• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*

    2021-07-30 07:35:10JingWenZhang張靜文XiuBoChen陳秀波GangXu徐剛andYiXianYang楊義先
    Chinese Physics B 2021年7期
    關(guān)鍵詞:徐剛

    Jing-Wen Zhang(張靜文) Xiu-Bo Chen(陳秀波) Gang Xu(徐剛) and Yi-Xian Yang(楊義先)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,

    Beijing University of Posts and Telecommunications,Beijing 100876,China

    2School of Information Science and Technology,North China University of Technology,Beijing 100144,China

    Keywords: quantum homomorphic encryption,universal quantum circuit,non-maximally entangled state,security

    1. Introduction

    With the rapid development of the network, it makes information transmission fast and provides a large quantity of information on the Internet. Therefore, the privacy protection of sensitive information is particularly important. When some clients who do not have the computational power cannot calculate their own confidential information,the information needs to be encrypted and sent to a server with rich resources and powerful functions to operate. Homomorphic encryption provides an effective way to process and calculate encrypted data without revealing the contents of the privacy information. Reviewing the classical homomorphic encryption (HE), the idea was first presented by Rivestet al.[1]in 1978. It was widely studied and applied,and can only achieve the additively HE schemes. Until a breakthrough was made in 2009,Gentry[2]found and conducted an in-depth study of the fully homomorphic encryption (FHE) scheme based on nonstandard computational assumptions, thereby giving the multiplicatively HE scheme. Subsequently, many optimization and improvement schemes for FHE have been proposed.[3-7]With the development of classical homomorphic encryption,many achievements have been made and a large amount of related researches have also been sparked, such as delegating computation,[8-11]functional encryption,[12,13]and obfuscation.[14]

    At the same time,this research has drawn attention in the field of quantum information.Quantum homomorphic encryption is that the client delegates quantum computation on the encrypted data to the server,that is,the server performs quantum computation on the ciphertext,and the result is consistent with a valid ciphertext after performing this computation on the original plaintext. In other words, the server implements quantum computation without decrypting, and the client decrypts the computation results to obtain the quantum computation on the original data. In 2012,Rohdeet al.[15]described a limited quantum homomorphic encryption scheme with the boson scattering model and quantum walks to complete the restricted quantum computation.The concept of quantum homomorphic encryption (QHE) and quantum fully homomorphic encryption (QFHE) was proposed by Liang[16]in 2013. In Liang’s scheme,the symmetric QHE scheme was constructed.Then,inspired by the tripartite blind quantum computation,[17]Liang proposed a QHE scheme through the use of universal quantum circuit.[18]It permits universal quantum computation on encrypted quantum state without decryption. Nevertheless, in 2014, Yuet al.[19]found that there is a limitation on the QHE scheme with information-theoretically-secure, that is, deterministic QHE with perfect information theoretic security will certainly lead to exponential overhead. This had led to more in-depth discussions among researchers on QFHE schemes that enable to complete universal quantum computation. In the same year, an effective method was proposed by Fisheret al.[20]By using single photons and linear optics,it is experimentally proved that arbitrary quantum computation can be adequately implemented through a set of quantum gates with few extra resources. Based on the modification of the above work, Broadbent and Jeffery (BJ15) completed the limited number of non-Clifford gates evaluation by presenting two instructive and secure QHE schemes.[21]The formal definitions of QHE and QFHE were given,and the definition of quantum indistinguishability under chosen plaintext attack was also given. In 2016, Duleket al.[22]extended the non-Clifford gate circuit in BJ15 to arbitrary polynomial-sized quantum circuits. A novel compact QFHE scheme was given that could effectively correct the errors in the T-gate evaluation of encrypted quantum data. Based on the research results of Duleket al.,[22]Alagicet al.[23]constructed a QFHE scheme with verification to generate a classical computation log, so that the user can verify the homomorphic quantum computation on the ciphertext. It put forward a new direction for future research,that is,more QFHE schemes with certain properties could be found.

    In 2016, Tanet al.[24]presented a private-key QHE scheme by using the thoughts of group theory. The scheme supported a broad range of quantum computation tasks and limited the information that attackers can access to ensure information theoretic security. After exhaustive research,Ouyang and Tanet al.[25]designed a QHE from quantum codes that allows for the evaluation of a finite number of non-Clifford gates included in the quantum circuits and has entropy security which is independent of the adversary’s computational power. Moreover, this scheme demonstrated that the model of entropy security is stronger than the security model in BJ15. In 2018, Mahadev[26]constructed the first leveled FHE scheme with classical keys for quantum circuits using quantum capable scheme. It makes blind delegate quantum computations possible to the trusted quantum server, while a malicious server cannot get any information from this process.In addition to the above schemes, there are many results related to QHE schemes.[27-31]

    The evaluation of the non-Clifford gates will be subject to errors, leading to the failure of the expected computation results in the QHE scheme. As a result,it is an essential and difficult problem to correct the errors of non-Clifford gate evaluation. The schemes in Refs. [21-25] are all leveled QHE schemes,in which the BJ15 framework utilizes the maximum entangled state to process the correction required for the evaluation of the non-Clifford gates until the decryption phase. In other words, the problem of implementing the QHE scheme via the maximum entangled channel has been studied. As a quantum auxiliary resource,different classes of states are considered to be able to complete the correction of non-Clifford gate evaluation errors in the QHE scheme. Since in the realistic environment, a quantum system is open and usually interacts with the surrounding environment, causing the maximal entangled quantum channel tends to degenerate into the non-maximally entangled quantum channel. Also,it may happen that the source does not produce perfect maximally entangled states rather non-maximally entangled pairs. It has become clear that the non-maximally entangled state is not only relatively well prepared, but also shows evident advantages to implement quantum communication protocols in a specific physical system. For example,three-qubit non-maximally entangled state are used as a resource to attain optimal controlled quantum teleportation fidelity,which essentially lowers the requirements of quantum channels.[32]And,for an amplitude damping channel, it was shown that optimal entanglement negativity is obtained only by a non-maximally entangled state.[33]Hence, it is important to investigate the QHE scheme by utilizing the non-maximally entangled state. The pre-shared non-maximally entangled states are used as auxiliary resources to correctly and safely complete the two-party QHE scheme,while lowering the requirements of the quantum channel. This work is of great importance to the experimental realization of the QHE scheme under inevitable noisy effects.

    In this paper, we initially introduce non-maximally entangled states as auxiliary resources to correct the erroneousP-gate occurring in the non-Clifford gate evaluation.The arbitrary quantum computation can be performed on the encrypted data and the privacy of data is maintained. Then,unlike other schemes explicated from the perspective of algorithm,we give the process of two-party probabilistic quantum homomorphic encryption scheme from the viewpoint of application. Finally,this scheme has a good performance in terms of security.

    The structure of this paper is organized as follows. In Section 2, some preliminary knowledge including quantum computation, quantum one-time pad and quantum homomorphic encryption are introduced. We present our QHE scheme in Section 3. The main idea and the specific process of the scheme are introduced in detail. In Section 4, the security of the scheme is analyzed and discussed.Our work and prospects for future research are summarized in Section 5.

    2. Preliminaries

    In this section, we provide a detailed introduction to the preliminaries,which helps us to have better understandings of our work. At the same time, the basic definition and related properties of QHE are given. Through these preliminaries, it will be smoother to describe our scheme.

    2.1. Quantum computation

    A quantum composite system consists of two or more different physical systems. In many cases of quantum mechanics,it is necessary to work with multiparticle states. The quantum state in the composite system can be expressed as the tensor product form of the quantum states in two subsystems,such as|φA〉|φB〉. If there are two single qubits that cannot be written as tensor product form,i.e.,|φ〉/=|a〉|b〉, then|φ〉is known as entangled state. Quantum entanglement is a property of composite systems which has a significant role in quantum computation.[34]It is also one of the main properties used in this paper. Quantum entanglement can be generated under control in different quantum systems, which reflects nonclassical strong correlation and non-locality in two or more quantum systems. In the processing of quantum information,entangled quantum states are often used as quantum channels.The family of two-qubit entangled states is referred to as Bell states in bipartite system,which can be transformed into each other through local operations and classical communication(LOCC). They are also called EPR states, and the forms are as follows:

    Another fundamental assumption of quantum mechanics suggests that the evolution of a closed quantum system can be characterized by the unitary operator.Common unitary singlequbit operators include Pauli operators and Hadamard gate,where the Pauli operators are denoted byσ0,σx,σy,andσz.[35]Their forms and circuit diagram representations are given in the following expressions:

    In addition to the quantum logic gates described above,phase shift gate and controlled-NOT gate are also common,

    The entire Clifford group circuit can be generated from these gates,but non-Clifford gate,such asT-gate,needs to be added to simulate universal quantum circuit,

    In a classic computer, the circuit consists of logic gates and wires, where the logic gates are responsible for the processing of the information and the wires are used for the transmission of the information. Quantum circuits consist of quantum gates operated on qubits. Each wire in a quantum circuit may not correspond to a physical connection,but to a physical particle transformation in a period of time or a physical particle moving from one location to another in space. A quantum circuit(QC)withn-qubit input andm-qubit output,from left to right represents the transfer process of quantum states in time or space.

    2.2. Quantum one-time pad

    In classical cryptography, the security of encryption and decryption usually depends on the assumption of computational intractability, while in quantum cryptography, the security of quantum cryptography depends on the information theoretic security of quantum mechanical properties. In the context of quantum data, the encryption process of information can be depicted as follows by using the quantum one-time pad(QOTP).

    Alice has a set ofKoperations{Uk}, in which each element is an unitary matrix of 2n×2nand the occurrence probability of each element is 1/22n,acting on the quantum information ofnqubits. A new encryption key is generated each time the qubit is encrypted. The encrypted quantum information would become a completely mixed state, so it is meaningless for Eve to get a complete quantum state,which guarantees the security of quantum information. For the input quantum stateρcarrying information, applying a random Pauli operator to the information state will get the cipher stateσ, which is the completely mixed state,[36]where (a,b) are the key to the pad. Pauli operatorsXandZare chosen uniformly at random to encrypt the quantum information.

    2.3. Quantum homomorphic encryption

    This subsection introduces some definitions of quantum homomorphic encryption,homomorphism,compactness,quantum fully homomorphic encryption. For a deeper understanding of these definitions,refer to Ref.[21].

    Definition 1(quantum homomorphic encryption) Here we introduce the QHE for asymmetric-key,which includes the following four algorithms:

    (i)Key GenerationQHE.KeyGen(1κ)→(pk,sk,ρevk),whereκ ∈Nis the security parameter,pkis the classical public key for encrypting quantum information,skis the classical private key for decrypting,ρevkis the quantum evaluation key for evaluating circuits on the encrypted quantum information.

    (ii)EncryptionQHE.Encpk(ρ)→σ. For the input quantum plaintextρ, it is encrypted into the quantum ciphertextσusing the public keypk.

    (iii)EvaluationQHE.EvalQCρevk(σ)→σ′,whereQCrepresents any quantum evaluation circuit that acts on the encrypted ciphertextσand outputs a ciphertext quantum stateσ′. The evaluation keyρevkis consumed during the process.This ciphertext is identical to the result of the evaluation circuit acting on the plaintext and then encrypting.

    (iv)DecryptionQHE.Decsk(σ′)→ρ′. For the ciphertextσ′, it is decrypted with the private keyskto obtainρ′as the calculation result of the evaluation algorithm acting on the original plaintextρ.

    Definition 2(homomorphism) For any quantum circuitQCand the input quantum plaintextρ, a QHE scheme satisfies homomorphism if there exists a negligible functionηsuch that

    whereΦQCis the quantum channel that is induced by the quantum circuitQC.

    Definition 3(compactness) A QHE scheme is compact if the complexity of the decryption algorithm does not depend on the size of the evaluation circuit. That is, for any quantum circuitQCand ciphertextσ,QHE.Decis applied toQHE.EvalQC(σ). There exists a polynomialp(κ) such that the complexity of this computational process is at mostp(κ).

    Definition 4(quantum fully homomorphic encryption)If the QHE scheme satisfies both homomorphism and compactness for all quantum circuits on some universal gate sets,it is a quantum full homomorphic encryption scheme.

    3. Our scheme

    In this section, based on the model of BJ15, we propose a novel probabilistic quantum homomorphic encryption(PQHE)scheme for universal quantum circuit.Before describing our PQHE scheme,the main idea is given by utilizing the non-maximally entangled state to complete the evaluation of non-Clifford gates. It will be helpful to the proposal of our scheme.

    3.1. Main idea

    Without decrypting the encrypted data, quantum homomorphic encryption gives a feasible way to perform arbitrary computational evaluations. In the construction of QHE scheme, at least one non-Clifford gate should be added to achieve universality for quantum circuits. However, it is always the focus and barrier of the research to deal with the errors in the evaluation of non-Clifford gates.T-gate,i.e.,“8/π”gate,is the first non-Clifford gate to be known. When the homomorphic evaluation ofT-gate is performed on the quantum state encrypted by QOTP, the output will contain an unexpectedPerror,In order to obtain the quantum state expected by the evaluator,the error must be corrected. The user decrypts the corrected quantum state to acquire the result of performingT-gate calculation on the initial plaintext.

    However, the maximum entangled state is considered to be extremely difficult to prepare in a specific physical system. During the preparation of the maximum entangled state,it must be affected by some factors, such as physical equipment,noise and decoherence. Therefore,our scheme extends the BJ15 scheme under the wise usage of the pre-shared nonmaximally entangled states as auxiliary resources to probabilistically correct the erroneousP-gate. Although the probability of success in correcting errors is decreased,it is meaningful from the perspective of experimentally implementing the QHE scheme. The universal quantum circuit with a finite number of non-Clifford gates can be applied on the encrypted quantum state in the evaluation stage.

    The major idea of our scheme is that when performing theT-gate evaluation,the state|Φ〉is introduced which is the non-maximally entangled state given by

    wheremandnare complex numbers and satisfy the normalization condition|m|2+|n|2=1. Then, the CNOT operation is applied on the non-maximally entangled state with the evaluation circuit. The auxiliary particle is introduced by the part of the circuit’s output. After the definedUoperation,the measurement is made. When the final measurement result is|0〉,theP-gate error is successfully corrected. Otherwise, error correction fails. This process is minutely illustrated in Fig.1.

    Fig.1. The homomorphic evaluation of our scheme for T-gate.

    As shown in Fig.1,the quantum state is|φ〉=α|0〉+β|1〉which will be encrypted by using QOTP,that is,the initial state is encrypted byXaZb,whereaandbare random classical bits(a,b ∈{0,1}). The state will be|φ0〉=XaZb|φ〉and the following four cases are obtained:

    When the firstT-gate appears in the evaluation circuit,theTgate will be applied to the ciphertext,|φ1〉=TXaZb|φ〉. And the encrypted state(5)will become

    Table 1. Measurement results of the target qubit and the second particle of the non-maximally entangled state.

    After the above operation is completed, the measurement will be made in the basis{|0〉,|1〉}. The measurement results of the target qubit and the second particle of the non-maximally entangled state will be two classical bits that recorded asrandyrespectively. In Table 1,the values of the measurement results are displayed substantially which all hold up to an irrelevant global phase.

    Through the above series of operations,the coefficient of the state will contain the uncertain valuesmandn. In order to attain the desired result ofT-gate acting on the encrypted state, it will be required to introduce an auxiliary particle|0〉and perform the defined unitary operation that denoted asU,where

    The final state Eq.(11)is measured. If the measurement result is|0〉, theP-gate error is successfully corrected. The desired result of the firstT-gate acting on the encrypted state is obtained,which isTXaZb|φ〉=α|0〉+eiπ/4β|1〉(a=0,b=0)in the example. This result is also consistent with

    3.2. Our PQHE scheme

    In this section, we will specifically present our PQHE scheme. From the perspective of application, there is a clear division of the computations between the client and the server,as well as the determined access rights to the keys and data.Our scheme is a novel two-party PQHE scheme which allows for arbitrary quantum computation within a large class of quantum circuits. Here,the quantum circuit contains Clifford group gates and a finite number of non-Clifford group gates(i.e.,T-gates). In this scheme,firstly,the client randomly generates an encryption key that will be only used once through the key generation algorithm. The private data is encrypted by using QOTP to guarantee the information theoretic security.The encrypted data and the predetermined evaluation circuit are transmitted to the server. Secondly, the server evaluates the received encrypted data according to the sequence of gate operations in the evaluation circuit without decryption. And the evaluated data is returned to the client. Finally, the client generates the decryption key by utilizing the key update rules according to the order of the evaluation circuit and the private key it holds. The evaluated data will be decrypted to get the expected result of the evaluation operation on the original private data. Figure 2 depicts it explicitly.

    Fig.2. Evaluation of our PQHE scheme for T-gate.

    The following process will describe our two-party PQHE scheme by step.

    Step 1PQHE.KeyGen →ek= (a,b), wherea,b ∈{0,1}. The quantum state to be encrypted is|φ〉=α|0〉+β|1〉. The client performs a key generation algorithm to generate a random encryption keyekthat is only used once. The quantum circuitQCEvalintended to be performed on the data will be confirmed corresponding to the sequence of gate operations from the setΓ={X,Z,H,P,CNOT}and theT-gates.It will be used to implement universal quantum circuit evaluation on encrypted data.

    Step 2By using the keyek, the encrypted private data takes the form of

    Assume that the evaluation circuitQCEvalcontainsNquantum gatesGi(i= 1,...,N). WhenGi ∈Γ, the client will transmit the encrypted dataXaZb|φ〉and evaluation circuitQCEvalto the server through the channel. When aT-gate is included in the evaluation circuit, in addition to the abovementioned data and circuit, the client needs to pre-share a non-maximally entangled state with the server and its form is|Φ〉=m|00〉+n|11〉(|m|2+|n|2=1).

    Step 3The server with computational power performs the corresponding operations on the encrypted dataXaZb|φ〉in the order of the evaluation circuitQCEval,and it cannot know the specific content of the data. When the evaluation circuit consists of quantum gatesGi(i=1,...,N),the evaluated data is of the form

    With regard toQCEvalcontaining theT-gate, the operations plotted in the previous section are performed by the server,including the CNOT operations, the definedUoperations and measurements. The operation on the non-maximally entangled state|Φ〉=m|00〉+n|11〉will be delayed to the decryption phase and carried out by the client. At last,the evaluated data is returned to the client.

    Step 4In the final stage, the encryption keyekwill be updated as the decryption key by the client,where the decryption key is denoted asdk=(a′,b′). When the quantum gatesGi ∈Γ(Γ={X,Z,H,P,CNOT}) acting on the encrypted data,the key update rules are listed as follows:

    d) WhenGi=CNOT, sinceCNOTis a two-qubit gate,both the control qubit and the target qubit require keys, that isek=(a,b,c,d)anddk=(a′,b′,c′,d′). Meanwhile,the encrypted state should be(XaZb ?XcZd)|φ〉. The corresponding key update rule is

    In the end, the evaluated data is decrypted using the decryption key to obtain the quantum circuitQCEvalthat performed on the original private data. It is a series of operations and computations that determined by the client in Step 1 in order to get the operated plaintext in private,since

    As introduced in the above scheme, we have made the novel two-party PQHE scheme come true. In the process of evaluating theT-gates,it can be seen from the expression(3)that whena=0, there is no error that needs to be corrected.In the case wherea=1,the evaluator has to correct the error.However, as we will see, the evaluator does not have access to the value ofaas theX-encryption key. The solution provided in our scheme is that the client and the server share the non-maximally entangled state in advance. The conditionalPcorrection needs to be delayed until decryption. The price we have to pay is that the value of the measurement result required to update the key can only be measured as part of the decryption algorithm. The proposal of the above scheme can not only correct the errors in the evaluation of theT-gates,but also ensure the correctness of the QHE scheme. At the same time,the security of the key can be guaranteed,which will not be obtained by the evaluator. Next,we will conduct a detailed security analysis of the proposed PQHE scheme.

    4. Security analysis

    In this section,we now analyze the security of our PQHE scheme in two ways,namely data and key.

    Initially,for the original privacy data,only the client has access to them. Before transmitting this quantum information to the server, the client will use the QOTP technology to encrypt the privacy data|φ〉. The QOTP is an asymmetric quantum encryption method,which generates a pair of random keyek=(a,b)(a,b ∈{0,1})that is used only once.Therefore,the encrypted information becomes a totally mixed state, namely(1/2n)I.The expression(1)proves it clear. Even if an attacker may intercept the encrypted information and receive the complete quantum stateXaZb|φ〉during the transmission,the specific information still cannot be obtained.He has no idea about the value of the key, and the randomness of the key makes it irregular. The key is changed every time the information is encrypted. It will minimize the risk of information leakage, so the perfect security of privacy data is ensured.

    Finally, the encryption keyekis a pair of classical bits(a,b) randomly generated by the client to carry out the key generation algorithm.Each pair of keys will be used only once in the encryption stage,making it impossible for the server to deduce the content of the key by studying regular pattern over time.At the same time,the decryption keydkis renewed from the secure encryption key by the key update rules. It is only consumed by the client. The key update rules are securely owned and applied by the client itself. The encryption keys and decryption keys will not be transmitted over the channel,so the server or other attackers will not be able to get any information about the keys. To conclude, it is obvious that the encryption and decryption keys have a perfect security.

    In summary, through the above analysis, our PQHE scheme has good security performance on privacy data,evaluated data,encryption keys and decryption keys.

    5. Conclusions

    Quantum homomorphic encryption has affirmative advantages in protecting the privacy data,which can perform arbitrary quantum computation during the evaluation. And in the processing of encrypted quantum state,the privacy data is kept secret for the server. The focal point of computation is to correct errors in the evaluation of non-Clifford gate. When applied to a real communication scenario,under the influence of the noise in the outside environment,the maximum entangled state encountered obstacles in the preparation process. Hence,a novel two-party PQHE scheme is proposed. Our scheme shows that the non-maximally entangled state can be used as auxiliary resource to assist in the evaluation of universal quantum circuit. It ensures the security of private data and effectively implements the PQHE scheme. In a broader context,our work opens up a new possible way for the realization of QHE. Compared with the previous scheme, the technical requirements were relaxed in the preparation of quantum entangled states in our scheme. It lowers the requirements for quantum channel, so that our PQHE scheme is more likely to be implemented under the existing experimental conditions.

    Firstly,the non-maximally entangled state was introduced when evaluatingT-gates to complete the correction of thePerrors in the evaluation stage. From an experimental viewpoint,we chose non-maximally entangled state to alleviate the stress on the quantum resources required in the scheme. And it indicated that the evaluation of the non-Clifford gates could be effectively implemented. Secondly,we constructed the specific two-party PQHE scheme described step by step through the explicit illustration. The homomorphic computation of universal quantum circuit on encrypted information was applied.The computations and operations were clarified that both the client and the server need to perform,and the access rights to the keys and data were determined respectively in the PQHE scheme.Finally,the scheme guaranteed the security of privacy data,evaluated data,encryption keys and decryption keys. In conclusion,our PQHE scheme attracts wide attention and may be an achievable QHE scheme, which is of practical importance for the realization of more sophisticated secure quantum computation and multiparty quantum communication.

    We hope that the proposed scheme provides inspiration in speeding up the practical proceeding of QHE scheme and establishing the theoretical basis of information security in the context of quantum communication. Our results make contribution to the application of the theory of QHE in secure quantum computation, but the problem that remains open is the construction of the QFHE scheme. Therefore,it is one of our following researches to study how to combine the QHE scheme with other quantum and classical cryptography protocols to construct a QFHE scheme that has a more efficient performance.

    猜你喜歡
    徐剛
    殺人者徐剛(短篇小說)
    飛天(2025年1期)2025-01-28 00:00:00
    徐剛書法作品選登
    共青城市蘇家垱鄉(xiāng):共繪美麗鄉(xiāng)村新畫卷
    Low-overhead fault-tolerant error correction scheme based on quantum stabilizer codes
    Quantum multicast communication over the butterfly network
    一瞬即永恒
    冬夜
    冬夜
    愿他永遠(yuǎn)是少年
    南方文壇(2016年1期)2016-03-23 13:44:43
    冬夜
    小小說月刊(2016年2期)2016-02-16 12:28:37
    欧美极品一区二区三区四区| 国产精品女同一区二区软件 | 最近最新中文字幕大全电影3| 日韩欧美国产在线观看| 少妇的丰满在线观看| 首页视频小说图片口味搜索| 欧美黄色淫秽网站| www国产在线视频色| 婷婷丁香在线五月| 国产97色在线日韩免费| 在线看三级毛片| 人妻久久中文字幕网| 亚洲不卡免费看| 99久久成人亚洲精品观看| 最近最新中文字幕大全电影3| 怎么达到女性高潮| 在线播放无遮挡| 免费看日本二区| 国产麻豆成人av免费视频| 男人的好看免费观看在线视频| 一个人免费在线观看的高清视频| 久久精品国产清高在天天线| 国产一区在线观看成人免费| 一a级毛片在线观看| ponron亚洲| 人妻夜夜爽99麻豆av| 不卡一级毛片| 亚洲专区国产一区二区| 免费看光身美女| 欧美精品啪啪一区二区三区| 岛国在线观看网站| 欧美日韩国产亚洲二区| 又黄又粗又硬又大视频| 内射极品少妇av片p| 国产高清视频在线播放一区| 亚洲自拍偷在线| 国产伦精品一区二区三区视频9 | 欧美成人性av电影在线观看| 国产高清有码在线观看视频| 日本 欧美在线| 国产亚洲av嫩草精品影院| 日韩亚洲欧美综合| 97超级碰碰碰精品色视频在线观看| 蜜桃亚洲精品一区二区三区| 久久伊人香网站| 看免费av毛片| 国产午夜精品论理片| 久久久久国产精品人妻aⅴ院| 欧美日韩综合久久久久久 | 少妇高潮的动态图| 九九在线视频观看精品| 9191精品国产免费久久| 国产精品一区二区免费欧美| 成人亚洲精品av一区二区| 国产成人av教育| 国产v大片淫在线免费观看| 国产av一区在线观看免费| 国产激情欧美一区二区| 搡老熟女国产l中国老女人| 国产黄片美女视频| 老汉色∧v一级毛片| 男人舔奶头视频| 97人妻精品一区二区三区麻豆| www.色视频.com| 九色成人免费人妻av| 叶爱在线成人免费视频播放| 亚洲国产精品成人综合色| 中亚洲国语对白在线视频| 日韩有码中文字幕| 午夜激情欧美在线| 成人鲁丝片一二三区免费| 法律面前人人平等表现在哪些方面| 夜夜躁狠狠躁天天躁| 国产亚洲精品av在线| 少妇高潮的动态图| 久久精品91蜜桃| 成人国产一区最新在线观看| 亚洲欧美日韩无卡精品| 亚洲精品成人久久久久久| 亚洲18禁久久av| 国产黄色小视频在线观看| 欧美激情在线99| www.www免费av| 欧美色欧美亚洲另类二区| 亚洲第一电影网av| 成人欧美大片| 又黄又粗又硬又大视频| 九九在线视频观看精品| 此物有八面人人有两片| 久久精品夜夜夜夜夜久久蜜豆| 长腿黑丝高跟| 69av精品久久久久久| 久9热在线精品视频| 婷婷丁香在线五月| 色视频www国产| 女人被狂操c到高潮| 久久久久精品国产欧美久久久| 天堂网av新在线| 国产探花极品一区二区| h日本视频在线播放| 大型黄色视频在线免费观看| 久久精品国产自在天天线| 哪里可以看免费的av片| 欧美成人性av电影在线观看| 久久久国产成人免费| 国产精品久久久久久久久免 | 午夜免费激情av| 可以在线观看的亚洲视频| 免费看日本二区| 高清在线国产一区| 日日夜夜操网爽| 免费看光身美女| 国产老妇女一区| 国产精品久久久久久亚洲av鲁大| 最好的美女福利视频网| 国产私拍福利视频在线观看| 亚洲欧美一区二区三区黑人| 一进一出抽搐动态| 少妇的逼好多水| 亚洲国产精品999在线| 亚洲国产欧美人成| 久久精品影院6| 老鸭窝网址在线观看| 色视频www国产| 国产午夜精品论理片| 2021天堂中文幕一二区在线观| 俄罗斯特黄特色一大片| 中文字幕精品亚洲无线码一区| 国产成人欧美在线观看| 内地一区二区视频在线| 成人亚洲精品av一区二区| av专区在线播放| 欧美三级亚洲精品| 草草在线视频免费看| 欧美性感艳星| 久久久久久久精品吃奶| 全区人妻精品视频| 美女黄网站色视频| 日韩亚洲欧美综合| 啦啦啦观看免费观看视频高清| 老汉色∧v一级毛片| 深夜精品福利| 欧美色视频一区免费| 两个人看的免费小视频| 亚洲欧美日韩高清在线视频| 琪琪午夜伦伦电影理论片6080| 成人特级av手机在线观看| 日韩av在线大香蕉| 熟女人妻精品中文字幕| 老司机福利观看| 亚洲在线自拍视频| 一个人看视频在线观看www免费 | 搡女人真爽免费视频火全软件 | 国产真人三级小视频在线观看| 变态另类丝袜制服| 乱人视频在线观看| 性色av乱码一区二区三区2| 久久亚洲真实| 欧美xxxx黑人xx丫x性爽| 国内精品久久久久久久电影| 日韩欧美在线二视频| 国产在视频线在精品| 搞女人的毛片| 麻豆久久精品国产亚洲av| 亚洲自拍偷在线| 亚洲熟妇中文字幕五十中出| 欧美成人性av电影在线观看| 少妇人妻精品综合一区二区 | 在线a可以看的网站| 国产三级中文精品| 免费电影在线观看免费观看| 制服丝袜大香蕉在线| 国产精品嫩草影院av在线观看 | av专区在线播放| 免费在线观看影片大全网站| 国产伦精品一区二区三区视频9 | 国内精品久久久久久久电影| 精品久久久久久久久久久久久| 欧美日本视频| 欧美日韩综合久久久久久 | 精品熟女少妇八av免费久了| 久久国产精品人妻蜜桃| 麻豆成人av在线观看| 18禁国产床啪视频网站| 俺也久久电影网| 久久国产精品人妻蜜桃| 精品一区二区三区人妻视频| 亚洲av成人av| 天天躁日日操中文字幕| 狂野欧美白嫩少妇大欣赏| 九色国产91popny在线| 又黄又粗又硬又大视频| 麻豆久久精品国产亚洲av| 丰满的人妻完整版| 性色av乱码一区二区三区2| 欧美日韩一级在线毛片| 午夜亚洲福利在线播放| 国产精品女同一区二区软件 | 午夜福利在线观看免费完整高清在 | 欧美三级亚洲精品| 午夜福利高清视频| av欧美777| 超碰av人人做人人爽久久 | 高潮久久久久久久久久久不卡| 国产伦一二天堂av在线观看| 欧美一区二区精品小视频在线| 亚洲国产欧洲综合997久久,| 亚洲精品久久国产高清桃花| 非洲黑人性xxxx精品又粗又长| 国产视频内射| 在线国产一区二区在线| 亚洲成人精品中文字幕电影| 欧美日韩中文字幕国产精品一区二区三区| 国产亚洲av嫩草精品影院| svipshipincom国产片| 久久久久国产精品人妻aⅴ院| 亚洲美女黄片视频| 久久久久久久午夜电影| 俺也久久电影网| 亚洲国产精品久久男人天堂| 色老头精品视频在线观看| 神马国产精品三级电影在线观看| 免费高清视频大片| 俺也久久电影网| 日韩欧美国产在线观看| 黄色日韩在线| 亚洲美女视频黄频| 欧美日韩乱码在线| 99riav亚洲国产免费| 99久国产av精品| 欧美绝顶高潮抽搐喷水| 国产精品香港三级国产av潘金莲| 欧美性感艳星| 1024手机看黄色片| 黄色丝袜av网址大全| 白带黄色成豆腐渣| 最好的美女福利视频网| 淫秽高清视频在线观看| 成人性生交大片免费视频hd| 淫妇啪啪啪对白视频| 亚洲人成网站在线播放欧美日韩| 国产午夜精品久久久久久一区二区三区 | 久久伊人香网站| 成年版毛片免费区| 丁香欧美五月| 欧美性感艳星| 日本黄色片子视频| 亚洲午夜理论影院| 伊人久久大香线蕉亚洲五| 19禁男女啪啪无遮挡网站| 欧美xxxx黑人xx丫x性爽| 国产成人啪精品午夜网站| 又紧又爽又黄一区二区| 国产精品香港三级国产av潘金莲| 亚洲av熟女| 亚洲av不卡在线观看| 亚洲无线观看免费| 欧美+亚洲+日韩+国产| 成年女人永久免费观看视频| 欧美日韩福利视频一区二区| 国产色爽女视频免费观看| 欧美区成人在线视频| www.色视频.com| 亚洲五月天丁香| 成人18禁在线播放| 白带黄色成豆腐渣| 国产精品av视频在线免费观看| 国产精品久久久久久人妻精品电影| 久久精品国产99精品国产亚洲性色| 国产免费男女视频| 男女午夜视频在线观看| 丰满乱子伦码专区| 在线观看日韩欧美| 精品一区二区三区av网在线观看| 国产一级毛片七仙女欲春2| 国产成年人精品一区二区| 久久亚洲真实| 午夜福利视频1000在线观看| 精品久久久久久成人av| 国产探花极品一区二区| 中文字幕人成人乱码亚洲影| 成人午夜高清在线视频| 亚洲人成网站在线播| 又黄又爽又免费观看的视频| АⅤ资源中文在线天堂| 男插女下体视频免费在线播放| 国产色爽女视频免费观看| 欧美日韩黄片免| 久久精品影院6| 俺也久久电影网| 久久久久久久亚洲中文字幕 | av福利片在线观看| 九九久久精品国产亚洲av麻豆| 一区二区三区免费毛片| 中出人妻视频一区二区| 亚洲最大成人中文| 少妇丰满av| 中亚洲国语对白在线视频| 国产色爽女视频免费观看| 国产极品精品免费视频能看的| 国产黄a三级三级三级人| 三级毛片av免费| 亚洲成av人片在线播放无| 日韩成人在线观看一区二区三区| 免费大片18禁| 久久精品国产99精品国产亚洲性色| 久久久久国产精品人妻aⅴ院| 久久婷婷人人爽人人干人人爱| 一本久久中文字幕| 欧美一级a爱片免费观看看| 精品电影一区二区在线| 久久久久久大精品| 久久久国产成人精品二区| 少妇熟女aⅴ在线视频| 国产高清激情床上av| 久久久久九九精品影院| 久久久久久久亚洲中文字幕 | 此物有八面人人有两片| 听说在线观看完整版免费高清| 夜夜夜夜夜久久久久| 亚洲欧美日韩东京热| 久久久成人免费电影| 好男人在线观看高清免费视频| 亚洲av中文字字幕乱码综合| 久久精品人妻少妇| 欧美性猛交黑人性爽| 中出人妻视频一区二区| 国语自产精品视频在线第100页| 久久久久久久久久黄片| 精品久久久久久久末码| 久久久久久久亚洲中文字幕 | 亚洲国产高清在线一区二区三| 男女床上黄色一级片免费看| 99精品久久久久人妻精品| 免费人成在线观看视频色| 亚洲美女黄片视频| а√天堂www在线а√下载| 在线播放国产精品三级| 色哟哟哟哟哟哟| 乱人视频在线观看| 色综合欧美亚洲国产小说| 熟女电影av网| 亚洲精品国产精品久久久不卡| aaaaa片日本免费| 亚洲午夜理论影院| 精华霜和精华液先用哪个| 亚洲五月天丁香| 首页视频小说图片口味搜索| 激情在线观看视频在线高清| 91麻豆精品激情在线观看国产| 国产淫片久久久久久久久 | 99精品久久久久人妻精品| 国产亚洲精品综合一区在线观看| 亚洲美女黄片视频| 亚洲五月天丁香| 高潮久久久久久久久久久不卡| 久久欧美精品欧美久久欧美| 中国美女看黄片| 久久国产精品人妻蜜桃| 身体一侧抽搐| 欧美性感艳星| 久久久久精品国产欧美久久久| 精品人妻偷拍中文字幕| 国产黄色小视频在线观看| 午夜福利成人在线免费观看| 搞女人的毛片| 久久精品国产自在天天线| 一本一本综合久久| 亚洲国产日韩欧美精品在线观看 | 亚洲成a人片在线一区二区| 亚洲最大成人中文| 亚洲av美国av| 女警被强在线播放| 国产精品亚洲美女久久久| 色综合亚洲欧美另类图片| 在线观看免费午夜福利视频| 久久精品亚洲精品国产色婷小说| 啦啦啦免费观看视频1| 欧美成狂野欧美在线观看| 日韩欧美在线乱码| 日韩欧美精品v在线| 欧美成人a在线观看| 99热精品在线国产| 精华霜和精华液先用哪个| 免费观看的影片在线观看| 18+在线观看网站| 国产精品香港三级国产av潘金莲| 给我免费播放毛片高清在线观看| netflix在线观看网站| 国产主播在线观看一区二区| 1024手机看黄色片| 两性午夜刺激爽爽歪歪视频在线观看| 色吧在线观看| 精品无人区乱码1区二区| 波野结衣二区三区在线 | 午夜精品久久久久久毛片777| 成人永久免费在线观看视频| 一进一出好大好爽视频| 99热6这里只有精品| 成年版毛片免费区| 长腿黑丝高跟| 少妇的丰满在线观看| 夜夜看夜夜爽夜夜摸| av在线天堂中文字幕| 观看免费一级毛片| 在线观看av片永久免费下载| av视频在线观看入口| 国产综合懂色| 久久精品人妻少妇| 51午夜福利影视在线观看| 淫妇啪啪啪对白视频| 国产一区在线观看成人免费| 日韩亚洲欧美综合| 免费av观看视频| 久久婷婷人人爽人人干人人爱| 美女 人体艺术 gogo| 日本成人三级电影网站| 舔av片在线| 久久久久久久亚洲中文字幕 | 久久精品国产自在天天线| 午夜福利在线观看吧| 脱女人内裤的视频| 国产一区在线观看成人免费| 亚洲人成电影免费在线| 成人国产综合亚洲| 女生性感内裤真人,穿戴方法视频| 午夜福利成人在线免费观看| 日韩人妻高清精品专区| av视频在线观看入口| 日日夜夜操网爽| 在线观看一区二区三区| 在线观看免费午夜福利视频| 一个人看的www免费观看视频| 亚洲熟妇中文字幕五十中出| 婷婷丁香在线五月| 12—13女人毛片做爰片一| 欧美zozozo另类| 国产激情偷乱视频一区二区| 久久亚洲精品不卡| 国产视频内射| 欧美三级亚洲精品| 亚洲av第一区精品v没综合| 一级毛片女人18水好多| 男人舔女人下体高潮全视频| 欧美日韩福利视频一区二区| 精品福利观看| 亚洲av电影在线进入| 一本精品99久久精品77| 日韩欧美精品v在线| 午夜精品久久久久久毛片777| 老司机在亚洲福利影院| 久久久久久大精品| 亚洲人成网站高清观看| 搡老岳熟女国产| 成人av在线播放网站| 亚洲精品一卡2卡三卡4卡5卡| 亚洲狠狠婷婷综合久久图片| 国产精品 欧美亚洲| 波野结衣二区三区在线 | 美女 人体艺术 gogo| 在线天堂最新版资源| 51午夜福利影视在线观看| 一级毛片高清免费大全| 美女黄网站色视频| 亚洲欧美精品综合久久99| 日本免费一区二区三区高清不卡| 亚洲精品久久国产高清桃花| 国产免费男女视频| 国产黄a三级三级三级人| 在线播放国产精品三级| 日韩成人在线观看一区二区三区| 午夜精品久久久久久毛片777| 欧美区成人在线视频| 亚洲欧美日韩卡通动漫| 真人做人爱边吃奶动态| 88av欧美| 国产精品 欧美亚洲| 亚洲自拍偷在线| av女优亚洲男人天堂| 欧美日韩综合久久久久久 | 久久伊人香网站| 亚洲乱码一区二区免费版| 成人性生交大片免费视频hd| 中文亚洲av片在线观看爽| 少妇裸体淫交视频免费看高清| 色综合婷婷激情| 欧美黄色片欧美黄色片| 精品99又大又爽又粗少妇毛片 | 免费看日本二区| 男女午夜视频在线观看| 在线观看免费午夜福利视频| 国产99白浆流出| 日韩高清综合在线| 国产黄片美女视频| 一个人免费在线观看电影| 亚洲中文日韩欧美视频| 亚洲18禁久久av| 欧美国产日韩亚洲一区| 午夜福利欧美成人| 欧美色欧美亚洲另类二区| 999久久久精品免费观看国产| 美女cb高潮喷水在线观看| 熟女电影av网| 久久亚洲真实| 老司机深夜福利视频在线观看| 色综合站精品国产| 99热精品在线国产| 黄片小视频在线播放| 亚洲精品乱码久久久v下载方式 | 狂野欧美白嫩少妇大欣赏| 国产午夜福利久久久久久| 夜夜爽天天搞| 免费看光身美女| 舔av片在线| 9191精品国产免费久久| 欧美一区二区国产精品久久精品| 国产成人av激情在线播放| 亚洲,欧美精品.| 久久国产精品人妻蜜桃| www.色视频.com| 欧美一级毛片孕妇| 日本五十路高清| 免费在线观看亚洲国产| 日韩免费av在线播放| 精品欧美国产一区二区三| 三级男女做爰猛烈吃奶摸视频| 69av精品久久久久久| www日本在线高清视频| 观看美女的网站| 特级一级黄色大片| 国内毛片毛片毛片毛片毛片| 国产欧美日韩精品一区二区| 97超视频在线观看视频| 黄色丝袜av网址大全| 久久精品国产亚洲av香蕉五月| 亚洲av电影不卡..在线观看| 在线视频色国产色| 成人鲁丝片一二三区免费| 波多野结衣高清无吗| 亚洲欧美激情综合另类| 久久欧美精品欧美久久欧美| 美女 人体艺术 gogo| 亚洲专区中文字幕在线| 久99久视频精品免费| 成人国产一区最新在线观看| 51国产日韩欧美| 亚洲精品一区av在线观看| 99久久精品国产亚洲精品| 婷婷精品国产亚洲av在线| 国产日本99.免费观看| 嫩草影视91久久| 18禁黄网站禁片午夜丰满| 伊人久久大香线蕉亚洲五| 少妇人妻精品综合一区二区 | 欧美zozozo另类| 亚洲欧美日韩东京热| 日韩av在线大香蕉| 一个人看的www免费观看视频| 久久久久久久精品吃奶| 国产精品一区二区三区四区免费观看 | 一进一出抽搐gif免费好疼| 别揉我奶头~嗯~啊~动态视频| 欧美区成人在线视频| 欧美黑人巨大hd| 波野结衣二区三区在线 | 亚洲欧美精品综合久久99| 丁香欧美五月| 色综合欧美亚洲国产小说| 一a级毛片在线观看| 欧美极品一区二区三区四区| 亚洲片人在线观看| 国内久久婷婷六月综合欲色啪| 国产精品久久久人人做人人爽| svipshipincom国产片| 免费观看人在逋| 久久久久久久久中文| 极品教师在线免费播放| 国产成+人综合+亚洲专区| 91久久精品国产一区二区成人 | av欧美777| 亚洲天堂国产精品一区在线| 精品国产美女av久久久久小说| 天堂影院成人在线观看| 国产精品一及| 啦啦啦观看免费观看视频高清| 国产精品三级大全| 99久久99久久久精品蜜桃| 叶爱在线成人免费视频播放| 91九色精品人成在线观看| 听说在线观看完整版免费高清| 搡老熟女国产l中国老女人| 欧美日韩乱码在线| 网址你懂的国产日韩在线| 嫁个100分男人电影在线观看| 不卡一级毛片| 99精品久久久久人妻精品| 午夜福利在线在线| 又爽又黄无遮挡网站| 欧美bdsm另类| 日韩欧美在线二视频| 久久精品国产亚洲av香蕉五月| 国产在视频线在精品| 日韩欧美一区二区三区在线观看| av黄色大香蕉| 长腿黑丝高跟| 欧美高清成人免费视频www| 欧美日韩乱码在线| 精品福利观看| 国产亚洲av嫩草精品影院| 好男人电影高清在线观看| 亚洲成a人片在线一区二区| 久久精品国产自在天天线| 中文字幕人妻熟人妻熟丝袜美 | 国产高清videossex| 哪里可以看免费的av片|