• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*

    2021-07-30 07:35:10JingWenZhang張靜文XiuBoChen陳秀波GangXu徐剛andYiXianYang楊義先
    Chinese Physics B 2021年7期
    關(guān)鍵詞:徐剛

    Jing-Wen Zhang(張靜文) Xiu-Bo Chen(陳秀波) Gang Xu(徐剛) and Yi-Xian Yang(楊義先)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,

    Beijing University of Posts and Telecommunications,Beijing 100876,China

    2School of Information Science and Technology,North China University of Technology,Beijing 100144,China

    Keywords: quantum homomorphic encryption,universal quantum circuit,non-maximally entangled state,security

    1. Introduction

    With the rapid development of the network, it makes information transmission fast and provides a large quantity of information on the Internet. Therefore, the privacy protection of sensitive information is particularly important. When some clients who do not have the computational power cannot calculate their own confidential information,the information needs to be encrypted and sent to a server with rich resources and powerful functions to operate. Homomorphic encryption provides an effective way to process and calculate encrypted data without revealing the contents of the privacy information. Reviewing the classical homomorphic encryption (HE), the idea was first presented by Rivestet al.[1]in 1978. It was widely studied and applied,and can only achieve the additively HE schemes. Until a breakthrough was made in 2009,Gentry[2]found and conducted an in-depth study of the fully homomorphic encryption (FHE) scheme based on nonstandard computational assumptions, thereby giving the multiplicatively HE scheme. Subsequently, many optimization and improvement schemes for FHE have been proposed.[3-7]With the development of classical homomorphic encryption,many achievements have been made and a large amount of related researches have also been sparked, such as delegating computation,[8-11]functional encryption,[12,13]and obfuscation.[14]

    At the same time,this research has drawn attention in the field of quantum information.Quantum homomorphic encryption is that the client delegates quantum computation on the encrypted data to the server,that is,the server performs quantum computation on the ciphertext,and the result is consistent with a valid ciphertext after performing this computation on the original plaintext. In other words, the server implements quantum computation without decrypting, and the client decrypts the computation results to obtain the quantum computation on the original data. In 2012,Rohdeet al.[15]described a limited quantum homomorphic encryption scheme with the boson scattering model and quantum walks to complete the restricted quantum computation.The concept of quantum homomorphic encryption (QHE) and quantum fully homomorphic encryption (QFHE) was proposed by Liang[16]in 2013. In Liang’s scheme,the symmetric QHE scheme was constructed.Then,inspired by the tripartite blind quantum computation,[17]Liang proposed a QHE scheme through the use of universal quantum circuit.[18]It permits universal quantum computation on encrypted quantum state without decryption. Nevertheless, in 2014, Yuet al.[19]found that there is a limitation on the QHE scheme with information-theoretically-secure, that is, deterministic QHE with perfect information theoretic security will certainly lead to exponential overhead. This had led to more in-depth discussions among researchers on QFHE schemes that enable to complete universal quantum computation. In the same year, an effective method was proposed by Fisheret al.[20]By using single photons and linear optics,it is experimentally proved that arbitrary quantum computation can be adequately implemented through a set of quantum gates with few extra resources. Based on the modification of the above work, Broadbent and Jeffery (BJ15) completed the limited number of non-Clifford gates evaluation by presenting two instructive and secure QHE schemes.[21]The formal definitions of QHE and QFHE were given,and the definition of quantum indistinguishability under chosen plaintext attack was also given. In 2016, Duleket al.[22]extended the non-Clifford gate circuit in BJ15 to arbitrary polynomial-sized quantum circuits. A novel compact QFHE scheme was given that could effectively correct the errors in the T-gate evaluation of encrypted quantum data. Based on the research results of Duleket al.,[22]Alagicet al.[23]constructed a QFHE scheme with verification to generate a classical computation log, so that the user can verify the homomorphic quantum computation on the ciphertext. It put forward a new direction for future research,that is,more QFHE schemes with certain properties could be found.

    In 2016, Tanet al.[24]presented a private-key QHE scheme by using the thoughts of group theory. The scheme supported a broad range of quantum computation tasks and limited the information that attackers can access to ensure information theoretic security. After exhaustive research,Ouyang and Tanet al.[25]designed a QHE from quantum codes that allows for the evaluation of a finite number of non-Clifford gates included in the quantum circuits and has entropy security which is independent of the adversary’s computational power. Moreover, this scheme demonstrated that the model of entropy security is stronger than the security model in BJ15. In 2018, Mahadev[26]constructed the first leveled FHE scheme with classical keys for quantum circuits using quantum capable scheme. It makes blind delegate quantum computations possible to the trusted quantum server, while a malicious server cannot get any information from this process.In addition to the above schemes, there are many results related to QHE schemes.[27-31]

    The evaluation of the non-Clifford gates will be subject to errors, leading to the failure of the expected computation results in the QHE scheme. As a result,it is an essential and difficult problem to correct the errors of non-Clifford gate evaluation. The schemes in Refs. [21-25] are all leveled QHE schemes,in which the BJ15 framework utilizes the maximum entangled state to process the correction required for the evaluation of the non-Clifford gates until the decryption phase. In other words, the problem of implementing the QHE scheme via the maximum entangled channel has been studied. As a quantum auxiliary resource,different classes of states are considered to be able to complete the correction of non-Clifford gate evaluation errors in the QHE scheme. Since in the realistic environment, a quantum system is open and usually interacts with the surrounding environment, causing the maximal entangled quantum channel tends to degenerate into the non-maximally entangled quantum channel. Also,it may happen that the source does not produce perfect maximally entangled states rather non-maximally entangled pairs. It has become clear that the non-maximally entangled state is not only relatively well prepared, but also shows evident advantages to implement quantum communication protocols in a specific physical system. For example,three-qubit non-maximally entangled state are used as a resource to attain optimal controlled quantum teleportation fidelity,which essentially lowers the requirements of quantum channels.[32]And,for an amplitude damping channel, it was shown that optimal entanglement negativity is obtained only by a non-maximally entangled state.[33]Hence, it is important to investigate the QHE scheme by utilizing the non-maximally entangled state. The pre-shared non-maximally entangled states are used as auxiliary resources to correctly and safely complete the two-party QHE scheme,while lowering the requirements of the quantum channel. This work is of great importance to the experimental realization of the QHE scheme under inevitable noisy effects.

    In this paper, we initially introduce non-maximally entangled states as auxiliary resources to correct the erroneousP-gate occurring in the non-Clifford gate evaluation.The arbitrary quantum computation can be performed on the encrypted data and the privacy of data is maintained. Then,unlike other schemes explicated from the perspective of algorithm,we give the process of two-party probabilistic quantum homomorphic encryption scheme from the viewpoint of application. Finally,this scheme has a good performance in terms of security.

    The structure of this paper is organized as follows. In Section 2, some preliminary knowledge including quantum computation, quantum one-time pad and quantum homomorphic encryption are introduced. We present our QHE scheme in Section 3. The main idea and the specific process of the scheme are introduced in detail. In Section 4, the security of the scheme is analyzed and discussed.Our work and prospects for future research are summarized in Section 5.

    2. Preliminaries

    In this section, we provide a detailed introduction to the preliminaries,which helps us to have better understandings of our work. At the same time, the basic definition and related properties of QHE are given. Through these preliminaries, it will be smoother to describe our scheme.

    2.1. Quantum computation

    A quantum composite system consists of two or more different physical systems. In many cases of quantum mechanics,it is necessary to work with multiparticle states. The quantum state in the composite system can be expressed as the tensor product form of the quantum states in two subsystems,such as|φA〉|φB〉. If there are two single qubits that cannot be written as tensor product form,i.e.,|φ〉/=|a〉|b〉, then|φ〉is known as entangled state. Quantum entanglement is a property of composite systems which has a significant role in quantum computation.[34]It is also one of the main properties used in this paper. Quantum entanglement can be generated under control in different quantum systems, which reflects nonclassical strong correlation and non-locality in two or more quantum systems. In the processing of quantum information,entangled quantum states are often used as quantum channels.The family of two-qubit entangled states is referred to as Bell states in bipartite system,which can be transformed into each other through local operations and classical communication(LOCC). They are also called EPR states, and the forms are as follows:

    Another fundamental assumption of quantum mechanics suggests that the evolution of a closed quantum system can be characterized by the unitary operator.Common unitary singlequbit operators include Pauli operators and Hadamard gate,where the Pauli operators are denoted byσ0,σx,σy,andσz.[35]Their forms and circuit diagram representations are given in the following expressions:

    In addition to the quantum logic gates described above,phase shift gate and controlled-NOT gate are also common,

    The entire Clifford group circuit can be generated from these gates,but non-Clifford gate,such asT-gate,needs to be added to simulate universal quantum circuit,

    In a classic computer, the circuit consists of logic gates and wires, where the logic gates are responsible for the processing of the information and the wires are used for the transmission of the information. Quantum circuits consist of quantum gates operated on qubits. Each wire in a quantum circuit may not correspond to a physical connection,but to a physical particle transformation in a period of time or a physical particle moving from one location to another in space. A quantum circuit(QC)withn-qubit input andm-qubit output,from left to right represents the transfer process of quantum states in time or space.

    2.2. Quantum one-time pad

    In classical cryptography, the security of encryption and decryption usually depends on the assumption of computational intractability, while in quantum cryptography, the security of quantum cryptography depends on the information theoretic security of quantum mechanical properties. In the context of quantum data, the encryption process of information can be depicted as follows by using the quantum one-time pad(QOTP).

    Alice has a set ofKoperations{Uk}, in which each element is an unitary matrix of 2n×2nand the occurrence probability of each element is 1/22n,acting on the quantum information ofnqubits. A new encryption key is generated each time the qubit is encrypted. The encrypted quantum information would become a completely mixed state, so it is meaningless for Eve to get a complete quantum state,which guarantees the security of quantum information. For the input quantum stateρcarrying information, applying a random Pauli operator to the information state will get the cipher stateσ, which is the completely mixed state,[36]where (a,b) are the key to the pad. Pauli operatorsXandZare chosen uniformly at random to encrypt the quantum information.

    2.3. Quantum homomorphic encryption

    This subsection introduces some definitions of quantum homomorphic encryption,homomorphism,compactness,quantum fully homomorphic encryption. For a deeper understanding of these definitions,refer to Ref.[21].

    Definition 1(quantum homomorphic encryption) Here we introduce the QHE for asymmetric-key,which includes the following four algorithms:

    (i)Key GenerationQHE.KeyGen(1κ)→(pk,sk,ρevk),whereκ ∈Nis the security parameter,pkis the classical public key for encrypting quantum information,skis the classical private key for decrypting,ρevkis the quantum evaluation key for evaluating circuits on the encrypted quantum information.

    (ii)EncryptionQHE.Encpk(ρ)→σ. For the input quantum plaintextρ, it is encrypted into the quantum ciphertextσusing the public keypk.

    (iii)EvaluationQHE.EvalQCρevk(σ)→σ′,whereQCrepresents any quantum evaluation circuit that acts on the encrypted ciphertextσand outputs a ciphertext quantum stateσ′. The evaluation keyρevkis consumed during the process.This ciphertext is identical to the result of the evaluation circuit acting on the plaintext and then encrypting.

    (iv)DecryptionQHE.Decsk(σ′)→ρ′. For the ciphertextσ′, it is decrypted with the private keyskto obtainρ′as the calculation result of the evaluation algorithm acting on the original plaintextρ.

    Definition 2(homomorphism) For any quantum circuitQCand the input quantum plaintextρ, a QHE scheme satisfies homomorphism if there exists a negligible functionηsuch that

    whereΦQCis the quantum channel that is induced by the quantum circuitQC.

    Definition 3(compactness) A QHE scheme is compact if the complexity of the decryption algorithm does not depend on the size of the evaluation circuit. That is, for any quantum circuitQCand ciphertextσ,QHE.Decis applied toQHE.EvalQC(σ). There exists a polynomialp(κ) such that the complexity of this computational process is at mostp(κ).

    Definition 4(quantum fully homomorphic encryption)If the QHE scheme satisfies both homomorphism and compactness for all quantum circuits on some universal gate sets,it is a quantum full homomorphic encryption scheme.

    3. Our scheme

    In this section, based on the model of BJ15, we propose a novel probabilistic quantum homomorphic encryption(PQHE)scheme for universal quantum circuit.Before describing our PQHE scheme,the main idea is given by utilizing the non-maximally entangled state to complete the evaluation of non-Clifford gates. It will be helpful to the proposal of our scheme.

    3.1. Main idea

    Without decrypting the encrypted data, quantum homomorphic encryption gives a feasible way to perform arbitrary computational evaluations. In the construction of QHE scheme, at least one non-Clifford gate should be added to achieve universality for quantum circuits. However, it is always the focus and barrier of the research to deal with the errors in the evaluation of non-Clifford gates.T-gate,i.e.,“8/π”gate,is the first non-Clifford gate to be known. When the homomorphic evaluation ofT-gate is performed on the quantum state encrypted by QOTP, the output will contain an unexpectedPerror,In order to obtain the quantum state expected by the evaluator,the error must be corrected. The user decrypts the corrected quantum state to acquire the result of performingT-gate calculation on the initial plaintext.

    However, the maximum entangled state is considered to be extremely difficult to prepare in a specific physical system. During the preparation of the maximum entangled state,it must be affected by some factors, such as physical equipment,noise and decoherence. Therefore,our scheme extends the BJ15 scheme under the wise usage of the pre-shared nonmaximally entangled states as auxiliary resources to probabilistically correct the erroneousP-gate. Although the probability of success in correcting errors is decreased,it is meaningful from the perspective of experimentally implementing the QHE scheme. The universal quantum circuit with a finite number of non-Clifford gates can be applied on the encrypted quantum state in the evaluation stage.

    The major idea of our scheme is that when performing theT-gate evaluation,the state|Φ〉is introduced which is the non-maximally entangled state given by

    wheremandnare complex numbers and satisfy the normalization condition|m|2+|n|2=1. Then, the CNOT operation is applied on the non-maximally entangled state with the evaluation circuit. The auxiliary particle is introduced by the part of the circuit’s output. After the definedUoperation,the measurement is made. When the final measurement result is|0〉,theP-gate error is successfully corrected. Otherwise, error correction fails. This process is minutely illustrated in Fig.1.

    Fig.1. The homomorphic evaluation of our scheme for T-gate.

    As shown in Fig.1,the quantum state is|φ〉=α|0〉+β|1〉which will be encrypted by using QOTP,that is,the initial state is encrypted byXaZb,whereaandbare random classical bits(a,b ∈{0,1}). The state will be|φ0〉=XaZb|φ〉and the following four cases are obtained:

    When the firstT-gate appears in the evaluation circuit,theTgate will be applied to the ciphertext,|φ1〉=TXaZb|φ〉. And the encrypted state(5)will become

    Table 1. Measurement results of the target qubit and the second particle of the non-maximally entangled state.

    After the above operation is completed, the measurement will be made in the basis{|0〉,|1〉}. The measurement results of the target qubit and the second particle of the non-maximally entangled state will be two classical bits that recorded asrandyrespectively. In Table 1,the values of the measurement results are displayed substantially which all hold up to an irrelevant global phase.

    Through the above series of operations,the coefficient of the state will contain the uncertain valuesmandn. In order to attain the desired result ofT-gate acting on the encrypted state, it will be required to introduce an auxiliary particle|0〉and perform the defined unitary operation that denoted asU,where

    The final state Eq.(11)is measured. If the measurement result is|0〉, theP-gate error is successfully corrected. The desired result of the firstT-gate acting on the encrypted state is obtained,which isTXaZb|φ〉=α|0〉+eiπ/4β|1〉(a=0,b=0)in the example. This result is also consistent with

    3.2. Our PQHE scheme

    In this section, we will specifically present our PQHE scheme. From the perspective of application, there is a clear division of the computations between the client and the server,as well as the determined access rights to the keys and data.Our scheme is a novel two-party PQHE scheme which allows for arbitrary quantum computation within a large class of quantum circuits. Here,the quantum circuit contains Clifford group gates and a finite number of non-Clifford group gates(i.e.,T-gates). In this scheme,firstly,the client randomly generates an encryption key that will be only used once through the key generation algorithm. The private data is encrypted by using QOTP to guarantee the information theoretic security.The encrypted data and the predetermined evaluation circuit are transmitted to the server. Secondly, the server evaluates the received encrypted data according to the sequence of gate operations in the evaluation circuit without decryption. And the evaluated data is returned to the client. Finally, the client generates the decryption key by utilizing the key update rules according to the order of the evaluation circuit and the private key it holds. The evaluated data will be decrypted to get the expected result of the evaluation operation on the original private data. Figure 2 depicts it explicitly.

    Fig.2. Evaluation of our PQHE scheme for T-gate.

    The following process will describe our two-party PQHE scheme by step.

    Step 1PQHE.KeyGen →ek= (a,b), wherea,b ∈{0,1}. The quantum state to be encrypted is|φ〉=α|0〉+β|1〉. The client performs a key generation algorithm to generate a random encryption keyekthat is only used once. The quantum circuitQCEvalintended to be performed on the data will be confirmed corresponding to the sequence of gate operations from the setΓ={X,Z,H,P,CNOT}and theT-gates.It will be used to implement universal quantum circuit evaluation on encrypted data.

    Step 2By using the keyek, the encrypted private data takes the form of

    Assume that the evaluation circuitQCEvalcontainsNquantum gatesGi(i= 1,...,N). WhenGi ∈Γ, the client will transmit the encrypted dataXaZb|φ〉and evaluation circuitQCEvalto the server through the channel. When aT-gate is included in the evaluation circuit, in addition to the abovementioned data and circuit, the client needs to pre-share a non-maximally entangled state with the server and its form is|Φ〉=m|00〉+n|11〉(|m|2+|n|2=1).

    Step 3The server with computational power performs the corresponding operations on the encrypted dataXaZb|φ〉in the order of the evaluation circuitQCEval,and it cannot know the specific content of the data. When the evaluation circuit consists of quantum gatesGi(i=1,...,N),the evaluated data is of the form

    With regard toQCEvalcontaining theT-gate, the operations plotted in the previous section are performed by the server,including the CNOT operations, the definedUoperations and measurements. The operation on the non-maximally entangled state|Φ〉=m|00〉+n|11〉will be delayed to the decryption phase and carried out by the client. At last,the evaluated data is returned to the client.

    Step 4In the final stage, the encryption keyekwill be updated as the decryption key by the client,where the decryption key is denoted asdk=(a′,b′). When the quantum gatesGi ∈Γ(Γ={X,Z,H,P,CNOT}) acting on the encrypted data,the key update rules are listed as follows:

    d) WhenGi=CNOT, sinceCNOTis a two-qubit gate,both the control qubit and the target qubit require keys, that isek=(a,b,c,d)anddk=(a′,b′,c′,d′). Meanwhile,the encrypted state should be(XaZb ?XcZd)|φ〉. The corresponding key update rule is

    In the end, the evaluated data is decrypted using the decryption key to obtain the quantum circuitQCEvalthat performed on the original private data. It is a series of operations and computations that determined by the client in Step 1 in order to get the operated plaintext in private,since

    As introduced in the above scheme, we have made the novel two-party PQHE scheme come true. In the process of evaluating theT-gates,it can be seen from the expression(3)that whena=0, there is no error that needs to be corrected.In the case wherea=1,the evaluator has to correct the error.However, as we will see, the evaluator does not have access to the value ofaas theX-encryption key. The solution provided in our scheme is that the client and the server share the non-maximally entangled state in advance. The conditionalPcorrection needs to be delayed until decryption. The price we have to pay is that the value of the measurement result required to update the key can only be measured as part of the decryption algorithm. The proposal of the above scheme can not only correct the errors in the evaluation of theT-gates,but also ensure the correctness of the QHE scheme. At the same time,the security of the key can be guaranteed,which will not be obtained by the evaluator. Next,we will conduct a detailed security analysis of the proposed PQHE scheme.

    4. Security analysis

    In this section,we now analyze the security of our PQHE scheme in two ways,namely data and key.

    Initially,for the original privacy data,only the client has access to them. Before transmitting this quantum information to the server, the client will use the QOTP technology to encrypt the privacy data|φ〉. The QOTP is an asymmetric quantum encryption method,which generates a pair of random keyek=(a,b)(a,b ∈{0,1})that is used only once.Therefore,the encrypted information becomes a totally mixed state, namely(1/2n)I.The expression(1)proves it clear. Even if an attacker may intercept the encrypted information and receive the complete quantum stateXaZb|φ〉during the transmission,the specific information still cannot be obtained.He has no idea about the value of the key, and the randomness of the key makes it irregular. The key is changed every time the information is encrypted. It will minimize the risk of information leakage, so the perfect security of privacy data is ensured.

    Finally, the encryption keyekis a pair of classical bits(a,b) randomly generated by the client to carry out the key generation algorithm.Each pair of keys will be used only once in the encryption stage,making it impossible for the server to deduce the content of the key by studying regular pattern over time.At the same time,the decryption keydkis renewed from the secure encryption key by the key update rules. It is only consumed by the client. The key update rules are securely owned and applied by the client itself. The encryption keys and decryption keys will not be transmitted over the channel,so the server or other attackers will not be able to get any information about the keys. To conclude, it is obvious that the encryption and decryption keys have a perfect security.

    In summary, through the above analysis, our PQHE scheme has good security performance on privacy data,evaluated data,encryption keys and decryption keys.

    5. Conclusions

    Quantum homomorphic encryption has affirmative advantages in protecting the privacy data,which can perform arbitrary quantum computation during the evaluation. And in the processing of encrypted quantum state,the privacy data is kept secret for the server. The focal point of computation is to correct errors in the evaluation of non-Clifford gate. When applied to a real communication scenario,under the influence of the noise in the outside environment,the maximum entangled state encountered obstacles in the preparation process. Hence,a novel two-party PQHE scheme is proposed. Our scheme shows that the non-maximally entangled state can be used as auxiliary resource to assist in the evaluation of universal quantum circuit. It ensures the security of private data and effectively implements the PQHE scheme. In a broader context,our work opens up a new possible way for the realization of QHE. Compared with the previous scheme, the technical requirements were relaxed in the preparation of quantum entangled states in our scheme. It lowers the requirements for quantum channel, so that our PQHE scheme is more likely to be implemented under the existing experimental conditions.

    Firstly,the non-maximally entangled state was introduced when evaluatingT-gates to complete the correction of thePerrors in the evaluation stage. From an experimental viewpoint,we chose non-maximally entangled state to alleviate the stress on the quantum resources required in the scheme. And it indicated that the evaluation of the non-Clifford gates could be effectively implemented. Secondly,we constructed the specific two-party PQHE scheme described step by step through the explicit illustration. The homomorphic computation of universal quantum circuit on encrypted information was applied.The computations and operations were clarified that both the client and the server need to perform,and the access rights to the keys and data were determined respectively in the PQHE scheme.Finally,the scheme guaranteed the security of privacy data,evaluated data,encryption keys and decryption keys. In conclusion,our PQHE scheme attracts wide attention and may be an achievable QHE scheme, which is of practical importance for the realization of more sophisticated secure quantum computation and multiparty quantum communication.

    We hope that the proposed scheme provides inspiration in speeding up the practical proceeding of QHE scheme and establishing the theoretical basis of information security in the context of quantum communication. Our results make contribution to the application of the theory of QHE in secure quantum computation, but the problem that remains open is the construction of the QFHE scheme. Therefore,it is one of our following researches to study how to combine the QHE scheme with other quantum and classical cryptography protocols to construct a QFHE scheme that has a more efficient performance.

    猜你喜歡
    徐剛
    殺人者徐剛(短篇小說)
    飛天(2025年1期)2025-01-28 00:00:00
    徐剛書法作品選登
    共青城市蘇家垱鄉(xiāng):共繪美麗鄉(xiāng)村新畫卷
    Low-overhead fault-tolerant error correction scheme based on quantum stabilizer codes
    Quantum multicast communication over the butterfly network
    一瞬即永恒
    冬夜
    冬夜
    愿他永遠(yuǎn)是少年
    南方文壇(2016年1期)2016-03-23 13:44:43
    冬夜
    小小說月刊(2016年2期)2016-02-16 12:28:37
    亚洲国产av新网站| 一级片'在线观看视频| 日日爽夜夜爽网站| 免费看日本二区| 久久婷婷青草| 久久免费观看电影| 国国产精品蜜臀av免费| 国产精品99久久99久久久不卡 | 男女无遮挡免费网站观看| av天堂中文字幕网| 免费播放大片免费观看视频在线观看| 午夜福利视频精品| 又爽又黄a免费视频| 看十八女毛片水多多多| 精品一区二区免费观看| 国语对白做爰xxxⅹ性视频网站| 亚洲精品国产av蜜桃| 在线精品无人区一区二区三| 免费观看a级毛片全部| 免费av中文字幕在线| 夜夜骑夜夜射夜夜干| 久久精品国产a三级三级三级| 人妻制服诱惑在线中文字幕| 国内揄拍国产精品人妻在线| 一区二区三区四区激情视频| 精品99又大又爽又粗少妇毛片| 欧美+日韩+精品| freevideosex欧美| 视频中文字幕在线观看| 欧美3d第一页| 大香蕉久久网| av福利片在线| 免费观看性生交大片5| 啦啦啦啦在线视频资源| 中国美白少妇内射xxxbb| 一级,二级,三级黄色视频| 国产精品免费大片| 亚洲欧美日韩另类电影网站| 久久这里有精品视频免费| 亚洲欧美一区二区三区黑人 | 国产又色又爽无遮挡免| 国产一区二区三区av在线| av天堂久久9| 亚洲婷婷狠狠爱综合网| 亚洲国产精品成人久久小说| 啦啦啦啦在线视频资源| 丁香六月天网| 在线亚洲精品国产二区图片欧美 | 亚洲四区av| 成人无遮挡网站| 特大巨黑吊av在线直播| 五月开心婷婷网| 国产熟女午夜一区二区三区 | 丝袜在线中文字幕| 国产精品.久久久| 久久精品久久久久久噜噜老黄| 日日摸夜夜添夜夜爱| 黑人猛操日本美女一级片| 亚洲国产最新在线播放| 久久久a久久爽久久v久久| 欧美区成人在线视频| 美女国产视频在线观看| 久久久久网色| 免费看不卡的av| 亚洲av国产av综合av卡| 久久6这里有精品| 纯流量卡能插随身wifi吗| 亚洲国产日韩一区二区| 精华霜和精华液先用哪个| 黄色怎么调成土黄色| 免费看日本二区| 国产在线免费精品| www.色视频.com| 精品久久久精品久久久| 免费人成在线观看视频色| 男的添女的下面高潮视频| 午夜久久久在线观看| 国产美女午夜福利| 免费大片黄手机在线观看| 亚洲欧洲国产日韩| 99久久精品国产国产毛片| 国产乱人偷精品视频| 亚洲国产精品999| 一个人看视频在线观看www免费| 欧美激情极品国产一区二区三区 | 日韩强制内射视频| 免费久久久久久久精品成人欧美视频 | 日韩一本色道免费dvd| 蜜臀久久99精品久久宅男| 国产极品天堂在线| 亚洲欧美精品专区久久| 91aial.com中文字幕在线观看| freevideosex欧美| 最近最新中文字幕免费大全7| 最近中文字幕高清免费大全6| 最近2019中文字幕mv第一页| 妹子高潮喷水视频| 亚洲成人一二三区av| 精品99又大又爽又粗少妇毛片| 熟妇人妻不卡中文字幕| 乱人伦中国视频| 国产在线一区二区三区精| 亚洲不卡免费看| 伊人久久精品亚洲午夜| 2022亚洲国产成人精品| 成人特级av手机在线观看| 插阴视频在线观看视频| 亚洲美女搞黄在线观看| 日韩欧美一区视频在线观看 | 午夜激情久久久久久久| 99久久综合免费| 欧美丝袜亚洲另类| 在线观看人妻少妇| 黄色日韩在线| 男女免费视频国产| 亚洲美女视频黄频| 天堂8中文在线网| 五月天丁香电影| 在线观看一区二区三区激情| 久久久国产精品麻豆| 黄片无遮挡物在线观看| 26uuu在线亚洲综合色| 一级毛片电影观看| 大片免费播放器 马上看| 成人二区视频| 亚洲性久久影院| a级毛片在线看网站| 最近最新中文字幕免费大全7| 嫩草影院入口| 久久精品国产鲁丝片午夜精品| 国产成人一区二区在线| 国产精品偷伦视频观看了| 久久ye,这里只有精品| 男人和女人高潮做爰伦理| 午夜激情福利司机影院| 两个人免费观看高清视频 | 国产精品一区二区在线不卡| 午夜老司机福利剧场| 男人狂女人下面高潮的视频| 中文字幕免费在线视频6| 80岁老熟妇乱子伦牲交| 女性生殖器流出的白浆| 日日啪夜夜撸| 国产成人免费观看mmmm| 99九九线精品视频在线观看视频| 美女内射精品一级片tv| 亚洲精品第二区| 国产免费又黄又爽又色| 中国美白少妇内射xxxbb| 最近中文字幕2019免费版| 91久久精品电影网| 91aial.com中文字幕在线观看| 桃花免费在线播放| 一级二级三级毛片免费看| 久久久久精品性色| 成年人午夜在线观看视频| 建设人人有责人人尽责人人享有的| 久久久久久久大尺度免费视频| 国产高清三级在线| kizo精华| 欧美最新免费一区二区三区| 美女大奶头黄色视频| 免费观看a级毛片全部| 18禁裸乳无遮挡动漫免费视频| 成人特级av手机在线观看| 国产精品久久久久久av不卡| 大香蕉97超碰在线| 啦啦啦啦在线视频资源| 中文在线观看免费www的网站| 午夜免费男女啪啪视频观看| 波野结衣二区三区在线| 最后的刺客免费高清国语| 人妻少妇偷人精品九色| 亚洲成人一二三区av| 久久久a久久爽久久v久久| 在线精品无人区一区二区三| 精品熟女少妇av免费看| 久久99蜜桃精品久久| 亚洲av男天堂| 天美传媒精品一区二区| 国内精品宾馆在线| 女的被弄到高潮叫床怎么办| 日本欧美视频一区| 欧美人与善性xxx| 高清黄色对白视频在线免费看 | 日韩欧美精品免费久久| 久久99热6这里只有精品| 一级爰片在线观看| 精品少妇黑人巨大在线播放| 久久人妻熟女aⅴ| 亚洲熟女精品中文字幕| 中文精品一卡2卡3卡4更新| 国产综合精华液| 热99国产精品久久久久久7| 91精品国产九色| 99久久精品一区二区三区| 亚洲成人av在线免费| 最新的欧美精品一区二区| 国产男人的电影天堂91| 日本爱情动作片www.在线观看| 国产精品99久久99久久久不卡 | 国产精品一区二区在线不卡| 日韩欧美精品免费久久| 另类精品久久| 国产日韩欧美在线精品| 欧美日韩一区二区视频在线观看视频在线| 精品午夜福利在线看| 丰满少妇做爰视频| 国产亚洲av片在线观看秒播厂| 欧美区成人在线视频| 十分钟在线观看高清视频www | 欧美精品高潮呻吟av久久| av福利片在线观看| av免费在线看不卡| 国产精品熟女久久久久浪| 久久狼人影院| 男女边摸边吃奶| 成人特级av手机在线观看| 啦啦啦啦在线视频资源| 欧美日本中文国产一区发布| 久久精品国产自在天天线| 国产亚洲精品久久久com| 国产av一区二区精品久久| 如日韩欧美国产精品一区二区三区 | 久久久久久久久久人人人人人人| 日本av免费视频播放| 久久 成人 亚洲| 超碰97精品在线观看| 人妻制服诱惑在线中文字幕| 一区二区av电影网| 国内精品宾馆在线| 午夜视频国产福利| 在线天堂最新版资源| 黑人高潮一二区| 热re99久久国产66热| 国产69精品久久久久777片| 亚洲丝袜综合中文字幕| 两个人的视频大全免费| 搡女人真爽免费视频火全软件| 日日爽夜夜爽网站| 国产深夜福利视频在线观看| 伦精品一区二区三区| 国内少妇人妻偷人精品xxx网站| 日日撸夜夜添| av在线播放精品| 99热6这里只有精品| 观看免费一级毛片| 国产精品.久久久| 日产精品乱码卡一卡2卡三| 国产一区亚洲一区在线观看| 简卡轻食公司| 新久久久久国产一级毛片| 高清视频免费观看一区二区| a级毛片在线看网站| 成人国产av品久久久| 男人爽女人下面视频在线观看| 熟妇人妻不卡中文字幕| 中国美白少妇内射xxxbb| 日韩一本色道免费dvd| 极品人妻少妇av视频| 亚洲精品久久午夜乱码| 最近2019中文字幕mv第一页| 中国美白少妇内射xxxbb| 欧美三级亚洲精品| 极品人妻少妇av视频| 嫩草影院新地址| 男人狂女人下面高潮的视频| 高清视频免费观看一区二区| 2022亚洲国产成人精品| 日本猛色少妇xxxxx猛交久久| 日日摸夜夜添夜夜爱| 亚洲av不卡在线观看| 老司机影院毛片| 亚洲精品色激情综合| 国产中年淑女户外野战色| 国产欧美亚洲国产| 女人精品久久久久毛片| 欧美日韩av久久| 伦精品一区二区三区| 亚洲精品,欧美精品| 亚洲欧洲日产国产| 国产亚洲一区二区精品| 精品人妻熟女毛片av久久网站| 亚洲真实伦在线观看| 天堂8中文在线网| 一级av片app| 日韩在线高清观看一区二区三区| 最新的欧美精品一区二区| 精品少妇久久久久久888优播| 精品人妻一区二区三区麻豆| 亚洲av日韩在线播放| 精品久久国产蜜桃| 少妇 在线观看| 亚洲精华国产精华液的使用体验| 只有这里有精品99| 免费观看无遮挡的男女| 黑人巨大精品欧美一区二区蜜桃 | 日韩 亚洲 欧美在线| 精品一区二区三卡| 国产日韩欧美在线精品| 麻豆精品久久久久久蜜桃| av有码第一页| 精品久久久久久久久av| 性色av一级| 99精国产麻豆久久婷婷| 青青草视频在线视频观看| 在线观看人妻少妇| 男人舔奶头视频| 91精品国产国语对白视频| 妹子高潮喷水视频| 女性被躁到高潮视频| 日日摸夜夜添夜夜添av毛片| 国产成人免费观看mmmm| 国产精品伦人一区二区| www.av在线官网国产| 国产精品免费大片| 99热这里只有精品一区| av网站免费在线观看视频| 91久久精品国产一区二区成人| 男女无遮挡免费网站观看| 国产一区二区在线观看日韩| 狂野欧美白嫩少妇大欣赏| 精品国产一区二区三区久久久樱花| 久久综合国产亚洲精品| 日韩电影二区| 视频区图区小说| 久久久久精品性色| 色网站视频免费| 人人澡人人妻人| 国产日韩欧美在线精品| 国产黄频视频在线观看| 少妇裸体淫交视频免费看高清| 国产精品国产三级国产专区5o| 免费大片黄手机在线观看| 大码成人一级视频| 妹子高潮喷水视频| 夜夜看夜夜爽夜夜摸| 久久精品国产自在天天线| 交换朋友夫妻互换小说| 我的女老师完整版在线观看| 婷婷色综合www| 亚洲,欧美,日韩| 26uuu在线亚洲综合色| 欧美 亚洲 国产 日韩一| 午夜影院在线不卡| 欧美精品人与动牲交sv欧美| 亚洲欧洲精品一区二区精品久久久 | 国产精品秋霞免费鲁丝片| 成人无遮挡网站| 青春草视频在线免费观看| 3wmmmm亚洲av在线观看| 成人国产av品久久久| 免费看av在线观看网站| 久久女婷五月综合色啪小说| av一本久久久久| 蜜桃久久精品国产亚洲av| 亚洲av国产av综合av卡| 国产免费一区二区三区四区乱码| 少妇被粗大的猛进出69影院 | 国产精品熟女久久久久浪| 在线观看www视频免费| 欧美 亚洲 国产 日韩一| 丁香六月天网| 亚洲av欧美aⅴ国产| 嫩草影院入口| 日日摸夜夜添夜夜添av毛片| 亚洲精品色激情综合| 亚洲欧美日韩另类电影网站| 久久久久久久久久成人| 男女边摸边吃奶| 午夜福利影视在线免费观看| 国产伦在线观看视频一区| 精品午夜福利在线看| 99热这里只有是精品在线观看| 亚洲国产日韩一区二区| 自拍欧美九色日韩亚洲蝌蚪91 | 99国产精品免费福利视频| 26uuu在线亚洲综合色| 欧美日韩av久久| av福利片在线观看| 搡老乐熟女国产| 在线观看一区二区三区激情| 欧美bdsm另类| 99热全是精品| 两个人的视频大全免费| 少妇 在线观看| 亚洲av欧美aⅴ国产| 一区二区三区免费毛片| 亚洲无线观看免费| 一级毛片 在线播放| 国产美女午夜福利| 国产免费一级a男人的天堂| 亚洲综合精品二区| 色94色欧美一区二区| 精品一区在线观看国产| 91成人精品电影| 少妇人妻一区二区三区视频| 亚洲综合精品二区| 伦精品一区二区三区| 啦啦啦在线观看免费高清www| a级毛色黄片| 午夜福利,免费看| 观看av在线不卡| 嫩草影院入口| 午夜影院在线不卡| 亚洲精品aⅴ在线观看| 久久久精品94久久精品| 国产一级毛片在线| 国产在线免费精品| 少妇人妻久久综合中文| 国产老妇伦熟女老妇高清| 久久久久久久久久成人| 精品久久久久久电影网| 一区二区三区乱码不卡18| 午夜免费男女啪啪视频观看| 亚洲欧美精品专区久久| 王馨瑶露胸无遮挡在线观看| 三上悠亚av全集在线观看 | 啦啦啦视频在线资源免费观看| 蜜桃久久精品国产亚洲av| 国产黄频视频在线观看| 国产片特级美女逼逼视频| 久久久久久久久久久免费av| 高清av免费在线| 蜜桃久久精品国产亚洲av| 22中文网久久字幕| 最近中文字幕高清免费大全6| 久久精品国产鲁丝片午夜精品| 久久久午夜欧美精品| 女性被躁到高潮视频| 成年人免费黄色播放视频 | 啦啦啦视频在线资源免费观看| 97在线人人人人妻| 精品久久久久久久久亚洲| 国产日韩欧美视频二区| 我的老师免费观看完整版| 免费观看无遮挡的男女| 80岁老熟妇乱子伦牲交| 婷婷色综合大香蕉| 曰老女人黄片| 波野结衣二区三区在线| 久久精品久久精品一区二区三区| 尾随美女入室| 久久午夜综合久久蜜桃| 国产欧美日韩精品一区二区| 亚洲自偷自拍三级| av线在线观看网站| 一区二区三区精品91| 日本欧美国产在线视频| 亚洲性久久影院| 国产一区亚洲一区在线观看| 精品99又大又爽又粗少妇毛片| 日韩av在线免费看完整版不卡| 日日摸夜夜添夜夜爱| 伦精品一区二区三区| 久久久久久久精品精品| 欧美激情极品国产一区二区三区 | 边亲边吃奶的免费视频| 热99国产精品久久久久久7| 国产成人精品久久久久久| 自线自在国产av| 91午夜精品亚洲一区二区三区| 欧美3d第一页| www.色视频.com| 久久精品熟女亚洲av麻豆精品| 久久ye,这里只有精品| 看免费成人av毛片| 最近手机中文字幕大全| freevideosex欧美| 丝瓜视频免费看黄片| 欧美精品国产亚洲| 麻豆成人av视频| 国产免费一区二区三区四区乱码| 欧美精品人与动牲交sv欧美| 久热久热在线精品观看| 99久久中文字幕三级久久日本| a级一级毛片免费在线观看| 观看美女的网站| 国产高清不卡午夜福利| 国产黄色视频一区二区在线观看| 最黄视频免费看| 丝袜喷水一区| 伦理电影免费视频| h日本视频在线播放| 国产精品嫩草影院av在线观看| 国产亚洲5aaaaa淫片| 亚洲美女搞黄在线观看| 精品久久国产蜜桃| 国产成人精品福利久久| 精品一区二区三区视频在线| av免费观看日本| 亚洲国产毛片av蜜桃av| 欧美性感艳星| 国产av码专区亚洲av| 久久久久国产精品人妻一区二区| 视频区图区小说| 国产淫语在线视频| 一区二区三区四区激情视频| 亚洲国产精品一区二区三区在线| 韩国高清视频一区二区三区| av免费在线看不卡| 国产精品不卡视频一区二区| 美女内射精品一级片tv| 男女边摸边吃奶| 99热这里只有精品一区| 国产精品三级大全| 国产精品.久久久| 亚洲国产色片| 成人黄色视频免费在线看| 久久久a久久爽久久v久久| 我要看日韩黄色一级片| 99精国产麻豆久久婷婷| 人妻系列 视频| 菩萨蛮人人尽说江南好唐韦庄| 99久久精品一区二区三区| 免费观看无遮挡的男女| 91久久精品电影网| 亚洲人成网站在线播| 亚洲av福利一区| 国产探花极品一区二区| 男人和女人高潮做爰伦理| 国产真实伦视频高清在线观看| 久久久a久久爽久久v久久| 亚洲国产精品一区三区| 成人亚洲欧美一区二区av| 欧美xxxx性猛交bbbb| 99热国产这里只有精品6| 一级毛片aaaaaa免费看小| 亚洲精品久久午夜乱码| 久久99一区二区三区| 国产乱来视频区| 国产黄频视频在线观看| 免费看av在线观看网站| 中文欧美无线码| 国产69精品久久久久777片| 欧美精品一区二区免费开放| 国产91av在线免费观看| 中国三级夫妇交换| 男人添女人高潮全过程视频| a级毛片免费高清观看在线播放| a级一级毛片免费在线观看| 国国产精品蜜臀av免费| 秋霞伦理黄片| 国产精品一区二区在线不卡| 精品人妻熟女毛片av久久网站| 好男人视频免费观看在线| 国产熟女欧美一区二区| 亚洲四区av| 日本黄大片高清| 五月天丁香电影| 亚洲av日韩在线播放| 秋霞在线观看毛片| 少妇人妻一区二区三区视频| 欧美成人午夜免费资源| 日本vs欧美在线观看视频 | 汤姆久久久久久久影院中文字幕| 久久久久网色| 男女边摸边吃奶| 国产精品久久久久久精品古装| av免费观看日本| 亚洲不卡免费看| 久久精品久久久久久噜噜老黄| 三上悠亚av全集在线观看 | 另类精品久久| 久久国产乱子免费精品| 欧美 日韩 精品 国产| 亚洲国产精品专区欧美| 久久精品熟女亚洲av麻豆精品| 久久ye,这里只有精品| 少妇高潮的动态图| 一区二区三区乱码不卡18| 精品熟女少妇av免费看| 国产老妇伦熟女老妇高清| 久久99蜜桃精品久久| 国产91av在线免费观看| 日韩不卡一区二区三区视频在线| 99热这里只有精品一区| 日本wwww免费看| 少妇精品久久久久久久| 国产精品国产av在线观看| 久久久久人妻精品一区果冻| 日韩,欧美,国产一区二区三区| 成人无遮挡网站| 国内少妇人妻偷人精品xxx网站| 亚洲精品456在线播放app| 少妇人妻久久综合中文| 丝袜喷水一区| 男女边吃奶边做爰视频| 国产在线视频一区二区| 成人无遮挡网站| a级毛片在线看网站| 特大巨黑吊av在线直播| 亚洲一级一片aⅴ在线观看| 国产午夜精品一二区理论片| 国产成人免费无遮挡视频| .国产精品久久| 亚洲国产色片| 久久国产乱子免费精品| 51国产日韩欧美| 一区在线观看完整版| videos熟女内射| 日韩强制内射视频| 亚洲av二区三区四区| 80岁老熟妇乱子伦牲交| 校园人妻丝袜中文字幕| 九草在线视频观看| 99九九在线精品视频 | 嫩草影院入口| 男的添女的下面高潮视频| 久热久热在线精品观看| av又黄又爽大尺度在线免费看| 久久毛片免费看一区二区三区| 美女xxoo啪啪120秒动态图| 九草在线视频观看| 亚洲国产精品一区三区|