• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution

    2022-12-28 09:52:46XiaoMingChen陳小明LeiChen陳雷andYaLongYan閻亞龍
    Chinese Physics B 2022年12期
    關(guān)鍵詞:亞龍陳雷

    Xiao-Ming Chen(陳小明) Lei Chen(陳雷) and Ya-Long Yan(閻亞龍)

    1Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Beijing Electronic Science and Technology Institute,Beijing 100070,China

    3University of Science and Technology of China,Hefei 230026,China

    Keywords: quantum key distribution,photon number splitting,decoy state,hypothesis testing

    1. Introduction

    Quantum key distribution(QKD)[1–7]is a technique that allows two different remote parties,Alice(the sender)and Bob(the receiver), to share a unconditional secret key. The unconditional security of the key is guaranteed through the laws of quantum mechanics.[8–12]The first ideal QKD protocol was BB84-QKD protocol created by Bennett and Brassard,[1]which needs to employ the perfect single-photon source. Nevertheless, at present, single-photon sources are not available,and a weak coherent photon source is often utilized to replace the single-photon source. Due to adopting the imperfect single-photon sources, an eavesdropper Eve can launch the photon-number-splitting (PNS) attack.[13–30]In the basic PNS attack,Eve intercepts the pulse sent by Alice and detects the photon number of the intercepted pulse. If it is a singlephoton pulse,it will be directly discarded. If it is a multiphoton pulse,one photon will be stored and the rest will be sent to Bob through a weakly attenuated or even lossless channel. Finally,Eve can obtain exactly the same key as Bob by measuring the stored photons according to the basis published by Alice and Bob,which makes the QKD system no longer secure.Specially,a weaker version of PNS attack is one in which the observed values of Alice and Bob change significantly after the attack,[13–15,29]and the stronger PNS attack means that the observed values of Alice and Bob remain unchanged after the attack.[30]The difference between these two types of attacks is the effect on the observed values of Alice and Bob.

    There are numerous protocols proposed to resist the PNS attack, among which the decoy-state method is a highly effective one. In decoy-state QKD,Alice randomly sends pulses from signal source or decoy source,and the only difference between signal source and decoy source is intensity.Importantly,the decoy-state method assumes that Eve could not distinguish the intercepted pulses coming from which source. The existing decoy-state protocols, such as Refs. [31–33], presented a method to defeat the PNS attack. Actually, the decoy-state QKD beats the PNS attack to provide a more accurate method to determine the secure key rate. To be precise, the existing decoy-state method can more closely estimate the lower bound of gain and the upper bound of quantum bit error rate(QBER)of the single-photon signals,and then calculate the secure key rate by using the Gottesman–Lo–L¨utkenhaus–Preskill(GLLP)formula[34]inspired by the idea of the entanglement distillation approach,

    whereqis the basis alignment efficiency depending on the implementation (1/2 for the BB84 protocol),QμandEμare,respectively, the gain and QBER of the signal state,f(Eμ)is the error correction efficiency,H2(x)=?xlog2(x)?(1?x)log2(1?x)is the binary Shannon entropy function,Q1ande1are, respectively, the gain and QBER of single-photon states. Unfortunately,the secure key rate of decoy-state QKD is not high, and most of previous literatures use optimization and joint constraints to improve the key rate.[35–38]We find that the existing decoy-state method still considers that only single-photon pulses can generate secure keys in any case.However,if we can detect the possibility of PNS attack in the channel,multiphoton pulses can also generate secure keys. In this case,there is no doubt that using the above method to estimate secure key rate will waste the keys generated by multiphoton pulses and reduce the efficiency.It should be noted that the ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular,the PNS attack mentioned and detected in this paper is only a weaker version of PNS attack which significantly changes the observed values of Alice and Bob.

    In this work,under the null hypothesis of no weaker version of PNS attackHo1, we first retrieve the lost information,extract a Cauchy distribution statistic and provide a new method to detect the possibility of PNS attack which significantly changes the observed values of legitimate users in the channel,namely,the first test in this paper.Furthermore,given the significance level of the first testα1and the number of the first testm,we interpret the empirical results to verify the correctness of the first test through the NIST Statistical Test Suite,[39]which is called the second test in this paper. If the result is judged to be an attack, the lower bound of the gain and the upper bound of QBER of the single-photon signals will be estimated by the existing decoy-state method,and then the secure key rate will be calculated by the GLLP formula.Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we also give the secure key rate in this case. And the end, the associated experiments we performed also indicate that our method is credible(i.e.,the significance level is 5%).

    2. The scheme

    In this section, we will focus on our scheme to detect the type of PNS attack which significantly changes the observed values of Alice and Bob. Unless otherwise specified,the PNS attacks mentioned in this paper are both the weaker version. For one thing, we describe the first test, a new detection method of weaker PNS attack for decoy-state QKD,which can precisely calculate the error probability of detection. For another, we interpret the empirical results to verify the correctness of the first test,namely,the second test in this paper. We refer specifically to the interpretation of empirical results in section 4.2 of Ref. [39], which is called the second test in our paper. Two scenarios typify events that may occur due to empirical testing. Case 1: The significance level selected for the first test is reasonable, indicating that the first test is correct. Case 2: The significance level selected for the first test is unreasonable,indicating that the first test is wrong.We use the second test to check the correctness of the first test.Finally,according to the judgment result,we will give the corresponding secure key rate.

    2.1. The first test

    In this part, we introduce the new method to detect the PNS attack which significantly changes the observed values of legitimate users in decoy-state QKD via statistical hypothesis testing, which is called the first test in this paper. Then we analyze the type I error of the first test, that is, mistaking no PNS attack for having a PNS attack. The first test contains five steps.

    Identify null and alternative hypothesis Let us consider the hypothesis testing problem about the null hypothesisHo1: there is no weaker version of PNS attack on the channel and the alternative hypothesisHa1: there is a weaker version of PNS attack on the channel.

    Construct the test statistic We need a test statistic to conduct the hypothesis testing. In what follows, the distribution of the test statistic is derived under the null hypothesisHo1.Alice intentionally and randomly selects two weak coherent photon sources with different intensities, after phase randomization,namely,signal source and decoy source. Suppose the intensities of the signal source and the decoy source areμandν,respectively.Pn(μ)denotes the probability of emittingn-photons pulses from the signal source,written as

    The yieldynrepresents the probability of receiving a pulse(at Bob’s side)after Alice emits an-photons pulse. According to Ref. [33], one hasyn ≈nηwhereηis the overall transmission probability of each photon. The gainQis the probability of receiving a pulse (at Bob’s side) after Alice emits a pulse,no matter how many photons which contains. The gain of the signal sourceQμis given by

    Let us consider further about the sending and receiving process between Alice and Bob. When Alice emits a pulse from the signal source, the outcome (at Bob’s side) only includes two cases, that is, receiving it or not. Therefore, the sending and receiving process can be regarded as a Bernoulli trial. Taking the advantage of Eq.(3),we derive the probability that Bob receives the signal pulsep1=μη. Suppose the number of signal pulses Alice emits and that of signal pulses Bob receives areN1andn1,respectively. Next,n1has the binomial distribution with parameters(N1,p1),for short,

    In Ref.[32],we findN1is so large(typically 109to 1010),μandηare approximately 10?2to 10?1and 10?4to 10?3,respectively. Thus,p1is roughly 10?6to 10?4. By the law of large numbers and the central limit theorem, whenN1p1≥5 andN1p1(1?p1)≥5, the binomial distribution with parameters (N1,p1) can be approximately regarded as the normal distribution with meanN1p1and varianceN1p1(1?p1),given by

    Since the only difference between the signal source and the decoy source is their intensities,it is easy to get the other random variableX2by analogy,denoted by

    whereN2andn2are the number of the decoy pulses Alice emits and that of the decoy pulses Bob receives,respectively.p2represents the probability of receiving a decoy pulse (at Bob’s side) after Alice emits a decoy pulse, no matter how many photons which contains and the value ofp2isνη. According to the definition oftdistribution,let the random variableY=X1/X2, thenYobeys thetdistribution with a single degree of freedom,which is equivalent to the standard Cauchy distribution,that is,

    whereyis the value ofYand is also the test statistic that we find.

    Find the value of the test statistic Set the parametersμ,ν,N1,N2,andη,then recordn1andn2. Substituting these data into Eq.(9),the desired value of the test statisticycan be obtained.

    Choose a significance level We need to determine a significance level (typically 0.05) for the first test. In terms of the null hypothesis of the first testHo1, we deduce that the first test is a two-tailed hypothesis testing. In addition, given the significance level of the first testα1, the rejection region is|y|≥y[1?α1/2]wherey[1?α1/2]can be obtained by Eq.(10).More precisely,the variables?y[1?α1/2]andy[1?α1/2]refer to the boundary values between the rejection region and the acceptance region for the first test. Let the left side of Eq. (10)is equal toα1/2, then the upper limit of the integral will be?y[1?α1/2]. According to the symmetry of the probability density function of the Cauchy distribution,y[1?α1/2]can be obtained.

    Make a decision Compare the test statisticywith the critical valuesy[1?α1/2]and?y[1?α1/2]. Ify>y[1?α1/2]ory

    2.2. The second test

    The interpretation of empirical results can be conducted in any number of ways. Two approaches NIST adopted include(1)the examination of the proportion of passing the first test and (2) the distribution ofP-values to check for uniformity. We adopt the first approach of NIST, which considers the empirical results of the first test and calculates the passing proportion of the first test. In this part,given the significance level of the first testα1and the number of the first testm,we account for the empirical results to check the correctness of the first test via the NIST Statistical Test Suite, according to illustrating the reasonability of the counting rate of acceptingHo1,which is called the second test in this paper. The specific analysis is as follows. Given the significance level of the second test, if the passing proportion of the first test passes the second test,the first test is proved to be correct;otherwise,the first test is proved to be wrong. The second test also contains five steps.

    Identify null and alternative hypothesis Under the significance level of the first testα1and the number of the first testm,let us consider the hypothesis testing problem about the null hypothesisHo2: the counting rate of acceptingHo1with the first test is reasonable and the alternative hypothesisHa2:the counting rate of acceptingHo1with the first test is unreasonable.

    Construct the test statistic Supposing that each first test is independent and identically distributed,the confidence level of the first test isq=1?α1. Let us consider further about the first test. The results contain two cases,namely,acceptingHo1or rejectingHo1. Thereby, one can regard each first test as a Bernoulli trial. Note that the probability of acceptingHo1isq. Suppose the number of the first test and that of acceptingHo1aremandξ,respectively.mis the times that the first hypothesis testing procedure is repeated. The value ofmis set by the experimenter himself. If the experimental conditions permit(i.e.,a fast enough repetition rates),the larger the value ofm, the better the result.ξrefers to the times of accepting hypothesisHo1when we repeat the first testmtimes. That is to say,for each first test executed,if the test result is accepting hypothesisHo1,the value ofξwill be increased by one. Then,ξwill obey the binomial distribution with parameters (m,q),for short,

    Whenmq ≥5 andmq(1?q)≥5,by the law of large numbers and the central limit theorem, the binomial distribution with parameters(m,q)can be approximatively regarded as the normal distribution with meanmqand variancemq(1?q),written as

    wherezis the value ofZand is just the test statistic that we find.

    Find the value of the test statistic Selectmand recordξ. Substituting these data into Eq.(13),one can get the value of the test statisticz.

    Choose a significance level We need to choose a significance levelα2(typically,α1=α2) for the second test.According to the null hypothesis of the second testHo2, we deduce that the second test is a two-tailed hypothesis testing.The rejection region of the second test is|z|≥z[1?α2/2]wherez[1?α2/2]can be obtained by Eq.(14). More precisely,the variables?z[1?α2/2]andz[1?α2/2]refer to the boundary values between the rejection region and the acceptance region for the second test. Let the left side of Eq. (14) be equal toα2/2,the upper limit of the integral will be?z[1?α2/2]. According to the symmetry of the probability density function of the normal distribution,z[1?α2/2]can be obtained.

    Make a decision Compare the test statisticzwith the critical valuesz[1?α2/2]and?z[1?α2/2]. Ifz>z[1?α2/2]orz

    If the result is judged to be an attack,the lower bound ofQ1and the upper bound ofe1will be estimated by the existing decoy-state method,and then the secure key rate will be calculated by Eq.(1). If the result is no attack,then the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys. Under the assumption that the bit error is equal to the phase error even for multiphoton pulses, the secure key rate formula Eq.(1)becomes

    By comparing Eqs. (1) and (15), we can easily see the improvement of the secure key rate.

    3. Experiments and analysis

    In the preceding section, we show the details of our detection method. Now,we move forward to the corresponding experiments based on the aforementioned method and analyze the experimental results. The experimental setup is based on the platform of polarization encoding decoy-state BB84 implementation, with commercial compact devices at 625 MHz clock rate,[40,41]with some different parameters such as the wavelength and mean photon numbers. The mean photon numbers of the signal state and decoy state are typical around 0.4 and 0.1,respectively.[42]The block size for parameter estimation is set to 500 kbits to guarantee the freshness of final keys.[41,43]Meanwhile,ηis set to a typical value 10?3,which contains a typical detection efficiency of 10%and a transmittance of 1%with a 100 km-length fiber.[40]

    3.1. The first test

    The experimental parameters and their corresponding values of the first test are listed in Table 1. After calculation,we obtain the value of the test statisticy=4.90. When the significance level of the first testα1=0.05, the critical values arey[1?α1/2]=12.71 and?y[1?α1/2]=?12.71. Due to?12.71<4.90<12.71, the test statistic does not fall inside the rejection region and we fail to rejectHo1. In other words,we infer that there is no weaker version of PNS attack on the channel and the probability of being wrong is no more than 5%. The schematic diagram of the first test is illustrated in Fig.1.

    Table 1. Experimental parameters and their corresponding values of the first test.

    Fig.1. The schematic diagram of the first test. The value of the test statistic y is 4.90. Given the significance level of the first test α1=0.05,the critical values are y[1?α1/2]=12.71 and ?y[1?α1/2]=?12.71.

    3.2. The second test

    In this part, we interpret the empirical results to check the correctness of the first test via the NIST Statistical Test Suite. The number of the first test and that of acceptingHo1arem=984 andξ=945,respectively. The experimental parameters and their corresponding values of the second test are listed in Table 2. In practical QKD systems, one cannot accurately control the number of signal pulses Alice emitsN1and that of decoy pulses Alice emitsN2. Fortunately,although the values ofN1for each first test are not completely identical,they are very close and have the same order of magnitude.For simplicity, we ignore the effect of the minimal deviation of differentN1and take the same strategy toN2.

    After calculation, we obtain the value of the test statisticz= 1.49. Given the significance level of the second testα2= 0.05, the critical values arez[1?α2/2]= 1.96 and?z[1?α2/2]=?1.96. Since?1.96< 1.49< 1.96, the test statistic does not fall inside the rejection region and we fail to rejectHo2. This means that the counting rate of acceptingHo1is reasonable, and also further affirms the correctness of our method. That is to say,under the null hypothesis of no weaker version of PNS attack, we can judge there is no weaker version of PNS attack on the channel with an error probability of less than 5%. And then we can use Eq. (15) to calculate the secure key rate. The schematic diagram of the second test is illustrated in Fig.2.

    Table 2. Experimental parameters and their corresponding values of the second test.

    Fig. 2. The schematic diagram of the second test. The value of the test statistic z is 1.49. Given the significance level of the second test α2=0.05,the critical values are z[1?α2/2]=1.96 and ?z[1?α2/2]=?1.96.

    4. Conclusion and discussion

    In summary, we first recover the lost information of the existing decoy-state protocols when detecting the type of PNS attack which significantly changes the observed values of Alice and Bob, and extract out a Cauchy distribution statistic.Based on this information,we propose a new detection method including the first test and the second test. Most importantly,the error probability of detection can be precisely calculated in our method and we also give the calculations. Finally,according to the judgment result, we give the corresponding secure key rate. In particular,compared with the existing decoy-state protocols,the secure key rate with our method has a great improvement if the judgment result is no attack. Meanwhile,the associated experiments we performed also verify the correctness of our scheme. Nevertheless,all judgment results in this paper are obtained under the condition that the null hypothesis is no weaker version of PNS attack, which significantly changes the observed values of legitimate users. In other words,the gain of signal state or decoy state will change significantly after the type of PNS attack.[13–15,29]However, we can do nothing about stronger PNS attacks that retain the gain of signal state and decoy state,such as partial PNS attacks,[30]because the premise of the derivation no longer holds,and the type II error probability of our method in this case will be insufferable even close to unity. It should be noted that the ultimate goal of this line of research is to confirm that there are no all types of PNS attacks. For this reason, compared with the existing decoy-state methods[31–33]to directly estimate the secure key rate,our method is not yet able to be directly applied in practice now. But at least we give a new idea to detect the type of PNS attack which significantly changes the observed values of legitimate users,and improve the secure key rate and efficiency.

    As for future work, one direction is to extend our approach to resist stronger version of PNS attacks.[30]In addition, in the absence of weaker version of PNS attack, since the distribution of the photon numbers received by Bob is approximated with a normal distribution,except that the ratio of two independent random variables obeying the standard normal distribution obeys a Cauchy distribution used in the paper,we can also use the conclusion that the sum ofnindependent random variables obeying the normal distribution still obeys a normal distribution or that the sum of squares ofnindependent random variables obeying the standard normal distribution still obeys a chi-square distribution ofndegrees of freedom,to determine whether there is an attack and to calculate the type I error probability. It can be seen from the above analysis that our method can also be applied to other protocols containing more than one decoy state. Therefore,the other direction is to extend our method to other decoy-state QKD protocols, such as three different intensities of coherent photon source[36,44,45]and four different intensities of coherent photon source.[35]

    猜你喜歡
    亞龍陳雷
    潘諾尼亞龍 板踝龍——向淡水進(jìn)發(fā)
    Numerical simulation study of ionization characteristics of argon dielectric barrier discharge
    冷靜是一種智慧,寬恕是一種力量
    船舶上層建筑建造工藝探討
    陳雷膠漆
    偷拍鏡頭
    時(shí)尚“吃播”陳雷:邊吃邊秀邊掙錢
    陳雷講“三嚴(yán)三實(shí)”專題黨課
    陳雷主持召開全國(guó)水庫(kù)安全度汛視頻會(huì)議
    老牌亞龍的嶄新活力
    性少妇av在线| 精品熟女少妇八av免费久了| 国产麻豆69| 熟女少妇亚洲综合色aaa.| 久久青草综合色| 夜夜骑夜夜射夜夜干| 热re99久久精品国产66热6| 美女中出高潮动态图| 久久人妻福利社区极品人妻图片| 99热国产这里只有精品6| 国产激情久久老熟女| 欧美 亚洲 国产 日韩一| 91字幕亚洲| 日本黄色日本黄色录像| 欧美精品人与动牲交sv欧美| 日韩中文字幕视频在线看片| 女性被躁到高潮视频| 午夜福利视频在线观看免费| 亚洲欧美精品自产自拍| 操美女的视频在线观看| 国产在视频线精品| 国产野战对白在线观看| 久久女婷五月综合色啪小说| 一区二区av电影网| 搡老熟女国产l中国老女人| 18禁观看日本| 99久久人妻综合| 女人高潮潮喷娇喘18禁视频| 嫩草影视91久久| 18禁观看日本| 丰满饥渴人妻一区二区三| 亚洲三区欧美一区| 91字幕亚洲| 久久亚洲精品不卡| 精品人妻熟女毛片av久久网站| 91成年电影在线观看| 久久精品国产亚洲av高清一级| 99国产精品一区二区蜜桃av | 成年女人毛片免费观看观看9 | 久久精品人人爽人人爽视色| 国产精品自产拍在线观看55亚洲 | 午夜激情av网站| 午夜福利视频精品| 日日摸夜夜添夜夜添小说| 啦啦啦在线免费观看视频4| 精品久久久精品久久久| 一边摸一边做爽爽视频免费| 9热在线视频观看99| 一级毛片精品| 中文字幕av电影在线播放| 国产av国产精品国产| 一级毛片精品| 精品国产国语对白av| 亚洲一区中文字幕在线| 亚洲精品第二区| 亚洲欧美清纯卡通| 欧美大码av| 精品高清国产在线一区| 9热在线视频观看99| 蜜桃国产av成人99| 国产精品麻豆人妻色哟哟久久| 99精品欧美一区二区三区四区| 久久中文字幕一级| 一区二区三区精品91| 99久久精品国产亚洲精品| 国产高清国产精品国产三级| 欧美乱码精品一区二区三区| 亚洲精品成人av观看孕妇| 91成人精品电影| 99精品欧美一区二区三区四区| 精品福利永久在线观看| 国产黄频视频在线观看| 黄色a级毛片大全视频| 热re99久久精品国产66热6| 99re6热这里在线精品视频| 香蕉国产在线看| 高潮久久久久久久久久久不卡| 亚洲精品中文字幕在线视频| 国产成人精品在线电影| av片东京热男人的天堂| 女人爽到高潮嗷嗷叫在线视频| 日本五十路高清| 免费高清在线观看日韩| www.精华液| 亚洲精品一卡2卡三卡4卡5卡 | 成人国产av品久久久| 秋霞在线观看毛片| 在线天堂中文资源库| 女警被强在线播放| 人妻人人澡人人爽人人| 久久精品国产亚洲av香蕉五月 | 最近最新中文字幕大全免费视频| 久久国产精品人妻蜜桃| 999久久久国产精品视频| 亚洲人成77777在线视频| 欧美黄色淫秽网站| 又紧又爽又黄一区二区| 视频区欧美日本亚洲| 99热网站在线观看| 欧美性长视频在线观看| 亚洲成人国产一区在线观看| 久久久精品国产亚洲av高清涩受| 美女国产高潮福利片在线看| 精品乱码久久久久久99久播| tocl精华| 91精品国产国语对白视频| 黑人巨大精品欧美一区二区蜜桃| 大型av网站在线播放| 国产精品 欧美亚洲| 麻豆乱淫一区二区| 视频区欧美日本亚洲| 国产97色在线日韩免费| 女性被躁到高潮视频| 欧美变态另类bdsm刘玥| 国产精品偷伦视频观看了| 亚洲欧美精品综合一区二区三区| 亚洲精品美女久久av网站| 国产国语露脸激情在线看| 在线观看舔阴道视频| 日本欧美视频一区| 国产黄频视频在线观看| 男男h啪啪无遮挡| 自线自在国产av| 午夜福利视频在线观看免费| 免费看十八禁软件| 国产成人精品无人区| 成人黄色视频免费在线看| 视频区图区小说| 国产亚洲午夜精品一区二区久久| av在线播放精品| 亚洲欧美激情在线| 宅男免费午夜| 老鸭窝网址在线观看| 人人妻人人澡人人看| 精品第一国产精品| 建设人人有责人人尽责人人享有的| 在线永久观看黄色视频| 亚洲精品日韩在线中文字幕| 多毛熟女@视频| 女人爽到高潮嗷嗷叫在线视频| 好男人电影高清在线观看| 亚洲av美国av| 大香蕉久久网| 久久天躁狠狠躁夜夜2o2o| 亚洲精品国产色婷婷电影| 国产无遮挡羞羞视频在线观看| 考比视频在线观看| 久久精品成人免费网站| 欧美一级毛片孕妇| 午夜免费鲁丝| 水蜜桃什么品种好| 欧美亚洲日本最大视频资源| 老司机靠b影院| 欧美黑人精品巨大| 国产精品二区激情视频| 黑丝袜美女国产一区| 黄片大片在线免费观看| 午夜久久久在线观看| 咕卡用的链子| 18禁观看日本| 久久久水蜜桃国产精品网| 日韩大码丰满熟妇| 大码成人一级视频| 真人做人爱边吃奶动态| 999精品在线视频| 美女中出高潮动态图| 国产av精品麻豆| 操出白浆在线播放| 国产男女内射视频| 亚洲一区中文字幕在线| 女人被躁到高潮嗷嗷叫费观| 97在线人人人人妻| 男女国产视频网站| 一区二区三区四区激情视频| 一本久久精品| 亚洲精品国产区一区二| 好男人电影高清在线观看| 国产免费av片在线观看野外av| 肉色欧美久久久久久久蜜桃| 精品国产一区二区久久| 50天的宝宝边吃奶边哭怎么回事| 国产精品一区二区精品视频观看| 性色av一级| 人人妻,人人澡人人爽秒播| 国产主播在线观看一区二区| 美女高潮喷水抽搐中文字幕| 十八禁人妻一区二区| svipshipincom国产片| 午夜激情av网站| 丁香六月天网| 波多野结衣一区麻豆| 亚洲欧美一区二区三区久久| 国产欧美日韩精品亚洲av| 可以免费在线观看a视频的电影网站| 亚洲中文字幕日韩| 国产亚洲精品久久久久5区| 久久综合国产亚洲精品| 日韩 欧美 亚洲 中文字幕| 亚洲天堂av无毛| 99国产精品一区二区三区| 亚洲av美国av| 法律面前人人平等表现在哪些方面 | netflix在线观看网站| 久久久精品免费免费高清| 午夜精品久久久久久毛片777| av不卡在线播放| 欧美变态另类bdsm刘玥| 国产成人欧美在线观看 | 下体分泌物呈黄色| www.av在线官网国产| 中文精品一卡2卡3卡4更新| 999久久久精品免费观看国产| 91av网站免费观看| 久久国产亚洲av麻豆专区| 国产淫语在线视频| 少妇人妻久久综合中文| 老汉色∧v一级毛片| 免费女性裸体啪啪无遮挡网站| 精品一区二区三区av网在线观看 | 一本一本久久a久久精品综合妖精| 久久久久久亚洲精品国产蜜桃av| 老熟妇仑乱视频hdxx| 欧美精品一区二区大全| 欧美乱码精品一区二区三区| 19禁男女啪啪无遮挡网站| 美女扒开内裤让男人捅视频| 国产亚洲av片在线观看秒播厂| 嫁个100分男人电影在线观看| 国产在视频线精品| 老汉色av国产亚洲站长工具| www.精华液| 久久精品国产a三级三级三级| 午夜福利在线观看吧| 美女福利国产在线| 欧美黑人欧美精品刺激| 91麻豆av在线| 91成人精品电影| 制服诱惑二区| 一级黄色大片毛片| 亚洲av欧美aⅴ国产| 99久久综合免费| 亚洲成人国产一区在线观看| 亚洲综合色网址| 伊人久久大香线蕉亚洲五| 18在线观看网站| av电影中文网址| 捣出白浆h1v1| 天天躁日日躁夜夜躁夜夜| 久久久精品免费免费高清| 色婷婷av一区二区三区视频| 欧美亚洲日本最大视频资源| 免费高清在线观看视频在线观看| 日韩 亚洲 欧美在线| 美女脱内裤让男人舔精品视频| 黄片播放在线免费| 久久久欧美国产精品| 国产区一区二久久| 久久久久久久大尺度免费视频| 欧美在线一区亚洲| av不卡在线播放| videosex国产| 国产av国产精品国产| 精品亚洲成国产av| 精品国产乱码久久久久久小说| 亚洲五月色婷婷综合| 美女脱内裤让男人舔精品视频| 看免费av毛片| 亚洲视频免费观看视频| 法律面前人人平等表现在哪些方面 | 国产成人精品无人区| 亚洲 欧美一区二区三区| 国产主播在线观看一区二区| 欧美一级毛片孕妇| 国产在线一区二区三区精| 国产色视频综合| 成年人午夜在线观看视频| 90打野战视频偷拍视频| 啦啦啦视频在线资源免费观看| 一区福利在线观看| 18禁裸乳无遮挡动漫免费视频| 12—13女人毛片做爰片一| av超薄肉色丝袜交足视频| 一本久久精品| 国产免费现黄频在线看| 久久 成人 亚洲| 91麻豆精品激情在线观看国产 | 人妻一区二区av| 亚洲avbb在线观看| 在线精品无人区一区二区三| 久久精品亚洲av国产电影网| 国产亚洲午夜精品一区二区久久| 国产97色在线日韩免费| 国产精品一区二区精品视频观看| 视频区欧美日本亚洲| 国产97色在线日韩免费| 国产日韩欧美视频二区| 999精品在线视频| 午夜福利免费观看在线| 一区二区三区精品91| 热re99久久国产66热| 国产深夜福利视频在线观看| 亚洲黑人精品在线| 精品久久蜜臀av无| 9热在线视频观看99| 日本精品一区二区三区蜜桃| 免费在线观看黄色视频的| 99久久99久久久精品蜜桃| 手机成人av网站| 欧美在线黄色| 国产亚洲精品久久久久5区| 亚洲国产欧美在线一区| 精品福利观看| 无遮挡黄片免费观看| av超薄肉色丝袜交足视频| www.精华液| 又紧又爽又黄一区二区| 亚洲男人天堂网一区| 女人精品久久久久毛片| 激情视频va一区二区三区| 99re6热这里在线精品视频| 性少妇av在线| 欧美 亚洲 国产 日韩一| 人人妻人人爽人人添夜夜欢视频| 波多野结衣一区麻豆| av又黄又爽大尺度在线免费看| 又大又爽又粗| 亚洲欧洲日产国产| 久久久久久人人人人人| 国产一区二区三区在线臀色熟女 | 欧美日韩一级在线毛片| 一本久久精品| 91麻豆精品激情在线观看国产 | 99国产精品99久久久久| 国产又爽黄色视频| 青草久久国产| 精品少妇内射三级| 午夜福利乱码中文字幕| 亚洲人成电影免费在线| 国产老妇伦熟女老妇高清| 国产欧美日韩精品亚洲av| 午夜激情久久久久久久| 亚洲国产欧美日韩在线播放| 免费女性裸体啪啪无遮挡网站| 国产免费一区二区三区四区乱码| 精品国产一区二区三区久久久樱花| 精品国内亚洲2022精品成人 | 婷婷成人精品国产| 别揉我奶头~嗯~啊~动态视频 | 日本vs欧美在线观看视频| 亚洲 国产 在线| 香蕉国产在线看| 精品国产超薄肉色丝袜足j| 又大又爽又粗| 不卡一级毛片| 最黄视频免费看| 成人av一区二区三区在线看 | 久久人人97超碰香蕉20202| 一区在线观看完整版| 欧美亚洲日本最大视频资源| 免费在线观看黄色视频的| 亚洲国产成人一精品久久久| 国产精品秋霞免费鲁丝片| 国产深夜福利视频在线观看| 国产成人免费观看mmmm| 国产日韩欧美在线精品| 大片电影免费在线观看免费| 日韩欧美一区视频在线观看| 一级毛片电影观看| 亚洲专区中文字幕在线| 久久精品aⅴ一区二区三区四区| 亚洲国产欧美日韩在线播放| 99re6热这里在线精品视频| 人人妻人人澡人人看| 婷婷成人精品国产| 亚洲激情五月婷婷啪啪| 不卡av一区二区三区| 美女午夜性视频免费| 制服诱惑二区| 99国产精品一区二区三区| 女人高潮潮喷娇喘18禁视频| 欧美在线一区亚洲| 黑人猛操日本美女一级片| 亚洲精品成人av观看孕妇| 天天添夜夜摸| 各种免费的搞黄视频| 欧美 亚洲 国产 日韩一| 国产真人三级小视频在线观看| 满18在线观看网站| 亚洲国产中文字幕在线视频| 水蜜桃什么品种好| 久久中文看片网| 免费观看a级毛片全部| 久久 成人 亚洲| 女人高潮潮喷娇喘18禁视频| 男女之事视频高清在线观看| 91麻豆av在线| 久久久久网色| 两个人免费观看高清视频| 麻豆av在线久日| 午夜久久久在线观看| 一级黄色大片毛片| 中文字幕人妻丝袜一区二区| 免费女性裸体啪啪无遮挡网站| 久久久久久亚洲精品国产蜜桃av| 中文字幕av电影在线播放| 久久久久久久大尺度免费视频| 国产欧美亚洲国产| 女警被强在线播放| 国产在视频线精品| 国产精品香港三级国产av潘金莲| 老鸭窝网址在线观看| 人人澡人人妻人| 自线自在国产av| 天天添夜夜摸| 美女扒开内裤让男人捅视频| 久久人人爽人人片av| 十八禁网站免费在线| 69精品国产乱码久久久| 午夜91福利影院| 久久亚洲国产成人精品v| 亚洲成国产人片在线观看| 男人舔女人的私密视频| 免费人妻精品一区二区三区视频| 高清在线国产一区| 丁香六月天网| 午夜老司机福利片| 一区二区三区激情视频| 在线天堂中文资源库| 50天的宝宝边吃奶边哭怎么回事| 国产精品久久久人人做人人爽| 亚洲国产欧美在线一区| 亚洲精品国产av蜜桃| 制服诱惑二区| 亚洲中文字幕日韩| 狠狠狠狠99中文字幕| 91精品伊人久久大香线蕉| 19禁男女啪啪无遮挡网站| 国产高清国产精品国产三级| 精品人妻在线不人妻| 成人国语在线视频| 悠悠久久av| 午夜福利在线观看吧| 精品福利观看| 亚洲一码二码三码区别大吗| 咕卡用的链子| 久久国产精品大桥未久av| 精品久久久精品久久久| 丝袜美腿诱惑在线| 精品少妇久久久久久888优播| 欧美黄色片欧美黄色片| 丰满迷人的少妇在线观看| 久久毛片免费看一区二区三区| 国产激情久久老熟女| 国产xxxxx性猛交| 国产成人免费观看mmmm| av线在线观看网站| 国产欧美日韩综合在线一区二区| 亚洲精品国产区一区二| 成人手机av| 一级a爱视频在线免费观看| 男女下面插进去视频免费观看| 久久精品亚洲熟妇少妇任你| 中文字幕人妻丝袜制服| 国产成+人综合+亚洲专区| 亚洲性夜色夜夜综合| 午夜精品国产一区二区电影| 一区二区三区精品91| 97精品久久久久久久久久精品| 精品免费久久久久久久清纯 | 大型av网站在线播放| www日本在线高清视频| 国产免费福利视频在线观看| 一本综合久久免费| 香蕉丝袜av| 久久精品亚洲熟妇少妇任你| 精品免费久久久久久久清纯 | e午夜精品久久久久久久| 久久人人97超碰香蕉20202| 在线观看免费午夜福利视频| √禁漫天堂资源中文www| a级毛片黄视频| 免费观看人在逋| 一级毛片精品| www.999成人在线观看| 国产区一区二久久| 久久久久久久国产电影| 日本av免费视频播放| 精品国产乱码久久久久久小说| 超碰97精品在线观看| 国产精品偷伦视频观看了| 韩国高清视频一区二区三区| 国产黄色免费在线视频| a级毛片黄视频| 精品免费久久久久久久清纯 | 高清黄色对白视频在线免费看| 人妻人人澡人人爽人人| 亚洲精品粉嫩美女一区| 久久久久久久久免费视频了| 久久天堂一区二区三区四区| 国产高清国产精品国产三级| 国产又色又爽无遮挡免| 久久午夜综合久久蜜桃| 热99久久久久精品小说推荐| 国产成人影院久久av| 激情视频va一区二区三区| 成人手机av| 婷婷成人精品国产| 欧美日韩一级在线毛片| 999久久久国产精品视频| 亚洲国产av新网站| 涩涩av久久男人的天堂| 免费在线观看黄色视频的| 一边摸一边做爽爽视频免费| 亚洲av国产av综合av卡| 动漫黄色视频在线观看| 久久精品成人免费网站| 在线 av 中文字幕| 亚洲国产欧美一区二区综合| 人妻人人澡人人爽人人| 久久久久精品人妻al黑| 国产成人a∨麻豆精品| 国产男女超爽视频在线观看| 高清欧美精品videossex| 国产福利在线免费观看视频| 热99国产精品久久久久久7| 桃花免费在线播放| 97在线人人人人妻| e午夜精品久久久久久久| 国产日韩欧美在线精品| 自拍欧美九色日韩亚洲蝌蚪91| 精品视频人人做人人爽| 久久久国产一区二区| 国产精品麻豆人妻色哟哟久久| 欧美另类亚洲清纯唯美| 巨乳人妻的诱惑在线观看| 在线av久久热| 在线观看一区二区三区激情| 亚洲成国产人片在线观看| 精品一品国产午夜福利视频| 2018国产大陆天天弄谢| 1024香蕉在线观看| 脱女人内裤的视频| 美女脱内裤让男人舔精品视频| 一本久久精品| 啪啪无遮挡十八禁网站| 超碰97精品在线观看| 精品一区二区三区四区五区乱码| 国产精品麻豆人妻色哟哟久久| 法律面前人人平等表现在哪些方面 | 欧美av亚洲av综合av国产av| 777米奇影视久久| 国产xxxxx性猛交| 法律面前人人平等表现在哪些方面 | 亚洲欧美一区二区三区黑人| 不卡av一区二区三区| 在线看a的网站| 下体分泌物呈黄色| 国产黄色免费在线视频| 热re99久久精品国产66热6| 69精品国产乱码久久久| 老熟女久久久| 少妇的丰满在线观看| av欧美777| 国产一区二区 视频在线| 国产三级黄色录像| 精品卡一卡二卡四卡免费| 免费观看人在逋| 欧美日韩av久久| 91国产中文字幕| 91字幕亚洲| 狂野欧美激情性xxxx| 久热这里只有精品99| 国产高清国产精品国产三级| 国产一区二区三区综合在线观看| 美女福利国产在线| 香蕉丝袜av| 欧美精品亚洲一区二区| 久久精品亚洲av国产电影网| 久久久久久人人人人人| e午夜精品久久久久久久| 美女午夜性视频免费| 欧美日韩一级在线毛片| 国产高清国产精品国产三级| 蜜桃在线观看..| 男男h啪啪无遮挡| 俄罗斯特黄特色一大片| 在线 av 中文字幕| 色精品久久人妻99蜜桃| 不卡一级毛片| 久久久久久亚洲精品国产蜜桃av| 80岁老熟妇乱子伦牲交| 国精品久久久久久国模美| 亚洲精品中文字幕一二三四区 | 999久久久精品免费观看国产| 夜夜夜夜夜久久久久| 久久久欧美国产精品| 国产成人免费无遮挡视频| cao死你这个sao货| 飞空精品影院首页| 亚洲国产av新网站| 成年动漫av网址| 精品一区二区三区av网在线观看 | 欧美变态另类bdsm刘玥| 精品少妇久久久久久888优播| 香蕉丝袜av| 亚洲熟女毛片儿| 人人妻人人澡人人看| 无遮挡黄片免费观看| 亚洲精品国产色婷婷电影| 亚洲精品美女久久久久99蜜臀| 国产亚洲午夜精品一区二区久久| 高清视频免费观看一区二区| 亚洲专区字幕在线| 久久精品亚洲av国产电影网| 久久精品国产a三级三级三级|