• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient quantum private comparison protocol utilizing single photons and rotational encryption

    2022-06-29 09:15:08TianYiKou寇天翊BiChenChe車碧琛ZhaoDou竇釗XiuBoChen陳秀波YuPingLai賴裕平andJianLi李劍
    Chinese Physics B 2022年6期
    關鍵詞:李劍

    Tian-Yi Kou(寇天翊) Bi-Chen Che(車碧琛) Zhao Dou(竇釗) Xiu-Bo Chen(陳秀波)Yu-Ping Lai(賴裕平) and Jian Li(李劍)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Information Security Center,School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China

    Keywords: quantum private comparison,rotational encryption,polarized single photons,efficiency

    1. Introduction

    Secure multiparty computation (SMPC) problems are cryptographic tasks that enable joint computation using private input from all parties without revealing them.In the traditional secure two-party computation scenario,Alice,who has secret inputx,and Bob,who has secret inputy,are willing to calculatef(x,y). The origin of SMPC problems can be traced back to Yao’s millionaire problem,[1]where two millionaires try to compare who is richer without information leaking. Based on Yao’s research, a variant of the millionaire problem named the socialist millionaire problem[2,3]was proposed. On this condition,two millionaires wish to compare whether they are equally rich. However,Lo[4]pointed out that constructing an equality function with only two-party is not secure. Thus, a semi-honest third party(TP)should exist to complete the task.

    With the advancement of quantum mechanics,laws such as the Heisenberg uncertainty principle and the quantum no-cloning theorem were discovered. They endow quantum computing with absolute security. With this advantage,a huge number of quantum cryptography protocols have been proposed to solve cryptography challenges, embracing quantum secure direct communication (QSDC),[5–8]quantum secret sharing (QSS),[9–12]and quantum key distribution(QKD),[13–17]as well as quantum secure multiparty computation(QSMPC),[18–24]etc.

    As one essential type of QSMPC,quantum private comparison (QPC) has gotten much attention. In QPC protocols,the purpose of participants is to determine whether the respective secrets are equal. According to the number of participants, the types of QPC protocols can be divided into twoparty and multi-party. The two-party QPC protocols are taken for example. The inputs are their secretsxandy. The output isx=yorx/=y. Yang and Wen[18]proposed the first QPC protocol with a dishonest TP.Two parties compare their secrets based on decoy photons and EPR pairs, and the oneway hash function ensures the security of the protocol. Before long,Chenet al.[19]introduced a more efficient QPC protocol based on triplet entangled states and single-particle measurement. Then, Tsenget al.[20]proposed a QPC protocol with EPR pairs, facilitating implementation and improving qubit efficiency to 50%. After that, Jiaet al.[21]suggested another QPC protocol based onχ-type genuine four-particle entangled states, whose efficiency is equal to 100%. In 2014, Chenet al.[22]proposed a protocol using a class of maximally entangled states as the information carriers. The implementation of this protocol can rely on a variety of particles, so it has more freedom in selecting quantum states than all prior protocols. To further improve efficiency,Xuet al.[25]proposed a QPC protocol based on four-particle GHZ states. Three secret bits can be compared at one time, which reduces the rounds of the protocol. In addition, some participants without quantum capabilities were considered by Chouet al.[26]in their QPC protocol firstly. Such protocols are called semi-quantum private comparison(SQPC)protocols. They are closer to reality because some participants may not be able to afford quantum equipment. Recently, Zhouet al.[27]and Wanget al.[28]proposed SQPC protocols withd-dimensional Bell states and GHZ states, respectively, improving efficiency and ensuring security.

    After analyzing existing QPC protocols, we observe the extensive utilization of entangled states. However, some unfavorable conditions,such as the difficulty in preparing entangled states[29]and the security vulnerabilities,[30]limit the application of entangled states. Thus,protocols based on single photons have received widespread attention.[31–34]As a significant method to ensure the correctness and security of singlephoton based protocols, rotational encryption is introduced in various types of quantum protocols, such as quantum key exchange,[35]quantum designated verifier signature,[36]quantum image encryption,[37]etc.Additionally,rotational encryption can be applied to design QPC protocols[38,39]because the mapping of rotational encryption is homomorphic.

    In this paper,we propose an efficient QPC protocol with polarized single photons, which is efficient and easy to realize. In our protocol, two players encrypt their secret integers with rotational encryption and single photons, and then they can privately compare their secrets with a semi-honest TP,who may misbehave alone but cannot conspire with other players.[40–43]The TP should initialize a quantum sequence at the beginning of the protocol and decrypt it at the end of the protocol. Two players’ core operation is encoding the secret into the quantum sequence.

    In comparison to existing QPC protocols, our protocol provides the following advantages. First, without pre-shared keys,the qubit efficiency of our protocol is 100%on account of the application of the circular transmission mode.[44,45]In this mode, the photons will be transmitted along the circular path TP-player1-player2-TP. Second, our protocol has simple technical requirements. The complex technology,such as entangled states, joint measurement, and entanglement swapping,are replaced by single photons,single-particle measurement,and unitary operation. As a consequence,the efficiency of our protocol achieves the theoretical maximum, and our protocol is easy to realize.

    The rest of this paper is organized as follows. In Section 2, the encryption and decryption method with the rotational encryption is elaborated as a core. In Section 3, we propose a new QPC protocol.In Section 4,the correctness,security,and efficiency are analyzed. In Section 5,we compare our protocol with others and discuss its extended application.In Section 6,we summarize the characteristics of the protocol.

    2. The encryption and decryption method of the protocol

    The encryption and decryption method with the rotational encryption is the core of our protocol. The classical binary data“0” can be encoded to the horizontally polarized photon|0〉, and the classical binary data “1” can be encoded to the vertically polarized photon|1〉.

    The rotational encryption operator,drawing support from Jones matrix,[46]can be expressed in the following form:

    Table 1. The relationship among α, β, α ⊕β, |α ⊕β〉, andR((π/2)α+(π/2)β)|0〉.

    From Table 1, we can discover that|α ⊕β〉andR((π/2)α+(π/2)β)|0〉are always equal. Thus,

    The Lemma 2 follows.

    It means thatR(θ)|α ⊕β〉can be expressed as the formE(π/2)α+(π/2)β[R(θ)|0〉],i.e.,we can realize the bitwise XOR operation with the rotational encryption.

    3. The two-party quantum private comparison protocol

    There are two distrustful players, Alice and Bob, who want to compare whether their secrets are equal with the aid of a semi-honest TP named Charlie.

    Step 4 Alice generates her secret keyKA={kA,i:0≤kA,i <2π,i=n-1,...,1,0}randomly. Then she getsSAby handlingSinitwith her binary stringNA,n-1...NA,1NA,0and the keyKA. The process can be written in the following form:

    Step 7 Alice and Bob announce their keysKAandKB,and then Charlie logs them.

    Step 8 Charlie decryptsSBwith his private keyKCand the published keysKA,KB. He computesSCadhering to the following rule:

    4. Analysis

    In this section, we shall demonstrate the correctness and security of our proposed protocol.

    4.1. Correctness

    In this subsection,we give a general proof of the correctness of the protocol. In our analysis, decoy photons are ignored since they are only applied to detect eavesdroppers.

    For any|φC,i〉inSC, we can rewrite it into the following form according to the operation rules of Alice, Bob, and Charlie:

    Then we can infer that|φC,i〉=|NA,i ⊕NB,i〉in the light of Lemma 2.

    For simplicity, the stringNA,n-1⊕NB,n-1,...,NA,1⊕NB,1,NA,0⊕NB,0will be recorded inNA⊕NB. Obviously,NC=NA⊕NBholds based on Eq. (14). For this reason, an all-zeroNCrepresents thatNA=NB, and other cases signify thatNA/=NB. Thus,TP can determine the comparison result by figuring the stringNC.

    4.2. Security analysis

    We analyze the security of our proposed protocol. Firstly,we prove that our protocol can resist outside attacks.Secondly,we show that inside attacks are ineffective to our protocol.

    4.2.1. Outside attack

    Unlike the security ensured by decoy photons in outside attacks, the inside security depends on the safety of the rotational encryption method,which is explained as follows.

    We can infer that an attacker cannot identify the correct key for only an intercepted photon because when the photon is measured, it collapses to|0〉or|1〉, and the rotation angle is lost. Additionally, the measurement result cannot be guaranteed to be completely true once the attacker chooses a key unequal to the correct key. For example,the attacker choosesγ/=θto decryptR(θ)|0〉. The result isR(θ-γ)|0〉= cos(θ-γ)|0〉+sin(θ-γ)|1〉. Thus, the probabilitypthat the attacker gets the correct result|0〉by measuringR(θ-γ)|0〉with Z-basis is cos2(θ-γ). Sinceγandθare unequal,pcannot reach 100%,which means that a wrong key cannot decrypt the completely correct result.

    Hence, we can analyze the inside attacks by judging whether participants can obtain a quantum sequence and the corresponding key simultaneously.Based on this idea,we will analyze the following four cases one by one: Alice wants to getNB, Bob wants to getNA, and Charlie wants to getNAorNB.

    Case 1 Alice wants to getNB

    NBonly exists inSB. However,the key(kA,i+kB,i+kC,i)to decryptSBis unavailable for Alice sincekC,iis only held by Charlie and never published during the whole period.

    Another way for Alice to stealNBis to pass a fakeSAto Bob,such as a sequence filled by|0〉. While Bob sendsSBto Charlie, Alice intercepts it and passes another fake sequence to Charlie. If Bob announces his secret key, Alice can obtainSBandKBat the same time, soNBwill be leaked to Alice.However, this way is ineffective in our protocol. Once Alice interceptsSB,her eavesdropping behavior must be detected in the eavesdropping check before Bob publishes his secret key.Then the protocol will be rebooted with three refreshed keys so Alice can never have Bob’s available key.

    In summary,Alice cannot obtainNB.

    Case 2 Bob wants to getNA

    CalculatingNAfromSAorSBare equivalent to Bob because it is Bob who encryptsSAtoSB. The former is taken for example. Bob cannot stealkC,ito decrypt the sequenceSAfor the same reason as Alice.

    Similar to the above,Bob can replaceSinitwith a fake sequence filled by|0〉in Step 2. After Alice adds her secret to the fake sequence, Bob interceptsSAand then gives Charlie another random fake sequence. He may calculateNAafter the announcement of Alice’s key since the state of each photon inSAis in this form:|φA,i〉=E(π/2)NA,i+kA,i[|0〉]=R(kA,i)|NA,i〉.Nevertheless,the attack from Bob in this way is failed either.His eavesdropping will come to light after the check between Charlie and Alice.

    To sum up,Bob cannot gainNA.

    Case 3 Charlie wants to getNA

    Once Charlie intercepts the sequenceSA, his eavesdropping will be identified. Then Alice will execute this protocol again with a refreshed key. Without the new key,Charlie cannot determineNAeven if he interceptsSA.As for the sequenceSB,Charlie can computeNA⊕NBfrom it legally,butNAandNBare invisible to him.

    So,Charlie will fail to decryptSAorSBto stealNA.

    Case 4 Charlie wants to getNB

    As already stated,NBhas never been transmitted separately when the protocol is executed normally. It only coexists withNAinSBand never be divulged unlessNAis known.However,NAis unavailable for Charlie from the analysis in Case 3.

    In another way, Charlie can replaceSAwith a fake sequence filled by|0〉. Then he may calculateNBfromSBafterKBis published by Bob. Nevertheless, this behavior can also be discovered due to the check between Alice and Bob.

    Therefore,NBwill not be disclosed to Charlie.

    According to the above study,this protocol can withstand outside and inside attacks without revealing the players’ private integers.

    4.3. Efficiency analysis

    The definition of qubit efficiencyη=ηc/ηtis given in Refs.[20,40]. In the above equation,ηcrepresents the number of the compared classical bits andηtrepresents the total number of particles in the comparison protocol except for decoy particles used in the eavesdropping check.[20,40]Particularly,ηt=ηk+ηs. Here,ηkrefers to the number of quantum particles applied to pre-shared keys,such as in QKD protocols,andηsrefers to the number of qubits carrying information in the sequence.

    For our protocol,pre-shared keys do not exist,i.e.,ηk=0.Moreover, the comparison of each classical bit in this protocol needs to be completed by one quantum bit,i.e.,ηs=ηc.Therefore,the efficiency of our protocol is 100%.

    5. Discussion

    In this section, we will compare our protocol with other similar protocols,and then discuss the extra application of our protocol.

    In Table 2, we compare protocols in Refs. [21,32,49,50]with our protocol. Our protocol has the following characteristics: First,it is unnecessary to utilize extra particles during the key distribution process. Thus, our protocol has no quantum resources consumption of key distribution compared to a series of QKD-based QPC protocols.[32,49,50]Second, the quantum resources in our protocol are multiplexed. It means that the same quantum sequence carries two players’ secret integers.However,in some protocols[49,50]without this feature,players have to prepare more particles to execute the protocols,which increases the consumption of quantum resources. Third, our protocol not only achieves the maximum theoretical efficiency as Jiaet al.’s protocol,[21]but can be realized more easily.Jiaet al.’s protocol[21]has more technical constraints, such as preparing four-particleχ-type states, entanglement swapping,and joint measurement.[44]On the contrary,our protocol is realized with single photons,unitary operation,and singleparticle measurement.

    Table 2.Comparison among our protocol and some existing QPC protocols.

    Furthermore,our proposed protocol can also be extended to perform additional tasks. For example,the protocol can accomplish a comparison of two sets. Every player arranges the set elements from small to large, and then concatenates the binary values. Another example is quantum secret sharing.Assume that the boss split a secret integerNCinto a randomNAandNB=NA⊕NC, and then sentNAto Alice andNBto Bob. Alice and Bob can execute our protocol to calculate the secretNC.

    6. Conclusion

    We propose an efficient QPC protocol with single photons and rotational encryption. With the help of a TP, the players can safely determine the size relations for two private integersNAandNB. For efficiency, the secret keys in our protocol are distributed through classic channels instead of QKD protocols, so extra particles are not consumed for sharing keys.Additionally,the circular transmission mode allows players to implement the multiplexing of quantum resources, reducing the number of photons utilized in our protocol. According to these two characteristics, the qubit efficiency of our protocol reaches 100%, the theoretical maximum. For technical constraints, the utilization of single photons, unitary operation,and single-particle measurement allows our protocol to be realized under current technical conditions.

    Acknowledgments

    Project supported by the National Key Research and Development Program of China(Grant No.2020YFB1805405),the 111 Project (Grant No. B21049), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014), and the Fundamental Research Funds for the Central Universities(Grant No.2020RC38).

    猜你喜歡
    李劍
    Variational quantum semi-supervised classifier based on label propagation
    Efficient semi-quantum secret sharing protocol using single particles
    The coupled deep neural networks for coupling of the Stokes and Darcy–Forchheimer problems
    兩塊寶石
    領導文萃(2022年24期)2023-01-02 08:23:45
    Probabilistic quantum teleportation of shared quantum secret
    Constructing the three-qudit unextendible product bases with strong nonlocality
    Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle
    Quantum partial least squares regression algorithm for multiple correlation problem
    Improving the purity of heralded single-photon sources through spontaneous parametric down-conversion process*
    Phase-sensitive Landau–Zener–St¨uckelberg interference in superconducting quantum circuit?
    卡戴珊不雅视频在线播放| 国产 一区精品| 人人妻人人看人人澡| 日韩一区二区三区影片| 欧美xxxx性猛交bbbb| 狠狠狠狠99中文字幕| or卡值多少钱| 欧美一区二区国产精品久久精品| 亚洲精品色激情综合| 国产私拍福利视频在线观看| 日韩欧美精品v在线| 人妻夜夜爽99麻豆av| 人妻夜夜爽99麻豆av| 日本与韩国留学比较| 男的添女的下面高潮视频| 我的老师免费观看完整版| 日本-黄色视频高清免费观看| 中文亚洲av片在线观看爽| 国产精品1区2区在线观看.| kizo精华| 久久精品国产鲁丝片午夜精品| 国产精品久久电影中文字幕| 午夜久久久久精精品| 韩国av在线不卡| 狂野欧美白嫩少妇大欣赏| 国产真实乱freesex| 亚洲欧美中文字幕日韩二区| 国产精品熟女久久久久浪| 久久久久九九精品影院| 亚洲最大成人手机在线| 国产真实乱freesex| 免费黄色在线免费观看| 在线免费观看不下载黄p国产| 国产中年淑女户外野战色| 99热全是精品| 欧美极品一区二区三区四区| 女的被弄到高潮叫床怎么办| 直男gayav资源| 又黄又爽又刺激的免费视频.| 亚洲av成人精品一区久久| 老女人水多毛片| 天堂影院成人在线观看| 欧美成人免费av一区二区三区| 亚洲国产成人一精品久久久| 如何舔出高潮| 99热这里只有是精品在线观看| 欧美另类亚洲清纯唯美| 国产精品麻豆人妻色哟哟久久 | 卡戴珊不雅视频在线播放| 国产精品久久久久久av不卡| 亚洲国产精品成人综合色| 久久久久九九精品影院| 简卡轻食公司| 国产亚洲一区二区精品| 国产精品伦人一区二区| 亚洲久久久久久中文字幕| 国产精品永久免费网站| 丝袜喷水一区| 日韩在线高清观看一区二区三区| 精品少妇黑人巨大在线播放 | 亚洲av熟女| 一区二区三区四区激情视频| 一区二区三区乱码不卡18| 1024手机看黄色片| 在线免费十八禁| 色视频www国产| 99热这里只有精品一区| 别揉我奶头 嗯啊视频| 一级毛片aaaaaa免费看小| 少妇人妻精品综合一区二区| 免费在线观看成人毛片| 久久久国产成人精品二区| 日韩欧美国产在线观看| 国产一区有黄有色的免费视频 | 日韩一区二区三区影片| 国产精品久久久久久久久免| 亚洲一区高清亚洲精品| 九九爱精品视频在线观看| 欧美成人午夜免费资源| av黄色大香蕉| 丝袜喷水一区| 久久久欧美国产精品| 成人午夜精彩视频在线观看| 日韩在线高清观看一区二区三区| 国产成人一区二区在线| 国产精品乱码一区二三区的特点| 国产熟女欧美一区二区| 神马国产精品三级电影在线观看| 91aial.com中文字幕在线观看| 日本wwww免费看| 青春草亚洲视频在线观看| 最近手机中文字幕大全| 成年免费大片在线观看| 亚洲国产成人一精品久久久| 99热精品在线国产| 久久久久免费精品人妻一区二区| 一个人看视频在线观看www免费| av.在线天堂| 亚洲精品成人久久久久久| 爱豆传媒免费全集在线观看| 听说在线观看完整版免费高清| 丝袜美腿在线中文| 久99久视频精品免费| 啦啦啦啦在线视频资源| 级片在线观看| 免费一级毛片在线播放高清视频| 天天一区二区日本电影三级| 精品熟女少妇av免费看| 国产午夜精品久久久久久一区二区三区| 中文欧美无线码| 国产成年人精品一区二区| 又粗又硬又长又爽又黄的视频| 久久精品久久精品一区二区三区| av女优亚洲男人天堂| 超碰97精品在线观看| 国产免费又黄又爽又色| 特级一级黄色大片| 精品国产一区二区三区久久久樱花 | 中文字幕免费在线视频6| 午夜免费激情av| 午夜福利视频1000在线观看| 韩国高清视频一区二区三区| 乱码一卡2卡4卡精品| 免费人成在线观看视频色| 搞女人的毛片| 只有这里有精品99| 日韩欧美三级三区| 欧美性感艳星| 最后的刺客免费高清国语| 午夜激情欧美在线| 99久久成人亚洲精品观看| a级一级毛片免费在线观看| 成人高潮视频无遮挡免费网站| 在线观看66精品国产| 一区二区三区高清视频在线| 亚洲欧洲国产日韩| 国产男人的电影天堂91| 91精品伊人久久大香线蕉| 99热6这里只有精品| 日韩欧美国产在线观看| 麻豆成人av视频| 亚洲色图av天堂| 中文字幕av成人在线电影| 精华霜和精华液先用哪个| 日本猛色少妇xxxxx猛交久久| 丝袜美腿在线中文| 国产真实乱freesex| 亚洲精品456在线播放app| 亚洲图色成人| 天堂网av新在线| 黄色日韩在线| 日韩精品青青久久久久久| 亚洲av.av天堂| 亚洲最大成人av| 日韩成人av中文字幕在线观看| 欧美成人a在线观看| 51国产日韩欧美| 欧美丝袜亚洲另类| 亚洲人成网站在线播| 久久这里有精品视频免费| 一个人看视频在线观看www免费| 日韩欧美 国产精品| 菩萨蛮人人尽说江南好唐韦庄 | 又爽又黄无遮挡网站| 秋霞伦理黄片| 三级男女做爰猛烈吃奶摸视频| 亚洲欧美日韩无卡精品| 一边亲一边摸免费视频| 一夜夜www| 非洲黑人性xxxx精品又粗又长| 乱码一卡2卡4卡精品| 国产精品1区2区在线观看.| 亚洲精品,欧美精品| 亚洲自偷自拍三级| 欧美bdsm另类| 嫩草影院精品99| 成人无遮挡网站| 欧美xxxx性猛交bbbb| 欧美一级a爱片免费观看看| 成人亚洲欧美一区二区av| 日韩精品有码人妻一区| 最近视频中文字幕2019在线8| 毛片女人毛片| 免费黄网站久久成人精品| 中国美白少妇内射xxxbb| 日日啪夜夜撸| 久久精品影院6| 18禁在线播放成人免费| 免费观看的影片在线观看| 中文字幕制服av| 国产在线男女| 你懂的网址亚洲精品在线观看 | 99热全是精品| 久久人妻av系列| 精品国产露脸久久av麻豆 | 欧美人与善性xxx| 欧美日韩综合久久久久久| 亚洲精品成人久久久久久| 亚洲av电影在线观看一区二区三区 | 99久久精品一区二区三区| 天堂中文最新版在线下载 | 三级国产精品片| 成人欧美大片| 成人亚洲欧美一区二区av| 亚洲精品成人久久久久久| 最近视频中文字幕2019在线8| 99久久精品国产国产毛片| 国产精品一二三区在线看| 欧美极品一区二区三区四区| 国产成人freesex在线| 深夜a级毛片| 日韩三级伦理在线观看| 国产亚洲av嫩草精品影院| 久久精品国产亚洲av天美| 午夜免费男女啪啪视频观看| 精品不卡国产一区二区三区| 国产不卡一卡二| 一个人观看的视频www高清免费观看| 又爽又黄无遮挡网站| 特级一级黄色大片| 亚洲精品,欧美精品| 九色成人免费人妻av| av女优亚洲男人天堂| 国产免费又黄又爽又色| 亚洲电影在线观看av| av免费在线看不卡| 亚洲综合精品二区| 级片在线观看| av天堂中文字幕网| av免费在线看不卡| 国内精品宾馆在线| 亚洲不卡免费看| 欧美不卡视频在线免费观看| 村上凉子中文字幕在线| 91久久精品国产一区二区三区| 久久精品国产亚洲网站| 成人综合一区亚洲| 麻豆久久精品国产亚洲av| 亚洲欧美日韩无卡精品| 国产精品女同一区二区软件| 非洲黑人性xxxx精品又粗又长| 日韩视频在线欧美| 熟妇人妻久久中文字幕3abv| 精品熟女少妇av免费看| 久久热精品热| 精华霜和精华液先用哪个| 综合色丁香网| 99热6这里只有精品| 特级一级黄色大片| 亚洲国产精品sss在线观看| 我要搜黄色片| 精品无人区乱码1区二区| 午夜视频国产福利| 国内少妇人妻偷人精品xxx网站| 日韩人妻高清精品专区| 亚洲综合色惰| 欧美zozozo另类| 蜜桃亚洲精品一区二区三区| 国产午夜精品论理片| 只有这里有精品99| 舔av片在线| 久99久视频精品免费| 成人综合一区亚洲| 日本黄大片高清| 亚洲伊人久久精品综合 | 国产69精品久久久久777片| 99久久精品一区二区三区| 三级国产精品欧美在线观看| 97超视频在线观看视频| 97热精品久久久久久| 99久久成人亚洲精品观看| 精品酒店卫生间| 最新中文字幕久久久久| 少妇猛男粗大的猛烈进出视频 | 国产不卡一卡二| 最近视频中文字幕2019在线8| 青春草国产在线视频| 国产成人午夜福利电影在线观看| 成人毛片a级毛片在线播放| 久久人人爽人人爽人人片va| 一本一本综合久久| 秋霞伦理黄片| 2021天堂中文幕一二区在线观| 一级毛片久久久久久久久女| 亚洲人与动物交配视频| 麻豆一二三区av精品| 黄片无遮挡物在线观看| 国产成人a∨麻豆精品| 久久精品国产亚洲av天美| 一级黄色大片毛片| 丝袜美腿在线中文| 乱系列少妇在线播放| 99热精品在线国产| 日日啪夜夜撸| av在线天堂中文字幕| 久久精品久久久久久久性| 少妇高潮的动态图| 九九久久精品国产亚洲av麻豆| 好男人视频免费观看在线| 99热这里只有是精品50| 边亲边吃奶的免费视频| 麻豆国产97在线/欧美| 能在线免费观看的黄片| 亚洲国产日韩欧美精品在线观看| 久久国产乱子免费精品| 69人妻影院| 直男gayav资源| 欧美一区二区精品小视频在线| 一个人免费在线观看电影| 亚洲图色成人| 日本黄大片高清| 青青草视频在线视频观看| 别揉我奶头 嗯啊视频| 麻豆久久精品国产亚洲av| a级毛片免费高清观看在线播放| 久久人人爽人人片av| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲国产精品专区欧美| 国产片特级美女逼逼视频| 国产亚洲精品av在线| 欧美日韩精品成人综合77777| 亚洲精品影视一区二区三区av| 午夜久久久久精精品| 欧美三级亚洲精品| 国产高清国产精品国产三级 | 秋霞伦理黄片| 久久久亚洲精品成人影院| 青青草视频在线视频观看| 国产精品蜜桃在线观看| av.在线天堂| 中文字幕熟女人妻在线| 一卡2卡三卡四卡精品乱码亚洲| 国产伦在线观看视频一区| 日韩精品有码人妻一区| 2021少妇久久久久久久久久久| 亚洲国产日韩欧美精品在线观看| 3wmmmm亚洲av在线观看| 一区二区三区乱码不卡18| 欧美一级a爱片免费观看看| 欧美日本亚洲视频在线播放| 欧美xxxx黑人xx丫x性爽| 国产欧美日韩精品一区二区| 国产午夜精品久久久久久一区二区三区| 好男人视频免费观看在线| 国产精品野战在线观看| 国产 一区精品| 午夜精品在线福利| 日日摸夜夜添夜夜添av毛片| 草草在线视频免费看| 亚洲欧美中文字幕日韩二区| 精品少妇黑人巨大在线播放 | 免费在线观看成人毛片| 99久久九九国产精品国产免费| АⅤ资源中文在线天堂| 日本黄色片子视频| 99久久九九国产精品国产免费| av免费在线看不卡| 韩国av在线不卡| 三级男女做爰猛烈吃奶摸视频| 国产亚洲午夜精品一区二区久久 | 亚洲av成人av| 一级av片app| 日本免费在线观看一区| 国产视频首页在线观看| 免费黄网站久久成人精品| 中文天堂在线官网| 最近中文字幕高清免费大全6| 老师上课跳d突然被开到最大视频| 亚洲精品日韩在线中文字幕| 少妇猛男粗大的猛烈进出视频 | av卡一久久| 中文在线观看免费www的网站| 亚洲精品乱码久久久久久按摩| 日日摸夜夜添夜夜爱| 国产大屁股一区二区在线视频| 午夜日本视频在线| 亚洲精品影视一区二区三区av| 日韩一区二区视频免费看| 国产一区二区三区av在线| 一级毛片我不卡| 看片在线看免费视频| 在线观看一区二区三区| 2021少妇久久久久久久久久久| 国产精品99久久久久久久久| 菩萨蛮人人尽说江南好唐韦庄 | 欧美高清成人免费视频www| 国产一区二区在线观看日韩| 免费观看的影片在线观看| 国产午夜精品论理片| 亚洲精品色激情综合| 免费黄色在线免费观看| 欧美不卡视频在线免费观看| 国产国拍精品亚洲av在线观看| 免费看日本二区| 亚洲中文字幕日韩| 久久精品影院6| 一级黄片播放器| 日日摸夜夜添夜夜添av毛片| 菩萨蛮人人尽说江南好唐韦庄 | 亚洲三级黄色毛片| 亚洲av中文av极速乱| or卡值多少钱| av线在线观看网站| 永久免费av网站大全| 激情 狠狠 欧美| 国产亚洲av片在线观看秒播厂 | 不卡视频在线观看欧美| 亚洲av.av天堂| 人妻系列 视频| 最近中文字幕2019免费版| 男女国产视频网站| 蜜桃久久精品国产亚洲av| 国产精品国产三级专区第一集| 亚洲五月天丁香| av专区在线播放| 亚洲乱码一区二区免费版| 亚洲国产最新在线播放| 国产成人一区二区在线| 免费电影在线观看免费观看| 日本黄色片子视频| 国产精品久久久久久久电影| 久久久久久国产a免费观看| 国产精品伦人一区二区| 亚洲av日韩在线播放| 99国产精品一区二区蜜桃av| 久久久a久久爽久久v久久| av免费观看日本| 亚洲av免费高清在线观看| 国产探花极品一区二区| 特级一级黄色大片| 99热网站在线观看| 能在线免费观看的黄片| 亚洲av二区三区四区| av在线天堂中文字幕| videos熟女内射| 欧美bdsm另类| 成年免费大片在线观看| 精品一区二区三区人妻视频| 一区二区三区四区激情视频| 午夜免费男女啪啪视频观看| 高清日韩中文字幕在线| 男人狂女人下面高潮的视频| 永久网站在线| 国产黄色小视频在线观看| 国产伦精品一区二区三区四那| 免费av毛片视频| 又爽又黄无遮挡网站| 麻豆久久精品国产亚洲av| 男女国产视频网站| 国产综合懂色| 岛国毛片在线播放| 亚洲成人精品中文字幕电影| 美女内射精品一级片tv| 欧美高清成人免费视频www| 久久婷婷人人爽人人干人人爱| 一本一本综合久久| 伊人久久精品亚洲午夜| АⅤ资源中文在线天堂| 午夜精品国产一区二区电影 | 最近中文字幕高清免费大全6| 免费一级毛片在线播放高清视频| 在线观看一区二区三区| 国产精品久久久久久精品电影小说 | 成人av在线播放网站| 插逼视频在线观看| 乱人视频在线观看| 国产色婷婷99| 色吧在线观看| 极品教师在线视频| 国产精品福利在线免费观看| 简卡轻食公司| 国产午夜福利久久久久久| 丰满少妇做爰视频| 日韩,欧美,国产一区二区三区 | 久久精品熟女亚洲av麻豆精品 | 九九在线视频观看精品| 深爱激情五月婷婷| 免费一级毛片在线播放高清视频| 中文精品一卡2卡3卡4更新| 亚洲人成网站在线播| 午夜福利在线在线| 国产淫片久久久久久久久| 欧美日韩综合久久久久久| 舔av片在线| 国产高清三级在线| 少妇丰满av| 啦啦啦啦在线视频资源| 国产亚洲5aaaaa淫片| 少妇人妻精品综合一区二区| 男的添女的下面高潮视频| 一区二区三区乱码不卡18| 女人久久www免费人成看片 | 亚洲欧美日韩东京热| 舔av片在线| 少妇的逼水好多| 久久精品影院6| 国产精品麻豆人妻色哟哟久久 | 丰满乱子伦码专区| 成人欧美大片| 精品久久久久久久久av| 最近最新中文字幕大全电影3| 热99在线观看视频| 成人亚洲精品av一区二区| 日日啪夜夜撸| 亚洲欧美一区二区三区国产| 国产高清不卡午夜福利| 亚洲欧美日韩卡通动漫| 中文资源天堂在线| 少妇的逼好多水| av在线老鸭窝| 精品一区二区免费观看| 久久久久久久国产电影| 亚洲激情五月婷婷啪啪| 老司机影院成人| 99视频精品全部免费 在线| 免费大片18禁| 成人午夜精彩视频在线观看| 美女国产视频在线观看| 色视频www国产| 日日啪夜夜撸| 精品人妻熟女av久视频| 天堂中文最新版在线下载 | 亚洲av中文字字幕乱码综合| 国产高清视频在线观看网站| 国产在线一区二区三区精 | av在线播放精品| 久久久久免费精品人妻一区二区| 国产精品日韩av在线免费观看| 中文字幕久久专区| 亚洲美女视频黄频| 亚洲av电影不卡..在线观看| 欧美日韩在线观看h| 国产中年淑女户外野战色| 91久久精品电影网| 毛片女人毛片| 国产免费福利视频在线观看| 在现免费观看毛片| 国产女主播在线喷水免费视频网站 | 天堂中文最新版在线下载 | 欧美色视频一区免费| 在线播放无遮挡| 亚洲国产精品专区欧美| 久热久热在线精品观看| 精品熟女少妇av免费看| 欧美激情在线99| 看片在线看免费视频| 国内揄拍国产精品人妻在线| 建设人人有责人人尽责人人享有的 | 国产精品日韩av在线免费观看| 久久久久久久久久久丰满| 97人妻精品一区二区三区麻豆| 成人av在线播放网站| 两个人的视频大全免费| 国产精品熟女久久久久浪| 女人久久www免费人成看片 | 亚洲成av人片在线播放无| 国产成人福利小说| 久久人妻av系列| 国产精品国产三级国产av玫瑰| 别揉我奶头 嗯啊视频| 欧美bdsm另类| 国产91av在线免费观看| 免费播放大片免费观看视频在线观看 | 少妇人妻一区二区三区视频| 久久精品久久久久久久性| 在线观看一区二区三区| 国产精品久久电影中文字幕| eeuss影院久久| 亚洲久久久久久中文字幕| 国产私拍福利视频在线观看| 久久久a久久爽久久v久久| 亚洲自偷自拍三级| 国产日韩欧美在线精品| 亚洲国产欧美人成| 少妇的逼水好多| 少妇人妻一区二区三区视频| 99久国产av精品| 日韩中字成人| 午夜久久久久精精品| 七月丁香在线播放| 国产高清三级在线| 中文精品一卡2卡3卡4更新| 亚洲丝袜综合中文字幕| 国产成人福利小说| 午夜免费男女啪啪视频观看| 国产精品精品国产色婷婷| 国产午夜精品一二区理论片| 一级二级三级毛片免费看| 九草在线视频观看| 少妇猛男粗大的猛烈进出视频 | 在线免费十八禁| 久久热精品热| 秋霞在线观看毛片| 国产午夜精品久久久久久一区二区三区| 如何舔出高潮| 搡女人真爽免费视频火全软件| 精品久久久久久久久久久久久| 97超视频在线观看视频| 看片在线看免费视频| 中国国产av一级| 成人高潮视频无遮挡免费网站| 欧美xxxx黑人xx丫x性爽| 大话2 男鬼变身卡| 少妇人妻精品综合一区二区| 91av网一区二区| 99久久人妻综合| 在线免费观看的www视频| 国产淫语在线视频| 久久综合国产亚洲精品| 少妇熟女aⅴ在线视频| 乱人视频在线观看| 亚洲成色77777| 99久国产av精品国产电影| 男女啪啪激烈高潮av片| 建设人人有责人人尽责人人享有的 |