• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Simultaneous two-way classical communication and measurement-deviceindependent quantum key distribution on oceanic quantum channels

    2022-12-11 03:29:10HongyangHuHaiZhongWeiYeandYingGuo
    Communications in Theoretical Physics 2022年12期

    Hongyang Hu ,Hai Zhong ,Wei Ye and Ying Guo,?

    1 School of Automation,Central South University,Changsha 410083,China

    2 School of Computer Science and Engineering,Central South University,Changsha 410083,China

    Abstract Simultaneous two-way classical and quantum (STCQ) communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution (CVQKD),which eliminates all detection-related imperfections by being measurement-device-independent(MDI).In this paper,we propose a protocol relying on STCQ communication on the oceanic quantum channel,in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext.We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors.Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme.Moreover,the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance.We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios.The results show the feasibility of the underwater STCQ scheme,which contributes toward developing a global quantum communication network in free space.

    Keywords: continuous-variable quantum key distribution,measurement-device-independent,simultaneous,oceanic turbulence channel transmittance

    1.Introduction

    Quantum key distribution (QKD) can share secure keys between two legitimate parties (Alice and Bob) across an unsecured quantum channel where an eavesdropper (Eve)might exist[1–3].There are two categories of protocols for the implementation,which are called discrete-variable(DV)QKD[4] and continuous-variable (CV) QKD [5].A CV-QKD technique based on the Gaussian-modulated coherent states(GMCS)protocol has been proposed as an alternative solution to DV-QKD [6,7],which eliminates the barrier to implementing required specialized hardware,such as a single-photon detector and source.It can transmit the secret key by modulating the quadrature components of the optical field and utilizing heterodyne or homodyne detection,which has demonstrated security under both coherent attacks [8] and collective attacks[9].Gratifyingly,many studies have been put forward to improve the transmission performance[10–12].On the other hand,the development of the technique of wavelength division multiplexing[13]shows a viable way to use a single coherent communication system to implement both classical communication and CV-QKD.

    Recently,a novel scheme known as simultaneous QKD and classical communication (SQCC) was proposed,which is an attractive scheme due to the similarity of the hardware required for implementing classical coherent optical communication and the GMCS QKD in practice [14].To achieve better performance,impressive developments in terms of the classical carrier phase estimation (CPE) technique [15] and a plug-and-play configuration [16] have been achieved to simplify the complexity of the SQCC system in fiber channels.Moreover,techniques of using measurement-device-independent (MDI) QKD [17,18] were proposed to prevent all potential attacks on side-channel attacks caused by practical detectors,compared with point-to-point (PP) CV-QKD via Bell-state detection on an untrustworthy third party (Charlie).Furthermore,the sending-or-not-sending twin-field (SNS-TF)QKD protocol was reported to tolerate a large misalignment error rate [19].Based on the SNS-TF QKD,a field-test QKD over 428 km of deployed commercial fiber was demonstrated[20],and a task of 511 km long-haul fiber trunk linking two distant metropolitan areas was completed [21].The results,which provide a new distance record,bridge the gap between laboratory and applications and pave the way for large-scale fiber quantum networks across cities with MDI QKD.

    Intriguingly,an improved Kalman filter method[22]over the satellite-mediated link was proposed to extend the SQCC scheme to the employment of free space,which shows its potential to develop a range of global applications.Moreover,the first free space MDI QKD over a 19.2 km urban atmospheric channel was realized[23],and a decoy-state BB84 in MDI QKD was used [24],which opened the way for longdistance MDI QKD in free space.

    However,as part of constructing a worldwide network without fiber constraints [25],we also need to value the cruciality of underwater SQCC for ocean development and modern communications.This can provide a more secure approach compared with the traditional acoustic technique in the military field,such as in submarines,ocean sensor networks,and various ocean vehicles.Unfortunately,there is still a lack of research on underwater simultaneous two-way classical communication and QKD(STCQ)MDI communication.

    Against this background,we analyse the feasibility and security of STCQ MDI transmittance,where legitimate partners exchange a series of classical bits concurrently in the pure ocean channel.By analysing the encoding combination,we detail the protocol and demonstrate the feasibility of communicating with legitimate partners to exchange classical data concurrently.To estimate the transmittance of diverse ocean depths,we consider the probability distribution transmittance (PDT) for the underwater channel,including the random ellipse light model caused by the atmospheric turbulence and the influence of the extinction coefficient based on existing marine chlorophyll data.We perform numerical simulations to determine the optimal modulation variance for low bit error rates (BERs) of 10?9while maintaining a positive secret key rate(SKR).Furthermore,we also take into consideration the SKR under finite-size effects and show the feasibility of our proposed scheme in practical scenarios.Our work shows the significance of choosing the appropriate transmission depth and modulation variance according to the different types of oceans on Earth,paving the way for practical implementation of the underwater STCQ scheme.

    This paper is organized as follows.In section 2,detailed descriptions of the protocol conceived are given.In section 3,we calculate the SKR for the STCQ protocol under the performance of a low BER of 10?9with consideration of the influence of the probability distribution of the transmittance,and numerical simulations based on experimental system parameters are provided with discussions of related trends in performance.Finally,we conclude this paper in section 4.

    2.Implementation of the STCQ protocol

    This section shows the details of the proposed STCQ scheme over the ocean channel,and a measurement result analysis of classical bit transmission is performed.

    2.1.Description of the protocol

    Due to the equivalence of the prepare-and-measure (PM)method and entanglement-based (EB) method,we adopt the PM STCQ scheme to simplify the undersea description of the protocol.The quadrature phase-shift keying (QPSK)description and the STCQ protocol shown in figures 1(a)and(b) are described as follows.

    Step 1.Alice prepares her encoded classical bits{mA,nA} and Gaussian random numbers with zero means and a variance ofVAon a coherent stateMeanwhile,Bob prepareswith zero means and a variance ofVBencoded by classical bits{mB,nA}to convey the classical ciphertext bits.After encoding and preparing,Alice and Bob send their coherent states to Charlie through different oceanic quantum channels with lengthsLACandLBC,respectively.

    Step2.The coherent states from Alice and Bob interfere at a balanced beam splitter(BS).Both theXquadrature andPquadrature are measured by using Bell-state measurement[26] asThen Charlie broadcasts the measurement results{XC,PD}.

    Step 3.After receiving the measurement results{XC,PD},Alice and Bob decode each other’s data,respectively,based on the measurement findings and the data supplied by themselves.Then Bob removes the classical displacement asXB=xB+kXC,PB=pB+kPCto obtain the Gaussian data associated with the secret key.kis the amplification coefficient related to channel loss,which is described asin the equivalent EB scheme[17],gis the gain of displacement,andVBis related to the variance Gaussian modulation.The details above are calculated in appendix C.

    Step 4.Alice and Bob perform parameter estimation via an authenticated public channel,information reconciliation,and privacy amplification to share the secret key.

    In practice,the EB scheme usually easily performs security analysis.The EB scheme of the STCQ protocol shown in figure 2(b) comprises the following steps: First,Alice and Bob prepare entanglement resources EPR1 and EPR2 with variances of VA and VB,respectively.Then,they keep modes A1 and B1,and send the other modes A2 and B2 to Charlie through the underwater channel.After that,Charlie receives modes A2 and B2 and performs Bell-state measurement detection,and broadcasts the measurement results through the classical channel publicly.According to the data announced,Bob modifies mode B1 to B1’ by a displacing operation with a gain ofg,and the mode of Alice remains.Ultimately,Alice measures mode A1,and Bob measures mode B1’ to obtain the final data by heterodyne detection.

    2.2.Results of the measurement

    The scheme can realize two-way classical communication while completing the distribution of quantum keys.To represent the features and benefits of this coding accurately,we analyse the measurement results from Charlie’s side.Note that the analysis does not imply that it is possible to prove the security of Alice’s and Bob’s sending when doing two-way classical communication.For the convenience of demonstration,we suppose that Alice and Bob have no information leakage in the process of sending to Charlie,and Eve can only intercept the information that Charlie broadcasts to the outside world.Here are nine different measurements,as shown in figure 3,which are related to the Bell detection and the encoding method in figure 1(a).After receiving the results published by the untrusted third party Charlie,Alice and Bob can locate the corresponding combination according to the data sent by themselves,further inferring the other party’s data.For example,as soon as Alice knows that Charlie has announced the‘grey’combination after she has sent the code‘11’,she knows Bob has sent the‘11’as well.So Bob knows,based on the combination result.However,even though Eve knows the measurement result,she cannot infer the users’classical bits by precisely guessing two ‘grey’ combinations between{11,11} and{01,01} .

    A variety of colored blocks have been used to mark the Bell-state measurement results to explore the characteristics of two-way classical communication further.Moreover,we use three sequence numbers (I),(II),and (IV) to classify the number of times that the measurement result of the different colored blocks appears in figure 4,and the colored blocks with an order corresponding to the measurement results in figure 3.

    wherep(R(i))is the probability of measured combination results when transmitting a random sequence,andN(i)is the number of specific bits corresponding to the measurement result,as shown in figure 4.Moreover,and the length of the coding transition sequence isn.Therefore,the results are shown in figure 5.

    3.Performance analysis

    In this section,the BER of two-way classical communication and the PDT are considered to determine the SKR of STCQ protocol.Subsequently,we show the performance of our proposed scheme compared to the original CV-MDI QKD scheme.

    3.1.Derivation of the secret key rate

    Unlike the quantum channels in fibers with fixed attenuation coefficients,SKR is affected by the transmission fluctuation in the oceanic fading channel.

    The attenuation properties of seawater vary significantly between oceans,mainly owing to differences in its composition.Even within the exact location,the attenuation effect varies according to the ocean’s depth and the transmission distance.Beer’s law [27,28] can be used to estimate total extinction losses as

    whereLis the horizontal transmission distance and the total attenuation coefficientC(λ,d)is the function of the wavelengthλand the depthd,which is noted in appendix A.

    Moreover,we consider the regular refraction in turbulence changes,which are connected to temperature and salinity fluctuations,and follow the statistics of turbulent scalar fields.The probability distribution for oceanic transmittance is applied,including beam shape deformation,beam wandering,and beam-broadening effects.This model,dubbed the elliptic beam approximation,applies to weak and strong turbulence,covering most of the regimes seen in underwater communication situations [29].

    The transmittanceTcan be calculated in the Monte Carlo simulation by [30]

    where the extinction transmittanceTextis denoted in equation (2),andT0indicates the transmittance without the effects of beam wandering and extinction,which is given in appendix B.Other parameters are related to the shape of the ellipse model of beam sources,which is shown in figure B1.

    In addition,the modulation variance has to be optimized before we calculate the SKR.We take the BER of 10-9achieved in the experiment in a phase-shift keying communication system based on optical homodyne as the computational requirement [31],which the details are given in appendix C,and the required signal amplitudeαof STCQ can be expressed as

    where erfc-1represents the inverse complementary error function,ηhomis the homodyne detection efficiency,andσφandσsare the extra-noise variance and shot-noise variance,respectively.Moreover,ε0Aandε0Bare the excess noise of Alice and Bob,and〈TA〉and〈TB〉denote the estimated channel mean transmittance of Alice or Bob,respectively.

    If we assume that Bob’s two-mode compressed states and the displacement operation are untrustworthy,the STCQ protocol’s equivalent EB scheme is turned into a general oneway CV QKD model.As a result,the lower limit key rate of CV-MDI QKD qualifies the SKR inferred from the common one-way CV QKD.In the case of reverse reconciliation,the asymptotic SKRKof the CV-MDI QKD under optimum collective attack is given by [6]

    whereβis the reconciliation efficiency,IABdenotes Alice and Bob’s Shannon mutual information,andχBErepresents the maximum accessible information between Eve and Bob,which is the Holevo bound.The details above are calculated in appendix C,and the secure key rateRcan be further written as

    whereG(*)=(*+1) log2(*+1)-* log2*related to the von Neumann entropy,andλiare the symplectic eigenvalues of the covariance matrices.Moreover,TABrepresents the total quantum channel transmittance between Alice and Bob.

    Furthermore,the SKR above is achieved in the asymptotic regime under idealized simplification assumptions in the asymptotic limit of infinite data size.In practical scenarios,a pair of legal users cannot exchange an infinite number of signals,implying that the secret key has a finite length [32].Naturally,a part of the exchanged signals has to be used for parameter estimation due to the unidentifiable characteristics of the quantum channel [16].

    Under the finite-size regime,the SKRKFSRis given by

    where M represents the total number of signals exchanged by Alice and Bob during the scheme when they useN signals to generate the keys,where half of the (M-N) signals will be used in parameter estimation.Kis the asymptotic key rate in equation (6),and the other details are shown in appendix C.

    3.2.Numerical simulations

    In the following,the modulation variance is optimized before we show the simulation results of our STCQ protocol based on the oceanic turbulence at the low BER of 10?9.As a result,we focus on the SKR and amplitude as a function of the modulation variance over various transmission distances,showing two different application scenarios in the oceans S2 and S5 in figure 6.Furthermore,we set the simulated depth of transmission at 75 m for the sake of avoiding the range of absorption peaks,in whichd?[92,106] m for S2 andd?[31,62] m for S5,which can be seen in fgiures A1 and B2.

    In the symmetric cases,Charlie is positioned directly in the middle of the two senders (LAC=LBC),which favors the use of the star topology[33].However,when the transmission distance increases,the transmission loss increases rapidly because the postprocessing step is asymmetric when Bob modifies his data and Alice keeps hers,which cannot result in the system’s best performance,as shown in figure 6.

    We can note that the longer the transmission distance,the narrower the range of near-optimal modulation variance,and the lower the SKR becomes.Moreover,in the symmetric cases,the optimal modulation variances of oceans S2 and S5 are 33 and 35,respectively,which are reached around the peak of SKR.The optimal modulation variance’s corresponding amplitude values are about 24.75 and 25.48 for oceans S2 and S5,respectively,as presented in the inset graphs of figures 6(a)and (b).The relationship between modulation variance and amplitude can also be verified from equation(4).The curves in the illustration are nearly coincident for different transmission distances and for the sake of the PDT are included in both the denominator and numerator simultaneously.

    Analogously,we can plot the SKR and amplitude as a function of the modulation variance over various transmission distances in the extremely asymmetric case,where Charlie is very close to Bob(LBC≈0),as shown in figures 6(c)and(d).The optimal modulation variance’s corresponding amplitude values are about 17.25 and 17.75 for oceans S2 and S5,respectively,when the optimal modulation variances are 15 and 16.The distinction is that the appropriate range of modulation variance is wider in the extremely asymmetric case than in the symmetric scenario compared to the equivalent transmission distances.

    Consequently,the flexibility of optional modulation variance gives it superiority in long-distance communication,which is suitable for point-to-point transmission.On the other hand,the comparison of the secure key rate will be shown in the next part.

    As previously discussed,we undertake numerical simulations of the asymptotic SKR of STCQ QKD in symmetric and asymmetric instances at oceans S2 and S5 under the constraint of a low BER of 10?9in classical communication.The modulation variance has been optimized,and the modulation variances are taken as 33 at S2 and 35 at S5 in symmetric and 15 at S2 and 16 at S5 in asymmetric scenarios,respectively,as shown in figure 6.Figure 7 presents the simulation results,while the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound[34]of the SKR of direct transmission over lossy bosonic channels and the SKR of original Gaussian CV-MDI QKD [17] are also plotted for comparison.

    Figure B1.Schematic of an ellipse model.In this model,the beam source is deformed from the transmission distance of L with ellipse semi-axes w1 and w2,where a andr represent the aperture radius and the beam-deflection distance,respectively.

    Figure A1.Extinction coefficient of extinction as a function of submarine depth including absorption and scattering in various ocean types.The S1–S6 oceanic parameters are given in table A1.

    Figure 2.(a) Scenario of STCQ-based underwater submarine communication;one of the motherships releases an unmanned undersea vehicle as the repeater without exposing the risk.(b)Entanglement-based(EB)scheme of STCQ protocol.TMS,two-mode squeezed state;Het,heterodyne detection;Dis,displacement operation.

    Figure 3.Nine different measurement results are mapped in the phase space and classified by order(I),(II),and(IV).The number of times each color’s measurement result appears in (a) is represented by these orders.In terms of the measurement findings,the transmitter and receiver are symmetric.

    Figure 4.Combination of the results based on the Bell-state measurement.

    Figure 5.Probability that Eve correctly deduces the coding sequence with length n.For comparison,we assume that the user transmits the easiest and hardest guessable bits all the time in the most unfavorable and the most advantageous case,respectively.

    Figure 6.Secret key rate(SKR)(main graph)and amplitude of the classical signal(inset graph)as a function of the modulation variance in the symmetric scenario where the BER is less than 10?9on oceans S2 for(a)and S5 for(b)and in the asymmetric scenario where the BER is less than 10?9 on oceans S2 for (c) and S5 for (d).Other simulation parameters are set as follows: the extra noise in two channels that is independent of the amplitude of the classical signalε0A=ε0B=0.002,the detector efficiencyηhom=0.98,the electronic noiseνel=0.01,the phase-noise varianceσφ=10-6,and the reconciliation efficiency β=0.98.

    Figure 7.SKR as a function of the transmission distance in the symmetric scenario at oceans S2 for(a)and S5 for(b),and in the extremely asymmetric scenario at oceans S2 for (c) and S5 for (d),where the BER is less than 10?9.For comparison,the SKR following Beer’s law(dotted line),considered the nonturbulence channel,is computed based on the same parameters of the turbulence channel(solid line).Other simulation parameters are set as follows: the extra noise in two channels that is independent of the amplitude of the classical signal ε0A=ε0B=0.002,the detector efficiencyηhom=0.98,the electronic noiseνel=0.01,the phase-noise varianceσφ=10-6,and the reconciliation efficiency β=0.98.

    Figure 8.Finite-size key rates of the STCQ protocol of the asymmetric scenario in ocean S2 for (a) and S5 for (b).Other simulation parameters are set the same as in figure 7.

    According to the numerical simulation results,the gap between the proposed STCQ protocol and the original CVMDI QKD scheme in symmetric scenarios is shorter than in the asymmetric cases,whether in the ocean S2 or S5,where the original protocol is more in tune with the PLOB bound(the solid line).The STCQ protocol,on the other hand,is capable of enabling concurrent two-way classical communication and CV-MDI QKD with just a slight performance degradation,which is only minor degradation of about 0.08 m and 0.04 m in terms of the maximum distance at SKR of 10?4bit/pulse on oceans S2 and S5,respectively,in the symmetric scenarios.

    Moreover,while the BER gradually increases with transmission distance in the asymmetric case,which is more sensitive than the symmetric case,it is always less than our goal BER of 10?9.It is also shown that the positivity and necessity of choosing appropriate modulation variance and optimization based on different ocean types and application scenarios.It is worth noting that the curve of the SKR is slightly undulated in the case of transmitting a relatively further distance,as shown in figures 7(b) and (d) on the asymmetric scenario.This can be attributed to the transmission fluctuations [35] in the oceanic fading channel.

    In addition,figure 8 shows the SKR in the finite-size regime of the asymmetric configuration.For comparison,different block lengthsN and the asymptotic regime are also plotted.

    4.Conclusions

    In this paper,we have proposed an STCQ protocol for fluctuating oceanic channels and investigated regular extinction and random turbulence effects based on real-data modelling of chlorophyll concentration and numerical simulation via the Monte Carlo method respectively.Our numerical simulations choose ocean S2 and ocean S6 as objects of study,which have different transmittance and absorption peaks of 92 m and 57 m,respectively.This result shows the importance of choosing the appropriate transmission depth depending on the ocean type for submarines,where the valley range of the PDT will seriously affect the transmission distance.In addition,performance simulations have shown that the asymmetric scenario is superior to the symmetric case both in desirable transmission distance and in selecting the optimal modulation variance.Furthermore,we have taken into account the finitesize effect to accommodate the practical implementation.It can be seen that the fewer signals exchanged,the more pronounced the finite-size impact is,and the more rapidly the SKR and security transmission distance decrease.As the block lengthN increases from 105to 109,more signals may be used to estimate parameters and extract keys,and the SKR approaches the asymptotic value.These results show a feasible way to apply our proposed scheme to the ocean scenario,which demonstrates the potential of sea,land,and air integrated communication,making the STCQ extend to a broader range of worldwide applications.

    Acknowledgments

    This work is supported by the National Natural Science Foundation of China (Grant No.61871407),the Natural Science Foundation of Hunan Province (Grant No.2021JJ30878),and the Key Project of Research and Development Plan of Hunan Province (Grant Nos.2020GK4063,2022GK2016).We acknowledge the support from the Optoelectronic Information Center of Central South University and Hunan Railway Engineering Machinery Electrohydraulic Control Engineering Technology Research Center.

    Appendix A.Regular extinction coefficient

    In general,the profile shape parameters change with the chlorophyll concentration on the surface,which causes difficulty in coefficient determination.A study experimentally quantified the parameters using 2419 distinct chlorophyll profiles [36].The ocean’s location on Earth was classified into several serial groups equivalently,each of which corresponded to a specific range of chlorophyll concentrations near the surface.A complete list of the parameters for each above is given in table A1.

    What follows demonstrate the effect of the STCQ scheme on the underwater CV-QKD system.The regular extinction of an optical signal produced by seawater absorption and scattering across various ocean types and the probability density function of transmittance using the ellipse model are also considered.The total attenuation coefficient is given as

    whereCsca(λ,d)andCabs(λ,d)are the factors of scattering and absorption respectively,which are affected by the concentration of chlorophyll-a,fulvic and humic acid absorption.

    Chlorophyll-a refers to phytoplankton,fulvic acid,and humic acid is the nutrient for phytoplankton.Therefore,the absorption coefficient in the chlorophyll-a-based model can be given by

    whereaw(λ)is the absorption coefficient of pure water in proportion to the wavelengthλ[37].Cc(d)is the concentration of chlorophyll-a(cc=1 mg m-3)given in the following.We chose a wavelength of 530 nm to minimize losses in the450–550 nm transmission window on seawater [38].The scattering coefficient,which is affected by pure water and particulate matter scattering,also follows a similar form:

    Table A1.Parameter values for S1–S6 oceans [36].

    wherebw=0.005826 (4 00/λ)4.322is the coefficient of the scattering spectrum for pure water.Moreover,the other specific parameters are coefficients of fulvic acid,humic acid,and the scattering coefficient of small and large particulate matter.

    In the chlorophyll-a-based model,various biological characteristics determine the spectra of the absorption and scattering spectra,which are classified according to their optical properties.For absorption in equation (A1),af=35.959 m2mg-1andah=18.828 m2mg-1are the specific absorption coefficient of fulvic acid and humic acid,respectively;kf=0.0189 nm-1andkh=0.01105 nm-1are the fulvic acid and humic acid exponential coefficients,respectively.The concentration of fulvic acidCf(d)and the concentration of humic acidCh(d)are related to the oneparameter model for attenuation and have the form

    whereCc(d)is the concentration of chlorophyll-a,which can be can be modelled at a depthdas a Gaussian curve with five numerically determined parameters as [39]

    wherecbkgis the chlorophyll concentration at the surface in the background,Sis the vertical gradient of concentration,which is negative because to the gradual loss of chlorophyll with depth,His the amount of chlorophyll that exceeds the background level,dmaxis the depth of the deep chlorophyll maximum (DCM),and the standard deviationσis given by

    and the concentration of small particles Cs(d)and large particles Cl(d)are given by the following equations:

    The distribution of extinction coefficientC(λ,d)as a function of submarine depthdfor S1–S6 is plotted in figure A1.The above sections discussed two distinct ocean quality types: the S2 ocean (the red solid line) and the S5 ocean (the green solid line),in which the extinction coefficient reaches its maximum value at depths of 92 m and 47 m,respectively.Generally,a submersible’s operating range is limited to a few hundred meters.We limit our numeral calculations to depths of 200 m in both oceans for analytical purposes.

    Appendix B.Elliptic-beam model

    The theory of quantum light propagation via the atmosphere is well researched,with the atmosphere being regarded as a quantum channel with fluctuating transmission [40].When the loss fluctuation is assumed to be a valid random variable,the theory also agrees rather well with the log-normal model[28],as demonstrated in Canary Islands studies [41],and overcomes the inherent inconsistency of physical properties [29].

    Due to the random property of oceanic turbulence channels and atmospheric turbulence channels being similar[42],the quasi-probabilistic Glauber–SudarshanPfunction can be given to describe the PDT in oceanic turbulence as

    wherePoutandPinare the output and inputPfunctions,respectively,TA(B)being the intensity transmittance of Alice or Bob given by

    whereS is the aperture area,I(r;L)is the normalized intensity,and with respect to the full plantr={x,y}.In general,ocean turbulence acts as a loss source for transmitted photons,which are detected at the receiver by a sensor module with a restricted aperture when a Gaussian beam that propagates along thez-axis onto the aperture plane at distancez=Lis taken into our consideration.

    The irregular losses are induced by the displacement of the beam centroid caused by beam wandering and the redistribution of energy throughout the beam section caused by beam widening and deformation.Furthermore,the receiving beam is expected to have an elliptical profile in the elliptic beam model and can be described using a random vector asv=(x0,y0,Θ1,Θ2).In the received aperture,(x0,y0) are the beam-centroid coordinates of the incoming beam,Θ denotes the consequences of beam broadening and ellipticdeformation,andwhere the ellipse semi-axes arew1andw2with the initial beam radiusw0,as depicted in figure B1.

    The Monte Carlo method was used to apply the Kolmogorov power spectrum to maritime turbulence and estimate P(T),are shown as follows.Based on the above,the mean values of vectorvhave the form [43]

    with the covariance matrix given by

    By applying the classical Kolmogorov power spectrum on underwater turbulence[44],the parameters ofvandΣ can be calculated as

    The transmittance without the effects of beam wandering and extinctionT0has the form

    where Λ(*) andR(*)are the scale and shape functions,which have the form

    where Iidenotes theith-order modified Bessel function.With deformation effects,Weff(*)represents the effective spot radius of the form

    whereW is the Lambert function.Moreover,r=(x0,y0)is the beam-centroid vector,ais the receiver telescope radius,andφandφare the angle of beam-ellipse orientation and the angle formed by the vectorrand thez-axis,respectively.

    For reliable results,the number of Monte Carlo random numerical simulations is set to 10 000.Then,the mean of the PDT on Alice’s and Bob’s sides can be computedFigure B2 shows the mean transmittance〈T〉of oceans S2 and S5 as functions of the depthdand transmission distanceL.

    Figure B2.Mean transmittance as a function of submarine depth and transmission distance,including the effects of extinction and turbulence on ocean S2 for (a) and ocean S5 for (b).Other simulation parameters are set as follows: the dissipation rate of temperature or salinity variance ζ=10-11,the kinetic energy dissipation rate ω=10-3,the receiver telescope radius a=0.25m,and the initial beam radiusw0=80mm.

    Moreover,the grey surface is also plotted for comparison,representing the extinction coefficient transmittance without considering turbulence based on Beer’s law in equation (2).We observe that the mean transmittance diminishes as horizontal transmission depth increases in both oceans in both seas.However,the mean transmittance is lowest at a depth of 92 m in the S2 ocean,and the different statistics of the S5 ocean result in a depth of 57 m.This finding demonstrates the necessity of varying the depth in terms of ocean type for improved transmission,which we should avoid in the depths of the extinction coefficient peak ranges.

    Appendix C.Derivation of the secret key rate

    The phase of a coherent state is mapped from the classical binary information and decoded using optical homodyne detection in the QPSK modulation process,as shown in figure 1.The BERcBERof STCQ mentioned encoded by QPSK can be evaluated by the ratio of the carrier power and the noise power when using the CV Bell measurement,which is given by [47]

    whereerfc(*)is the complementary error function,〈T〉A(chǔ)and 〈TB〉are the channel mean transmittance of Alice and Bob,respectively,andηhomdenotes the homodyne detection efficiency.Typically,is the shot-noise variance when the homodyne detector is shot-noise limited.Ntstands for the overall noise variance at Charlie’s side,which has the form

    whereVMAandVMBare the variance Gaussian modulation for CV-MDI QKD of Alice and Bob,respectively;velis the electronic noise of the detector,which characterizes all the noises above;and the variance of a vacuum is normalized to 1[48].Moreover,the Alice-to-Charlie and Bob-to-Charlie quantum channels incurεtAandεtBexcess noise,which are defined as whereε0Aandε0Bare the excess noise of Alice and Bob,which are independent of the amplitudeα[49],andis the phase noise commonly produced by phase instability in the presence of[14],whereσφis the extra noise variance.

    Afterwards,we use the equivalent EB technique and describe the quantum state with a two-mode covariance matrix for easier security analysis.The overall covariance matrix,which is average-weighted by each subchannel at the output of the fluctuating channel,is given by [50]

    whereTABstands for the total quantum channel transmittance between Alice and Bob,for which we can choose the gain of displacementto optimize the equivalent excess noise [17].

    where the required symplectic eigenvalues of ΣABhave the form

    Moreover,the total amount of detection-induced noise and equivalent excess noise is denoted byχt,which has the form

    whereχhomis the detection noise related to the electronic noise varianceveland the detection efficiencyηhom,which is given by

    andε′ is the equivalent excess noise,which is given by

    where the noise contribution caused by Eve’s two-mode correlation isNE,which can be calculated by the correlation components of Eve’sxquadrature orpquadrature as

    where

    representing the modes of Charlie’s side under the correlated attacks by Eve [51].We estimate the SKR above under the premise of the two-mode attack because the two-mode attack is shown to be the most effective [26],so Eve uses a twomode correlated coherent Gaussian attack,introducing quantum correlations{E1,E2} in both quantum channels.Moreover,Eve stores the ancillary states interacted with Alice and Bob to the quantum memory (QM),then deduces the secret key by executing an optimum collective measurement on the ensemble of stored ancilla anytime.

    It is worth noting that the two-mode attack may degenerate into a one-mode attack when the correlation between the two quantum channels becomes weak,in which Eve uses her half of each EPR pair to conduct entangling cloning on Alice’s and Bob’s modes individually [52].Furthermore,these two forms of assault are similar in the extremely asymmetric situation,where Bob is physically adjacent to Charlie.Conversely,the double-mode attack on the key rate will be more formidable when Alice and Bob are more symmetric with respect to Eve.As indicated in equation(C12),the correlation between Eve’s two modes will decrease sharply and degenerate into a one-mode attack when extreme asymmetry occurs,namelyLBC≈ 0,〈TBC〉≈1.

    Additionally,we further consider the finite-size effect,and the most important parameter in equation(8)is related to the security of the private key amplification [53],which is given by

    whereHXis the dimension of the Hilbert space corresponding to the variablexused in the raw key,which takes dim HX=2 in our STCQ protocol encoded by the binary bits.Moreover,is a smoothing parameter,and?PFis the failure probability of the privacy amplification procedure.

    In this finite-size scenario,the estimation of the covariance matrixis made through the sampling of (M-N)couples of correlated variables(Xi,Yi)i=1…m,and the data between Alice and Bob are linked through the correlated linear relation,which has the form

    wheret=and Z follows a centered normal distribution with unknown varianceσ2=1+〈T〉ξ.We can minimize the SKR with a probability of at least1-?PAonce we find the covariance matrix,which is given as

    wheretminrepresents the minimal value oft,andσmaxis the maximal value ofσ,which is compatible with sampled couples except with probabilityHere,the maximumlikelihood estimators are used for the normal linear model

    av在线观看视频网站免费| 免费av观看视频| 狠狠精品人妻久久久久久综合| 在线观看人妻少妇| 亚洲在线观看片| 久久精品国产亚洲av天美| 在线 av 中文字幕| 99久久精品国产国产毛片| 69人妻影院| 97超视频在线观看视频| 亚洲精品视频女| 日本与韩国留学比较| 交换朋友夫妻互换小说| 美女视频免费永久观看网站| 国产亚洲一区二区精品| 国产精品一二三区在线看| 男人狂女人下面高潮的视频| 在线 av 中文字幕| 日韩一区二区三区影片| 人妻少妇偷人精品九色| 亚洲国产色片| av女优亚洲男人天堂| 老女人水多毛片| 欧美激情国产日韩精品一区| 深夜a级毛片| 国产男人的电影天堂91| 丝袜脚勾引网站| 女人被狂操c到高潮| 亚洲精品一二三| 欧美日韩一区二区视频在线观看视频在线 | 欧美成人a在线观看| 黄色视频在线播放观看不卡| 国产色爽女视频免费观看| 亚洲三级黄色毛片| 亚洲电影在线观看av| 亚洲欧美日韩无卡精品| 精品酒店卫生间| 国产精品无大码| 三级经典国产精品| 成人欧美大片| 狠狠精品人妻久久久久久综合| 男人舔奶头视频| 在线免费十八禁| 男插女下体视频免费在线播放| 久久6这里有精品| 新久久久久国产一级毛片| 国产精品人妻久久久影院| 欧美bdsm另类| 丰满人妻一区二区三区视频av| 亚洲av国产av综合av卡| 国产爱豆传媒在线观看| 国内精品美女久久久久久| 欧美区成人在线视频| 22中文网久久字幕| 男女啪啪激烈高潮av片| 亚洲精品乱码久久久久久按摩| 寂寞人妻少妇视频99o| av天堂中文字幕网| 两个人的视频大全免费| 男女边摸边吃奶| 亚洲精品视频女| 成人国产av品久久久| 精华霜和精华液先用哪个| 爱豆传媒免费全集在线观看| 国产亚洲av嫩草精品影院| 香蕉精品网在线| 国产美女午夜福利| a级毛色黄片| 国产综合精华液| 精品久久久久久久久亚洲| 99热网站在线观看| av网站免费在线观看视频| 亚洲国产精品999| 国产精品99久久久久久久久| 久久精品久久久久久久性| 一本久久精品| 免费观看性生交大片5| 午夜免费鲁丝| 精品少妇久久久久久888优播| 舔av片在线| 欧美一区二区亚洲| 69av精品久久久久久| 国产精品一区www在线观看| 可以在线观看毛片的网站| 大陆偷拍与自拍| 日本色播在线视频| 亚洲内射少妇av| 国产 精品1| 在线观看一区二区三区激情| 伦理电影大哥的女人| 亚洲精品亚洲一区二区| 亚洲精品国产色婷婷电影| 好男人在线观看高清免费视频| 欧美极品一区二区三区四区| h日本视频在线播放| 五月伊人婷婷丁香| 欧美国产精品一级二级三级 | 日日撸夜夜添| 欧美zozozo另类| 欧美丝袜亚洲另类| 日本一本二区三区精品| 国产女主播在线喷水免费视频网站| 国产精品秋霞免费鲁丝片| 五月玫瑰六月丁香| 99热国产这里只有精品6| 亚洲精品视频女| 91aial.com中文字幕在线观看| 中国三级夫妇交换| 欧美日韩视频高清一区二区三区二| 性色avwww在线观看| 亚洲精品中文字幕在线视频 | 新久久久久国产一级毛片| 亚洲精品乱码久久久v下载方式| 99热这里只有是精品50| 国产又色又爽无遮挡免| 99视频精品全部免费 在线| 深夜a级毛片| 国产亚洲91精品色在线| 国产高清国产精品国产三级 | 啦啦啦在线观看免费高清www| 丰满乱子伦码专区| 69人妻影院| 亚洲综合精品二区| 亚洲欧美日韩另类电影网站 | 国产精品熟女久久久久浪| 亚洲精品日本国产第一区| 精品一区二区三区视频在线| 久久精品国产a三级三级三级| 看黄色毛片网站| 亚洲经典国产精华液单| 永久免费av网站大全| 免费观看a级毛片全部| 国产成人精品婷婷| 在线观看三级黄色| 综合色av麻豆| 插阴视频在线观看视频| 亚洲成人一二三区av| 国产综合懂色| 欧美高清成人免费视频www| 青春草视频在线免费观看| 国产毛片a区久久久久| 国模一区二区三区四区视频| 国产黄片视频在线免费观看| 中国国产av一级| 免费不卡的大黄色大毛片视频在线观看| 亚洲成人精品中文字幕电影| 七月丁香在线播放| 国产视频首页在线观看| av一本久久久久| av在线播放精品| 亚洲av免费高清在线观看| 韩国av在线不卡| 日本黄色片子视频| 欧美高清性xxxxhd video| 夜夜爽夜夜爽视频| 国产成人一区二区在线| 最近中文字幕2019免费版| 亚洲成人av在线免费| 美女脱内裤让男人舔精品视频| 亚洲精品,欧美精品| 国产 一区精品| 亚洲av成人精品一二三区| 在线观看三级黄色| 国产高清国产精品国产三级 | 在线观看三级黄色| 亚洲自偷自拍三级| 国产精品三级大全| 99九九线精品视频在线观看视频| av国产久精品久网站免费入址| 美女内射精品一级片tv| 久久久久网色| 人妻系列 视频| 欧美成人精品欧美一级黄| 亚洲最大成人中文| 美女主播在线视频| 欧美激情在线99| 嘟嘟电影网在线观看| 欧美日韩综合久久久久久| 亚洲伊人久久精品综合| 欧美日韩国产mv在线观看视频 | 黄色配什么色好看| 少妇丰满av| 六月丁香七月| 亚洲图色成人| 亚洲激情五月婷婷啪啪| 黑人高潮一二区| 天天躁日日操中文字幕| 好男人视频免费观看在线| 亚洲aⅴ乱码一区二区在线播放| 精品人妻熟女av久视频| 国产精品久久久久久久久免| 香蕉精品网在线| 免费黄频网站在线观看国产| 成人美女网站在线观看视频| 一级爰片在线观看| 色5月婷婷丁香| 精品酒店卫生间| 国产成人精品久久久久久| 欧美日韩视频精品一区| 国产精品国产三级国产av玫瑰| 青春草亚洲视频在线观看| 免费大片18禁| 国产在视频线精品| 国产综合懂色| 1000部很黄的大片| 777米奇影视久久| 亚洲最大成人手机在线| 成人午夜精彩视频在线观看| 日本与韩国留学比较| av在线播放精品| 国产乱人偷精品视频| 亚洲色图av天堂| 日韩中字成人| 午夜爱爱视频在线播放| 97超碰精品成人国产| 人人妻人人澡人人爽人人夜夜| 国产男人的电影天堂91| 欧美xxxx性猛交bbbb| 欧美+日韩+精品| 亚洲欧洲国产日韩| 一区二区三区免费毛片| 熟女av电影| 精品久久久久久久久亚洲| videossex国产| 亚洲成人一二三区av| 亚洲第一区二区三区不卡| 国产亚洲91精品色在线| 简卡轻食公司| 成人欧美大片| 欧美高清成人免费视频www| 国产亚洲av片在线观看秒播厂| 99re6热这里在线精品视频| 亚洲色图av天堂| 亚洲精品乱码久久久久久按摩| 久久久久精品久久久久真实原创| 噜噜噜噜噜久久久久久91| 国产精品久久久久久av不卡| 亚洲婷婷狠狠爱综合网| 中文字幕亚洲精品专区| 日韩欧美一区视频在线观看 | 国产一区二区在线观看日韩| 国产成人精品婷婷| 欧美xxxx黑人xx丫x性爽| 天堂俺去俺来也www色官网| 99热这里只有是精品50| 黄色一级大片看看| 欧美日韩在线观看h| 久久99热这里只有精品18| 少妇人妻 视频| 成人特级av手机在线观看| 日本欧美国产在线视频| 嘟嘟电影网在线观看| 少妇的逼水好多| 精品国产露脸久久av麻豆| 欧美日韩在线观看h| 自拍偷自拍亚洲精品老妇| 国产精品人妻久久久影院| 国产高清有码在线观看视频| 亚洲国产色片| 精品亚洲乱码少妇综合久久| 十八禁网站网址无遮挡 | 国产精品国产三级国产av玫瑰| 美女xxoo啪啪120秒动态图| 狂野欧美激情性bbbbbb| 直男gayav资源| 亚洲av二区三区四区| 亚洲熟女精品中文字幕| 久久久久精品久久久久真实原创| 最近最新中文字幕免费大全7| 卡戴珊不雅视频在线播放| 青春草国产在线视频| 国产欧美日韩一区二区三区在线 | 成人高潮视频无遮挡免费网站| 天堂中文最新版在线下载 | 欧美另类一区| 亚洲国产最新在线播放| 最近2019中文字幕mv第一页| 国产欧美日韩一区二区三区在线 | 尤物成人国产欧美一区二区三区| 亚洲国产精品999| 久久久久久九九精品二区国产| 欧美三级亚洲精品| 国产真实伦视频高清在线观看| 97超视频在线观看视频| 亚洲色图综合在线观看| 三级国产精品片| 美女被艹到高潮喷水动态| 91aial.com中文字幕在线观看| 乱系列少妇在线播放| 日韩国内少妇激情av| 久久久成人免费电影| 国产精品久久久久久久久免| 免费观看av网站的网址| 欧美一区二区亚洲| 午夜视频国产福利| 国产伦精品一区二区三区视频9| 一本一本综合久久| 人人妻人人爽人人添夜夜欢视频 | 极品少妇高潮喷水抽搐| www.av在线官网国产| 各种免费的搞黄视频| 一本久久精品| 日韩欧美一区视频在线观看 | 日韩欧美 国产精品| 99热国产这里只有精品6| 国产男女内射视频| 国产免费一区二区三区四区乱码| 99热这里只有是精品在线观看| 亚洲国产精品国产精品| 久久久久久久久久成人| 精品一区二区免费观看| 热99国产精品久久久久久7| 国产精品99久久久久久久久| 黑人高潮一二区| 99热这里只有是精品在线观看| 三级经典国产精品| 欧美+日韩+精品| 久久鲁丝午夜福利片| 国产黄色免费在线视频| 精品一区在线观看国产| 久久久久九九精品影院| 国产v大片淫在线免费观看| 免费看不卡的av| 国产黄色免费在线视频| 噜噜噜噜噜久久久久久91| 毛片女人毛片| 久久久久久久亚洲中文字幕| 日韩成人av中文字幕在线观看| 97热精品久久久久久| 国产乱人偷精品视频| 少妇的逼水好多| av在线蜜桃| 高清av免费在线| 成年人午夜在线观看视频| 丝袜喷水一区| 99视频精品全部免费 在线| 美女国产视频在线观看| 麻豆精品久久久久久蜜桃| 成人亚洲欧美一区二区av| 国产男女内射视频| 国产淫语在线视频| 久久99热这里只有精品18| 建设人人有责人人尽责人人享有的 | 国产精品一及| 性色avwww在线观看| 久久久国产一区二区| 亚洲va在线va天堂va国产| 下体分泌物呈黄色| 女的被弄到高潮叫床怎么办| 日日啪夜夜爽| 大香蕉久久网| 亚洲精品,欧美精品| 国产高清国产精品国产三级 | 久久久久精品久久久久真实原创| 一区二区三区四区激情视频| 成年av动漫网址| 99视频精品全部免费 在线| 日韩不卡一区二区三区视频在线| 美女内射精品一级片tv| 日韩欧美精品v在线| 少妇的逼好多水| 下体分泌物呈黄色| 小蜜桃在线观看免费完整版高清| 国产精品国产三级专区第一集| 在线观看美女被高潮喷水网站| 欧美成人精品欧美一级黄| www.av在线官网国产| 草草在线视频免费看| 性插视频无遮挡在线免费观看| 日本三级黄在线观看| 伦理电影大哥的女人| 免费av毛片视频| 久久久久精品性色| 国产白丝娇喘喷水9色精品| 亚洲综合色惰| 男人爽女人下面视频在线观看| 国产成人freesex在线| 亚洲自偷自拍三级| 熟妇人妻不卡中文字幕| 午夜福利高清视频| 天天躁日日操中文字幕| 亚洲精品一二三| 我的女老师完整版在线观看| 性色av一级| 在线看a的网站| 大片免费播放器 马上看| 人人妻人人看人人澡| 亚洲av免费在线观看| 国产91av在线免费观看| 日韩人妻高清精品专区| 91在线精品国自产拍蜜月| 午夜精品一区二区三区免费看| av免费观看日本| 亚洲成人久久爱视频| 美女脱内裤让男人舔精品视频| 嫩草影院新地址| 免费看不卡的av| 精品久久久久久久久av| 成人鲁丝片一二三区免费| 九九在线视频观看精品| 国产精品秋霞免费鲁丝片| 欧美成人一区二区免费高清观看| 国产精品久久久久久久久免| 免费av观看视频| 白带黄色成豆腐渣| 七月丁香在线播放| 国产美女午夜福利| 亚洲最大成人中文| 99久久中文字幕三级久久日本| 少妇 在线观看| av在线亚洲专区| 菩萨蛮人人尽说江南好唐韦庄| 性色avwww在线观看| 日韩电影二区| 成人黄色视频免费在线看| 性插视频无遮挡在线免费观看| 高清在线视频一区二区三区| 成年女人看的毛片在线观看| 九色成人免费人妻av| 久久久久性生活片| 免费看av在线观看网站| 久久精品熟女亚洲av麻豆精品| 久久99精品国语久久久| 亚洲国产精品成人久久小说| 欧美三级亚洲精品| 男女国产视频网站| 国产成人a区在线观看| 国产精品av视频在线免费观看| 下体分泌物呈黄色| kizo精华| 麻豆国产97在线/欧美| 天堂网av新在线| 日韩大片免费观看网站| 亚洲人成网站高清观看| 亚洲精品色激情综合| 亚洲精品一区蜜桃| 日韩不卡一区二区三区视频在线| 91精品国产九色| 亚洲真实伦在线观看| 人妻系列 视频| 男女边摸边吃奶| 人妻少妇偷人精品九色| 日日啪夜夜撸| 少妇人妻精品综合一区二区| 在线看a的网站| 亚洲精品日本国产第一区| 亚洲欧美精品自产自拍| 男插女下体视频免费在线播放| 国产有黄有色有爽视频| 一本一本综合久久| 国产女主播在线喷水免费视频网站| 高清欧美精品videossex| 色5月婷婷丁香| 97在线视频观看| 精品99又大又爽又粗少妇毛片| 国产成人精品久久久久久| 精品少妇久久久久久888优播| 国产淫语在线视频| 自拍欧美九色日韩亚洲蝌蚪91 | 国产真实伦视频高清在线观看| 少妇猛男粗大的猛烈进出视频 | 制服丝袜香蕉在线| 91久久精品国产一区二区成人| 欧美97在线视频| 搡老乐熟女国产| 国产在线男女| 男女边吃奶边做爰视频| 日韩欧美一区视频在线观看 | 九草在线视频观看| 综合色丁香网| 国产一区有黄有色的免费视频| 中文欧美无线码| 精品久久久精品久久久| 久久这里有精品视频免费| 欧美日韩在线观看h| 五月天丁香电影| 特级一级黄色大片| 男女边吃奶边做爰视频| av专区在线播放| 我的女老师完整版在线观看| 亚洲电影在线观看av| 街头女战士在线观看网站| 好男人视频免费观看在线| 国产成人a区在线观看| av免费在线看不卡| 国产一区有黄有色的免费视频| 日韩三级伦理在线观看| 久久亚洲国产成人精品v| 欧美性猛交╳xxx乱大交人| 中国美白少妇内射xxxbb| 草草在线视频免费看| 欧美极品一区二区三区四区| 亚洲天堂av无毛| 在线免费十八禁| 国产黄片美女视频| 舔av片在线| 极品少妇高潮喷水抽搐| 男人舔奶头视频| 色播亚洲综合网| 九草在线视频观看| 美女内射精品一级片tv| 白带黄色成豆腐渣| 亚洲国产精品成人久久小说| 日韩一本色道免费dvd| 最近的中文字幕免费完整| 国产乱人视频| 久久精品国产亚洲网站| 99久久精品热视频| 观看免费一级毛片| 亚洲国产欧美在线一区| 亚洲av中文字字幕乱码综合| 激情五月婷婷亚洲| 日韩国内少妇激情av| 久久精品久久精品一区二区三区| 欧美区成人在线视频| 好男人在线观看高清免费视频| 网址你懂的国产日韩在线| 久久精品久久精品一区二区三区| 老司机影院毛片| 午夜老司机福利剧场| 你懂的网址亚洲精品在线观看| 春色校园在线视频观看| 亚洲精品aⅴ在线观看| 丝袜脚勾引网站| 在线观看av片永久免费下载| 午夜激情福利司机影院| av在线观看视频网站免费| 女人被狂操c到高潮| 色吧在线观看| 大又大粗又爽又黄少妇毛片口| 日本猛色少妇xxxxx猛交久久| 欧美97在线视频| 最近中文字幕高清免费大全6| 三级经典国产精品| 亚洲欧美清纯卡通| 99精国产麻豆久久婷婷| 男人和女人高潮做爰伦理| 国产乱人视频| 超碰97精品在线观看| 一区二区三区精品91| 欧美成人精品欧美一级黄| 九九久久精品国产亚洲av麻豆| 国产亚洲av片在线观看秒播厂| 男的添女的下面高潮视频| 亚洲精品国产色婷婷电影| 免费人成在线观看视频色| 26uuu在线亚洲综合色| 97精品久久久久久久久久精品| 国产老妇女一区| 亚洲色图综合在线观看| 国产精品人妻久久久久久| 中文精品一卡2卡3卡4更新| 亚洲人成网站在线播| 久久久午夜欧美精品| 国产淫片久久久久久久久| 天天一区二区日本电影三级| 国产免费一区二区三区四区乱码| 成年女人看的毛片在线观看| 亚洲最大成人手机在线| 国产精品不卡视频一区二区| 午夜激情久久久久久久| 高清在线视频一区二区三区| 国产精品成人在线| 91精品伊人久久大香线蕉| 国产伦在线观看视频一区| 亚洲国产欧美人成| 观看免费一级毛片| 又大又黄又爽视频免费| 国产精品国产三级国产专区5o| 国产真实伦视频高清在线观看| 欧美极品一区二区三区四区| 亚洲内射少妇av| 色5月婷婷丁香| 69人妻影院| 日韩人妻高清精品专区| 免费看日本二区| 国产一区二区在线观看日韩| 午夜视频国产福利| 久久99热这里只频精品6学生| 国产精品.久久久| 免费黄色在线免费观看| 国产真实伦视频高清在线观看| 99久久人妻综合| 噜噜噜噜噜久久久久久91| 欧美激情久久久久久爽电影| 男插女下体视频免费在线播放| 精品人妻视频免费看| 精品一区二区三卡| 六月丁香七月| 街头女战士在线观看网站| 日韩电影二区| 欧美三级亚洲精品| 一本一本综合久久| 成人国产麻豆网| 日韩在线高清观看一区二区三区| 美女cb高潮喷水在线观看| 深夜a级毛片| 午夜免费观看性视频| 日韩欧美精品免费久久| 成人黄色视频免费在线看| 99久久精品一区二区三区| 一级毛片我不卡| 亚洲熟女精品中文字幕| 人妻 亚洲 视频| 亚洲欧美清纯卡通| 国产黄频视频在线观看| 国产探花在线观看一区二区| 精品久久久久久久末码| 街头女战士在线观看网站| 成人欧美大片| 国语对白做爰xxxⅹ性视频网站| 久久99精品国语久久久| 直男gayav资源| 亚洲欧洲日产国产| 搞女人的毛片|