate set,and each basic gate in Uiacts on different qubits. We call such an operator Uia basic tensor gate. To further explain the meaning of tensor gates,we give a concrete example in Fig.1.

    Fig.1. Given a quantum circuit U (the left) generated from the gate set{H,T,CX}, one can always normalize this circuit into a sequence of basic tensor gates. Some identity gates I may be needed in the normalized circuit.We can see that U=U5U4U3U2U1 where U1=H ?I ?H ?H ?H ?H,and so on.

    2.1. Value and position permutations

    Informally,a permutation can be viewed as a one-to-one function that its domain and range are identical.Following this way,we can define a value permutation on{0,1}nas follows.

    2.2. The BQP class

    The abbreviation BQP denotes the bounded-error quantum polynomial time, whose classical counterpart is the bounded-error probabilistic polynomial time, abbreviated as BPP. Simply speaking, the BQP class contains all problems that can be solved by a quantum computer in polynomial time.Similarly, the BPP class is the problem set that can be efficiently solved by a classical computer.Since we are only interested in problems in BQP class,in the last part of this section we formally introduce the definition of the BQP class.[9]

    Definition 3A language or decision problem L ∈{0,1}*belongs to BQP if there exists a polynomial p(·)and a uniform quantum circuit family Q={Qn,n ∈N}, where each circuit has at most p(n)basic gates,such that for any x ∈{0,1}nthe following properties hold true:

    ? if x ∈L,then Qn(x)accepts with probability at least c,

    ? if x /∈L,then Qn(x)accepts with probability at most s,where c and s are known as the completeness and soundness parameters, respectively. Traditionally, we can set c = 2/3 and s=1/3. However, in full of generality, the rigorous requirement is that c?s ≥1/p(n)and p(n)is some polynomial function.[9]

    3. Main results

    In this work,our main conclusion is that for any problem in BQP class there exists an efficient quantum self-testing system,which can test if the computation result is reliable.Follow the same technicality used in Refs.[20,24],in the reminder of this paper we will consider promise problems,[25]instead of decision problems. A promise problem Π=(ΠYES,ΠNO)is a pair of disjoint sets of strings where the strings in the sets ΠYESand ΠNOare called YES and NO instances of the problem,and have answers YES and NO,respectively. Using promise problems can simplify our analysis, we only need to concern one special promise problem named Q-CIRCUIT problem.[20]

    Definition 4The promise problem Q-CIRCUIT = {QCIRCUITYES,Q-CIRCUITNO}consists of two disjoint quantum circuit sets such that

    where U=UT,...,U1is a quantum circuit made of a sequence of gates acting on n input qubits.

    According to the definition of the BQP class, given any problem in BQP class there exists a uniform quantum circuits family Q={Qn:n ∈N} such that each circuit Qncan take n qubits as an input then output a result of the problem. Intuitively,in order to verify the output by the circuit Qnitself,one can introduce some ancilla qubits in the circuit Qnand use the output state of those ancilla qubits to indicate if the computation has been performed correctly.

    Definition 5A promise problem Π=(ΠYES,ΠNO) in BQP class is said to have a self-testing system if and only if there exists a polynomial-time generated family of uniform quantum circuits Q = {Qn: n ∈N}, where each circuit Qntakes n+d input qubits and produces one output qubit,the first n qubits ρinis the input of the problem while the additional d qubits ρselfis used for self-testing. The following properties hold true:

    ? (completeness)if ρin∈ΠYES,then Pr[Q accepts(ρin,ρself)]≥c;

    ? (soundness)if ρin∈ΠNO,then Pr[Q accepts(ρin,ρself)]≤s,

    The class of promise problems having a self-testing system is denoted by BQPST. In brief,in this work we show the following theorem.

    Theorem 1BQP=BQPST.

    The main proof of the above theorem is shown in Section 5. In the next section,we first describe the construction of our self-testing system.

    4. Self-testing systems for BQP problems

    4.1. Generating algorithms

    ?

    and the corresponding subscript order sican be obtained from the following procedures:

    4.3. Self-testing system

    The main algorithm of a self-testing system for a quantum computation can be divided into three stages.The specific procedure is described as follows.

    ?

    Fig.2. The basic circuit framework of a self-testing system for a quantum circuit U.

    5. Completeness and soundness

    5.1. Completeness

    Now suppose U ?V is a YES-instance of the promise problem Q-CIRCUIT, where the circuit V can be viewed as a redundant input for U, then we can infer that if the protocol is performed correctly,then the self-testing system accepts with probability at least 2/3.

    5.2. Soundness

    Fig.3. Any quantum operation ? on a system can be modeled as a unitary operation W on the system and an extra environment,[22] let W0 be the correct quantum computation circuit then we can obtain W =.

    Then, let ? be the whole quantum operation during the protocol (including any possible deviation), it is easy to see that any such an operation ? can be decomposed as a correct computation ?corfollowed by another deviation ?dev(see Fig.3),that is,

    Finally,we define the projection operator as follows:

    Our basic argument is based mainly on the proof techniques in Refs. [20,24]. The complete proof is shown in Appendix B. Now according to the conclusion in Eq. (18),we immediately obtain that if U ?V is a NO-instance of QCIRCUIT,then no matter what deviation ?devhappens during the protocol,the soundness parameter s always satisfies that

    where we can see that c ?s ≥2/3 ?2?d≥1/poly(n), so it completes the proof of the main theorem.

    6. Links between self-testing systems and interactive proof systems

    We showed that BQP=BQPSTin Section 5. Since we have already known that BQP = QPIP[20,24](the abbreviation QPIP denotes the quantum-prover interactive proofs), as mentioned most previous works considered verifiable quantum computation using the language of the QPIP class, it follows immediately that BQPST=QPIP, which means for any BQP problem there exists at least a pair of verification schemes: a self-testing system and an interactive proof system. A natural question is whether we can construct a system from another one. Clearly, an interactive proof system can be treated as a special kind of self-testing systems if we treat the prover and the verifier as one single party.So,in this paper we are only interested in one direction:constructing an interactive proof system from a self-testing system. In the following content, we will show that given a self-testing system one can easily construct an equivalent interactive proof system. The equivalence means that if a self-testing system is c-completeness and ssoundness,then the same completeness and soundness parameters hold in the constructed interactive proof system. Clearly,to construct an interactive proof system from the self-testing system,a simple way is to hide the complete self-testing system from the prover,which can be easily done by blind quantum computation(BQC).

    6.1. Constructions via blind quantum computation

    We list two implement methods in the following contents,the first one is based on universal blind quantum computation protocol,[12]and the second one is based on secure assisted quantum computation protocol.[27]

    Clearly,the above construction is efficient,this is because all subroutines called by the verifier and the prover can be done in polynomial time. Moreover,the new interactive proof system has the same completeness and soundness parameters,this is because if both verifier and prover are honest, the UBQC protocol will always output the correct outcome. Besides that,in Ref.[12],the UBQC protocol can be implemented in a way such that any interfering prover either fails to alter the computation or escapes from been detected with an exponentially small probability.

    It is worth noting that the above construction requires the verifier to have some quantum capacity. Typically,in the universal quantum computation protocol, the verifier is required to have an ability to prepare some random single qubits,[12]while in the secure assisted quantum computation protocol,the verifier is required to have an ability not only to prepare some random single qubits but also to apply some quantum operations[27](in Ref.[24],the requirement is reduced to prepare some random single qubits).

    7. Conclusions

    At final, we briefly discuss our work. First, we showed that any BQP problem admits a self-testing system which can be used to verify if the computation circuit is performed correctly. The main technique using in our protocol is introducing permutations in the computation circuit. By the positionpermutation operation, the positions of all qubits in the circuit including ancilla qubits are rearranged randomly. By the state-permutation operation, an additional quantum computation which can be efficiently simulated by a classical computer is introduced, the computation result of this additional circuit is used as a witness that checks if the original computation circuit is performed correctly. Second,we showed that given a self-testing system one can easily transform it into an equivalent interactive proof system. There are two different but equivalent implement methods, and they both require the BPP verifier to have some quantum capacity, that is, the verifier can prepare some single qubits. Finally, it is worthy to mention that although our protocol is designed for detecting any possible deviations during the execution by a self-testing way,it does not include the innocent noise during the computation, for example the quantum gate errors. Nevertheless, it is totally possible that we can use some quantum error correction codes to overcome this shortcoming. Consequently, we will consider a fault-tolerant self-testing system in our further works.

    It is natural that most of verifiable quantum computation protocols require the verifier to have some quantum capacity except for considering the post-quantum security[28,29]or the multiple entangled and non-communicating provers.[30,31]Indeed, many researchers believe that there is no interactive proof system such that the prover is restricted to a fully BQP machine while the verifier is restricted to a BPP machine(for example,see Ref.[32]). At first glance,this is an evident conclusion because when a verifier delegates a computation to a prover,if all information sent to the prover is classical,then the BQP prover can generate plenty of duplicates and run those computations locally. As a result,the prover can definitely obtain the computation result,then from the perspective of blind quantum computation,we cannot accomplish the verification.

    Appendix A:The value permutation circuits

    similarly,

    Fig.A1. The quantum circuit V0000,1111 consists of a sequence of 3-qubit controlled-NOT gates. Here we use the open circle notation to indicate conditioning on the qubit being set to zero,while a closed circle indicates conditioning on the qubit being set to one,see Ref.[22]for further explanations.

    From the above two equations, one can immediately obtain that for any distinct x,y,x′,y′, the unitary operators Vx,yand Vx′,y′satisfy the following relation:

    Now using the above conclusion, one can easily check that for any x ∈{0,1}d,the following equation holds true:

    Appendix B:The proof of inequality(18)

    First, according to the quantum information theory,[22]we know that any quantum operation admits an operator-sum representation, thus the deviation ?devin Eq. (16) can be expressed as follows:

    where the operator ?mdenotes the identity operator in Pauli group Pm. Moreover, since the Pauli group can be treated as a basis to the matrices, so each operator Eican be uniquely expressed as a combination of n-qubit Pauli operators,that is,

    where all coefficients {αi,P} are possibly complex numbers and it is easy to check that the numbers satisfy the following equation:

    亚洲av二区三区四区| 日韩成人av中文字幕在线观看 | 国产成人a区在线观看| 麻豆av噜噜一区二区三区| 国产人妻一区二区三区在| 日日干狠狠操夜夜爽| 黄色视频,在线免费观看| 国产亚洲91精品色在线| 精品一区二区免费观看| 美女大奶头视频| 精品一区二区三区视频在线观看免费| 一进一出抽搐gif免费好疼| av在线蜜桃| 欧美日本亚洲视频在线播放| 欧美日本亚洲视频在线播放| 精品熟女少妇av免费看| 欧美绝顶高潮抽搐喷水| 国产亚洲精品久久久久久毛片| 免费观看在线日韩| 身体一侧抽搐| 欧美日韩综合久久久久久| 国产熟女欧美一区二区| 精品福利观看| 亚洲国产精品合色在线| 特级一级黄色大片| 成人美女网站在线观看视频| 午夜激情欧美在线| 国产欧美日韩一区二区精品| 色播亚洲综合网| 变态另类丝袜制服| 亚洲18禁久久av| 国产精品免费一区二区三区在线| 欧美一区二区精品小视频在线| av在线亚洲专区| 国产色婷婷99| 国产亚洲精品av在线| 欧美日韩国产亚洲二区| 青春草视频在线免费观看| 亚洲美女搞黄在线观看 | 人人妻人人澡人人爽人人夜夜 | 乱系列少妇在线播放| 欧美丝袜亚洲另类| 亚洲av免费高清在线观看| 国产美女午夜福利| av卡一久久| 亚洲最大成人手机在线| 久久韩国三级中文字幕| 久久久久久国产a免费观看| 亚洲熟妇中文字幕五十中出| 欧美精品国产亚洲| 日韩欧美一区二区三区在线观看| 村上凉子中文字幕在线| 2021天堂中文幕一二区在线观| 日本熟妇午夜| 成人漫画全彩无遮挡| 亚洲电影在线观看av| 两性午夜刺激爽爽歪歪视频在线观看| 99热这里只有是精品50| 老司机福利观看| 韩国av在线不卡| 18禁裸乳无遮挡免费网站照片| 久久九九热精品免费| 亚洲国产色片| 国产真实乱freesex| 一区二区三区免费毛片| 国产精华一区二区三区| 免费看日本二区| 美女高潮的动态| 亚洲最大成人手机在线| 在现免费观看毛片| 国产精品女同一区二区软件| 亚洲无线在线观看| 久久久久久久午夜电影| 精品久久国产蜜桃| 99在线人妻在线中文字幕| 日本精品一区二区三区蜜桃| 国产精品免费一区二区三区在线| 亚洲综合色惰| 国产真实伦视频高清在线观看| 免费av毛片视频| 亚洲国产精品sss在线观看| 在线观看一区二区三区| 成人av一区二区三区在线看| 亚洲国产日韩欧美精品在线观看| 国产免费男女视频| 18+在线观看网站| 免费av不卡在线播放| 久久精品人妻少妇| 亚洲精品成人久久久久久| 一级a爱片免费观看的视频| 精品国产三级普通话版| 天堂动漫精品| 日本a在线网址| 亚洲成人久久爱视频| 国产色爽女视频免费观看| 色5月婷婷丁香| 网址你懂的国产日韩在线| 一进一出抽搐gif免费好疼| 一级毛片aaaaaa免费看小| 观看免费一级毛片| 一级黄片播放器| 日韩欧美精品免费久久| 国产一区二区亚洲精品在线观看| 国产老妇女一区| 啦啦啦韩国在线观看视频| 老司机福利观看| 国产亚洲精品久久久com| 偷拍熟女少妇极品色| 国产高清激情床上av| 日本黄色视频三级网站网址| 日韩精品中文字幕看吧| 真人做人爱边吃奶动态| 久久久久久久亚洲中文字幕| 极品教师在线视频| 亚洲最大成人av| 久久久色成人| 性色avwww在线观看| 久久婷婷人人爽人人干人人爱| 精品久久国产蜜桃| 国产真实伦视频高清在线观看| 两个人的视频大全免费| 一个人看的www免费观看视频| 在线国产一区二区在线| 国产中年淑女户外野战色| 深爱激情五月婷婷| 日韩欧美三级三区| 一进一出抽搐gif免费好疼| 国语自产精品视频在线第100页| 精品一区二区三区av网在线观看| 精品午夜福利视频在线观看一区| 最近中文字幕高清免费大全6| 草草在线视频免费看| 精品不卡国产一区二区三区| 亚洲丝袜综合中文字幕| 国产精华一区二区三区| 亚洲av美国av| 日韩欧美 国产精品| 波野结衣二区三区在线| 国产老妇女一区| 亚洲成人中文字幕在线播放| 国产精品人妻久久久影院| 18禁在线无遮挡免费观看视频 | 干丝袜人妻中文字幕| 校园春色视频在线观看| 在线播放无遮挡| 国产精品1区2区在线观看.| 国产三级中文精品| 亚洲精品日韩av片在线观看| 国产不卡一卡二| 久久久精品欧美日韩精品| 日韩欧美精品免费久久| 麻豆av噜噜一区二区三区| 午夜精品一区二区三区免费看| 内射极品少妇av片p| 日韩一区二区视频免费看| 看黄色毛片网站| 国产视频一区二区在线看| 亚洲中文字幕日韩| 又粗又爽又猛毛片免费看| 国产精品av视频在线免费观看| 乱人视频在线观看| 在线观看午夜福利视频| 亚洲精品456在线播放app| 麻豆av噜噜一区二区三区| 蜜桃久久精品国产亚洲av| 99热这里只有是精品50| 国产精品99久久久久久久久| 日本-黄色视频高清免费观看| av国产免费在线观看| 在线免费观看的www视频| 国产精品久久久久久精品电影| 波多野结衣高清作品| 欧美在线一区亚洲| av在线播放精品| 一本久久中文字幕| 男人和女人高潮做爰伦理| 亚洲四区av| 中出人妻视频一区二区| 黄色欧美视频在线观看| 波多野结衣巨乳人妻| 看免费成人av毛片| av在线蜜桃| 亚洲欧美成人综合另类久久久 | 亚洲中文日韩欧美视频| 97超碰精品成人国产| 国产视频一区二区在线看| 97碰自拍视频| 久久精品国产清高在天天线| 久久精品影院6| 免费人成视频x8x8入口观看| 日韩亚洲欧美综合| 欧美色欧美亚洲另类二区| 人妻丰满熟妇av一区二区三区| 亚洲国产高清在线一区二区三| 日本 av在线| 91久久精品国产一区二区成人| 色视频www国产| 少妇的逼水好多| 国产白丝娇喘喷水9色精品| 成年女人看的毛片在线观看| 国产亚洲精品综合一区在线观看| 国产又黄又爽又无遮挡在线| 女人被狂操c到高潮| 日本一二三区视频观看| 久久综合国产亚洲精品| 一进一出好大好爽视频| 搡女人真爽免费视频火全软件 | av在线蜜桃| 日本黄色视频三级网站网址| 亚洲av五月六月丁香网| 日韩,欧美,国产一区二区三区 | 特大巨黑吊av在线直播| 免费av观看视频| 91久久精品电影网| 国产男人的电影天堂91| 1024手机看黄色片| 三级经典国产精品| 国产精品精品国产色婷婷| 亚洲国产精品久久男人天堂| 99国产极品粉嫩在线观看| 天天躁日日操中文字幕| 亚洲av不卡在线观看| 日韩成人伦理影院| ponron亚洲| avwww免费| 嫩草影院精品99| 国产人妻一区二区三区在| 国产在视频线在精品| 国产精品人妻久久久久久| 麻豆久久精品国产亚洲av| 久久精品影院6| 成人av在线播放网站| 成人二区视频| 91在线观看av| 国产成人精品久久久久久| 天堂动漫精品| 国产亚洲av嫩草精品影院| 天堂影院成人在线观看| 国产毛片a区久久久久| 免费在线观看影片大全网站| 日韩中字成人| 日日摸夜夜添夜夜爱| 欧美成人精品欧美一级黄| 18+在线观看网站| 成人毛片a级毛片在线播放| 久久精品综合一区二区三区| 亚洲成人久久爱视频| 国产成人a区在线观看| 亚洲色图av天堂| 日本色播在线视频| 成人午夜高清在线视频| 美女高潮的动态| 国产亚洲精品av在线| 男人舔奶头视频| 国产国拍精品亚洲av在线观看| 欧美色欧美亚洲另类二区| 精品福利观看| 男人舔女人下体高潮全视频| 综合色丁香网| 91精品国产九色| 熟妇人妻久久中文字幕3abv| 国产三级在线视频| 女人十人毛片免费观看3o分钟| 国产v大片淫在线免费观看| 日韩精品中文字幕看吧| 久久国产乱子免费精品| 国产成人a∨麻豆精品| 国产在视频线在精品| 人人妻人人澡人人爽人人夜夜 | 少妇的逼水好多| 婷婷亚洲欧美| 欧美又色又爽又黄视频| 色哟哟·www| 久久久色成人| 精品国内亚洲2022精品成人| 在线观看av片永久免费下载| 国产国拍精品亚洲av在线观看| 99在线视频只有这里精品首页| 真人做人爱边吃奶动态| 老熟妇仑乱视频hdxx| 久久久精品欧美日韩精品| 成人二区视频| 变态另类成人亚洲欧美熟女| 99久久精品热视频| 欧美成人a在线观看| 欧美成人精品欧美一级黄| 少妇熟女aⅴ在线视频| 久久精品夜夜夜夜夜久久蜜豆| 69av精品久久久久久| 亚洲欧美精品综合久久99| 亚洲人成网站在线观看播放| 国产av在哪里看| 亚洲av一区综合| 久久99热6这里只有精品| 成人欧美大片| 中文字幕av成人在线电影| 国产精品日韩av在线免费观看| 老司机午夜福利在线观看视频| 黄色日韩在线| 欧美日韩在线观看h| 十八禁网站免费在线| 一夜夜www| 亚洲美女搞黄在线观看 | 精品人妻视频免费看| 十八禁网站免费在线| 久99久视频精品免费| 久久久久久久久中文| 亚洲精品日韩av片在线观看| 国产成人a∨麻豆精品| 久久久久精品国产欧美久久久| 久久精品91蜜桃| avwww免费| 精品久久国产蜜桃| 97超级碰碰碰精品色视频在线观看| 97超碰精品成人国产| 欧美又色又爽又黄视频| 丰满乱子伦码专区| 美女 人体艺术 gogo| 国产成人freesex在线 | 麻豆av噜噜一区二区三区| 免费看光身美女| 亚洲成人中文字幕在线播放| 99久久精品热视频| 91久久精品国产一区二区成人| 18禁在线无遮挡免费观看视频 | 黄片wwwwww| 欧美成人一区二区免费高清观看| 性欧美人与动物交配| 九九在线视频观看精品| 国产精品,欧美在线| videossex国产| 大又大粗又爽又黄少妇毛片口| 91午夜精品亚洲一区二区三区| 亚洲av一区综合| 国产大屁股一区二区在线视频| 亚洲精品日韩在线中文字幕 | 青春草视频在线免费观看| 中文字幕av成人在线电影| 一个人观看的视频www高清免费观看| 成人永久免费在线观看视频| 亚洲av一区综合| 91狼人影院| 国产精品久久久久久精品电影| 精品一区二区三区视频在线| 欧美国产日韩亚洲一区| 波野结衣二区三区在线| 黑人高潮一二区| 99热6这里只有精品| 国产成人freesex在线 | 欧美另类亚洲清纯唯美| av.在线天堂| 中国国产av一级| 51国产日韩欧美| 亚洲经典国产精华液单| 香蕉av资源在线| 狂野欧美白嫩少妇大欣赏| 97超碰精品成人国产| 九九久久精品国产亚洲av麻豆| 麻豆成人午夜福利视频| 国产伦精品一区二区三区四那| 亚洲一区二区三区色噜噜| 变态另类丝袜制服| 成人二区视频| 欧美三级亚洲精品| 黄色视频,在线免费观看| 亚洲图色成人| 97碰自拍视频| 日韩欧美精品免费久久| 国产伦在线观看视频一区| 精品午夜福利在线看| 精品午夜福利视频在线观看一区| 亚洲一区二区三区色噜噜| 综合色av麻豆| 成人av在线播放网站| 中文字幕免费在线视频6| 免费在线观看影片大全网站| 有码 亚洲区| 久久久久性生活片| 夜夜看夜夜爽夜夜摸| 免费人成视频x8x8入口观看| 久久久久久久久久久丰满| 日本与韩国留学比较| av卡一久久| 真实男女啪啪啪动态图| 22中文网久久字幕| 免费不卡的大黄色大毛片视频在线观看 | 免费观看在线日韩| a级毛片a级免费在线| 精品午夜福利视频在线观看一区| 熟女电影av网| 亚洲精品粉嫩美女一区| 又爽又黄无遮挡网站| 少妇熟女aⅴ在线视频| 日韩三级伦理在线观看| 久99久视频精品免费| 久久久久国产精品人妻aⅴ院| 国产不卡一卡二| 男人和女人高潮做爰伦理| 婷婷亚洲欧美| 九九热线精品视视频播放| 99热这里只有精品一区| 国产一级毛片七仙女欲春2| 久久久精品94久久精品| 免费看日本二区| 插逼视频在线观看| 久久久久久久午夜电影| 国产日本99.免费观看| 看免费成人av毛片| 国产精品免费一区二区三区在线| 中文字幕精品亚洲无线码一区| 国产免费男女视频| 美女黄网站色视频| 麻豆乱淫一区二区| 国产熟女欧美一区二区| 久久久精品94久久精品| 精品99又大又爽又粗少妇毛片| 在线观看66精品国产| 亚洲熟妇熟女久久| 久久草成人影院| 悠悠久久av| 六月丁香七月| 国产欧美日韩精品一区二区| 婷婷色综合大香蕉| 亚洲av熟女| 久久久精品大字幕| 男女下面进入的视频免费午夜| 男人和女人高潮做爰伦理| 熟妇人妻久久中文字幕3abv| 免费高清视频大片| 别揉我奶头 嗯啊视频| 久久精品人妻少妇| 97热精品久久久久久| 99精品在免费线老司机午夜| 婷婷六月久久综合丁香| 午夜激情欧美在线| 国产精品久久久久久久电影| 日日摸夜夜添夜夜爱| av专区在线播放| 3wmmmm亚洲av在线观看| 三级毛片av免费| 三级男女做爰猛烈吃奶摸视频| 久久综合国产亚洲精品| 啦啦啦观看免费观看视频高清| 男人舔女人下体高潮全视频| 一进一出抽搐动态| 一级黄色大片毛片| 综合色av麻豆| 久久久精品大字幕| 黄片wwwwww| 欧美丝袜亚洲另类| 亚洲经典国产精华液单| 乱人视频在线观看| 乱码一卡2卡4卡精品| 午夜福利18| 亚洲av免费高清在线观看| 国产免费男女视频| 日韩三级伦理在线观看| 免费看日本二区| 久久精品人妻少妇| 午夜福利视频1000在线观看| 日本熟妇午夜| 97在线视频观看| 真实男女啪啪啪动态图| 无遮挡黄片免费观看| 最近手机中文字幕大全| 国产成人freesex在线 | 级片在线观看| 国产精品福利在线免费观看| 给我免费播放毛片高清在线观看| 黄色一级大片看看| а√天堂www在线а√下载| 日韩一区二区视频免费看| 日日撸夜夜添| 亚洲图色成人| 丰满的人妻完整版| 级片在线观看| 久久久久久久久大av| 老师上课跳d突然被开到最大视频| 男女下面进入的视频免费午夜| 夜夜夜夜夜久久久久| 国产午夜精品久久久久久一区二区三区 | 99国产精品一区二区蜜桃av| 丝袜美腿在线中文| 成人毛片a级毛片在线播放| 性插视频无遮挡在线免费观看| 又黄又爽又免费观看的视频| 亚洲aⅴ乱码一区二区在线播放| 国产毛片a区久久久久| 深爱激情五月婷婷| 国产欧美日韩精品一区二区| 黑人高潮一二区| 99热精品在线国产| 免费av毛片视频| 欧洲精品卡2卡3卡4卡5卡区| 中文亚洲av片在线观看爽| 在线观看午夜福利视频| 99久久九九国产精品国产免费| 99九九线精品视频在线观看视频| 国产亚洲精品综合一区在线观看| 久久精品影院6| 国产欧美日韩精品一区二区| 长腿黑丝高跟| 中文在线观看免费www的网站| 欧美日本亚洲视频在线播放| 免费看日本二区| 欧美日韩精品成人综合77777| 干丝袜人妻中文字幕| 99国产极品粉嫩在线观看| 韩国av在线不卡| 亚洲精品日韩在线中文字幕 | 国产精华一区二区三区| 亚洲经典国产精华液单| 亚洲七黄色美女视频| 天天一区二区日本电影三级| 亚洲无线在线观看| 欧美日本视频| 乱人视频在线观看| 亚洲无线观看免费| 久久久精品欧美日韩精品| 在线播放无遮挡| 嫩草影院精品99| 国产激情偷乱视频一区二区| 国产精品三级大全| 黄色欧美视频在线观看| 日韩欧美一区二区三区在线观看| 色av中文字幕| 在线观看一区二区三区| 如何舔出高潮| 欧美日韩精品成人综合77777| 欧美中文日本在线观看视频| 少妇人妻一区二区三区视频| 午夜老司机福利剧场| 欧美区成人在线视频| 国模一区二区三区四区视频| 三级经典国产精品| 狠狠狠狠99中文字幕| 国产精品99久久久久久久久| 69av精品久久久久久| 女同久久另类99精品国产91| 精品欧美国产一区二区三| 日韩av不卡免费在线播放| 在线免费观看不下载黄p国产| 精华霜和精华液先用哪个| 国产av一区在线观看免费| 免费高清视频大片| 日韩成人伦理影院| 欧美激情在线99| 亚洲国产高清在线一区二区三| 国产精品一区www在线观看| 村上凉子中文字幕在线| 特大巨黑吊av在线直播| 热99在线观看视频| 老女人水多毛片| 日韩制服骚丝袜av| 十八禁国产超污无遮挡网站| 久久精品影院6| 国产综合懂色| 成人午夜高清在线视频| 精品免费久久久久久久清纯| 亚洲欧美成人精品一区二区| 色综合站精品国产| 看片在线看免费视频| 国产精品三级大全| 看黄色毛片网站| 久久综合国产亚洲精品| 伊人久久精品亚洲午夜| av视频在线观看入口| 国产精品一区二区三区四区免费观看 | 日本爱情动作片www.在线观看 | 在线观看美女被高潮喷水网站| 欧美激情国产日韩精品一区| 嫩草影院精品99| 国产午夜精品论理片| 校园人妻丝袜中文字幕| 伦精品一区二区三区| 一级毛片久久久久久久久女| 精品少妇黑人巨大在线播放 | 国产毛片a区久久久久| 亚洲欧美日韩卡通动漫| 婷婷精品国产亚洲av| 夜夜爽天天搞| 国产老妇女一区| 久久国内精品自在自线图片| 久久久久久九九精品二区国产| 久久久久性生活片| 午夜福利18| 女的被弄到高潮叫床怎么办| 精品人妻视频免费看| 欧美高清性xxxxhd video| 日本 av在线| 蜜桃久久精品国产亚洲av| 国产一区亚洲一区在线观看| 国产欧美日韩精品一区二区| 成人漫画全彩无遮挡| 精品少妇黑人巨大在线播放 | 免费av不卡在线播放| 一本久久中文字幕| 1000部很黄的大片| 能在线免费观看的黄片| 天天躁夜夜躁狠狠久久av| aaaaa片日本免费| 2021天堂中文幕一二区在线观| 欧美成人精品欧美一级黄| av免费在线看不卡| a级一级毛片免费在线观看| 日本免费a在线| 少妇熟女aⅴ在线视频| 少妇猛男粗大的猛烈进出视频 | 久久国内精品自在自线图片| 亚洲激情五月婷婷啪啪| 久久久久性生活片| avwww免费| 国产成人a区在线观看| 变态另类丝袜制服| 全区人妻精品视频|