• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution

    2022-12-28 09:52:46XiaoMingChen陳小明LeiChen陳雷andYaLongYan閻亞龍
    Chinese Physics B 2022年12期
    關(guān)鍵詞:亞龍陳雷

    Xiao-Ming Chen(陳小明) Lei Chen(陳雷) and Ya-Long Yan(閻亞龍)

    1Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Beijing Electronic Science and Technology Institute,Beijing 100070,China

    3University of Science and Technology of China,Hefei 230026,China

    Keywords: quantum key distribution,photon number splitting,decoy state,hypothesis testing

    1. Introduction

    Quantum key distribution(QKD)[1–7]is a technique that allows two different remote parties,Alice(the sender)and Bob(the receiver), to share a unconditional secret key. The unconditional security of the key is guaranteed through the laws of quantum mechanics.[8–12]The first ideal QKD protocol was BB84-QKD protocol created by Bennett and Brassard,[1]which needs to employ the perfect single-photon source. Nevertheless, at present, single-photon sources are not available,and a weak coherent photon source is often utilized to replace the single-photon source. Due to adopting the imperfect single-photon sources, an eavesdropper Eve can launch the photon-number-splitting (PNS) attack.[13–30]In the basic PNS attack,Eve intercepts the pulse sent by Alice and detects the photon number of the intercepted pulse. If it is a singlephoton pulse,it will be directly discarded. If it is a multiphoton pulse,one photon will be stored and the rest will be sent to Bob through a weakly attenuated or even lossless channel. Finally,Eve can obtain exactly the same key as Bob by measuring the stored photons according to the basis published by Alice and Bob,which makes the QKD system no longer secure.Specially,a weaker version of PNS attack is one in which the observed values of Alice and Bob change significantly after the attack,[13–15,29]and the stronger PNS attack means that the observed values of Alice and Bob remain unchanged after the attack.[30]The difference between these two types of attacks is the effect on the observed values of Alice and Bob.

    There are numerous protocols proposed to resist the PNS attack, among which the decoy-state method is a highly effective one. In decoy-state QKD,Alice randomly sends pulses from signal source or decoy source,and the only difference between signal source and decoy source is intensity.Importantly,the decoy-state method assumes that Eve could not distinguish the intercepted pulses coming from which source. The existing decoy-state protocols, such as Refs. [31–33], presented a method to defeat the PNS attack. Actually, the decoy-state QKD beats the PNS attack to provide a more accurate method to determine the secure key rate. To be precise, the existing decoy-state method can more closely estimate the lower bound of gain and the upper bound of quantum bit error rate(QBER)of the single-photon signals,and then calculate the secure key rate by using the Gottesman–Lo–L¨utkenhaus–Preskill(GLLP)formula[34]inspired by the idea of the entanglement distillation approach,

    whereqis the basis alignment efficiency depending on the implementation (1/2 for the BB84 protocol),QμandEμare,respectively, the gain and QBER of the signal state,f(Eμ)is the error correction efficiency,H2(x)=?xlog2(x)?(1?x)log2(1?x)is the binary Shannon entropy function,Q1ande1are, respectively, the gain and QBER of single-photon states. Unfortunately,the secure key rate of decoy-state QKD is not high, and most of previous literatures use optimization and joint constraints to improve the key rate.[35–38]We find that the existing decoy-state method still considers that only single-photon pulses can generate secure keys in any case.However,if we can detect the possibility of PNS attack in the channel,multiphoton pulses can also generate secure keys. In this case,there is no doubt that using the above method to estimate secure key rate will waste the keys generated by multiphoton pulses and reduce the efficiency.It should be noted that the ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular,the PNS attack mentioned and detected in this paper is only a weaker version of PNS attack which significantly changes the observed values of Alice and Bob.

    In this work,under the null hypothesis of no weaker version of PNS attackHo1, we first retrieve the lost information,extract a Cauchy distribution statistic and provide a new method to detect the possibility of PNS attack which significantly changes the observed values of legitimate users in the channel,namely,the first test in this paper.Furthermore,given the significance level of the first testα1and the number of the first testm,we interpret the empirical results to verify the correctness of the first test through the NIST Statistical Test Suite,[39]which is called the second test in this paper. If the result is judged to be an attack, the lower bound of the gain and the upper bound of QBER of the single-photon signals will be estimated by the existing decoy-state method,and then the secure key rate will be calculated by the GLLP formula.Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we also give the secure key rate in this case. And the end, the associated experiments we performed also indicate that our method is credible(i.e.,the significance level is 5%).

    2. The scheme

    In this section, we will focus on our scheme to detect the type of PNS attack which significantly changes the observed values of Alice and Bob. Unless otherwise specified,the PNS attacks mentioned in this paper are both the weaker version. For one thing, we describe the first test, a new detection method of weaker PNS attack for decoy-state QKD,which can precisely calculate the error probability of detection. For another, we interpret the empirical results to verify the correctness of the first test,namely,the second test in this paper. We refer specifically to the interpretation of empirical results in section 4.2 of Ref. [39], which is called the second test in our paper. Two scenarios typify events that may occur due to empirical testing. Case 1: The significance level selected for the first test is reasonable, indicating that the first test is correct. Case 2: The significance level selected for the first test is unreasonable,indicating that the first test is wrong.We use the second test to check the correctness of the first test.Finally,according to the judgment result,we will give the corresponding secure key rate.

    2.1. The first test

    In this part, we introduce the new method to detect the PNS attack which significantly changes the observed values of legitimate users in decoy-state QKD via statistical hypothesis testing, which is called the first test in this paper. Then we analyze the type I error of the first test, that is, mistaking no PNS attack for having a PNS attack. The first test contains five steps.

    Identify null and alternative hypothesis Let us consider the hypothesis testing problem about the null hypothesisHo1: there is no weaker version of PNS attack on the channel and the alternative hypothesisHa1: there is a weaker version of PNS attack on the channel.

    Construct the test statistic We need a test statistic to conduct the hypothesis testing. In what follows, the distribution of the test statistic is derived under the null hypothesisHo1.Alice intentionally and randomly selects two weak coherent photon sources with different intensities, after phase randomization,namely,signal source and decoy source. Suppose the intensities of the signal source and the decoy source areμandν,respectively.Pn(μ)denotes the probability of emittingn-photons pulses from the signal source,written as

    The yieldynrepresents the probability of receiving a pulse(at Bob’s side)after Alice emits an-photons pulse. According to Ref. [33], one hasyn ≈nηwhereηis the overall transmission probability of each photon. The gainQis the probability of receiving a pulse (at Bob’s side) after Alice emits a pulse,no matter how many photons which contains. The gain of the signal sourceQμis given by

    Let us consider further about the sending and receiving process between Alice and Bob. When Alice emits a pulse from the signal source, the outcome (at Bob’s side) only includes two cases, that is, receiving it or not. Therefore, the sending and receiving process can be regarded as a Bernoulli trial. Taking the advantage of Eq.(3),we derive the probability that Bob receives the signal pulsep1=μη. Suppose the number of signal pulses Alice emits and that of signal pulses Bob receives areN1andn1,respectively. Next,n1has the binomial distribution with parameters(N1,p1),for short,

    In Ref.[32],we findN1is so large(typically 109to 1010),μandηare approximately 10?2to 10?1and 10?4to 10?3,respectively. Thus,p1is roughly 10?6to 10?4. By the law of large numbers and the central limit theorem, whenN1p1≥5 andN1p1(1?p1)≥5, the binomial distribution with parameters (N1,p1) can be approximately regarded as the normal distribution with meanN1p1and varianceN1p1(1?p1),given by

    Since the only difference between the signal source and the decoy source is their intensities,it is easy to get the other random variableX2by analogy,denoted by

    whereN2andn2are the number of the decoy pulses Alice emits and that of the decoy pulses Bob receives,respectively.p2represents the probability of receiving a decoy pulse (at Bob’s side) after Alice emits a decoy pulse, no matter how many photons which contains and the value ofp2isνη. According to the definition oftdistribution,let the random variableY=X1/X2, thenYobeys thetdistribution with a single degree of freedom,which is equivalent to the standard Cauchy distribution,that is,

    whereyis the value ofYand is also the test statistic that we find.

    Find the value of the test statistic Set the parametersμ,ν,N1,N2,andη,then recordn1andn2. Substituting these data into Eq.(9),the desired value of the test statisticycan be obtained.

    Choose a significance level We need to determine a significance level (typically 0.05) for the first test. In terms of the null hypothesis of the first testHo1, we deduce that the first test is a two-tailed hypothesis testing. In addition, given the significance level of the first testα1, the rejection region is|y|≥y[1?α1/2]wherey[1?α1/2]can be obtained by Eq.(10).More precisely,the variables?y[1?α1/2]andy[1?α1/2]refer to the boundary values between the rejection region and the acceptance region for the first test. Let the left side of Eq. (10)is equal toα1/2, then the upper limit of the integral will be?y[1?α1/2]. According to the symmetry of the probability density function of the Cauchy distribution,y[1?α1/2]can be obtained.

    Make a decision Compare the test statisticywith the critical valuesy[1?α1/2]and?y[1?α1/2]. Ify>y[1?α1/2]ory

    2.2. The second test

    The interpretation of empirical results can be conducted in any number of ways. Two approaches NIST adopted include(1)the examination of the proportion of passing the first test and (2) the distribution ofP-values to check for uniformity. We adopt the first approach of NIST, which considers the empirical results of the first test and calculates the passing proportion of the first test. In this part,given the significance level of the first testα1and the number of the first testm,we account for the empirical results to check the correctness of the first test via the NIST Statistical Test Suite, according to illustrating the reasonability of the counting rate of acceptingHo1,which is called the second test in this paper. The specific analysis is as follows. Given the significance level of the second test, if the passing proportion of the first test passes the second test,the first test is proved to be correct;otherwise,the first test is proved to be wrong. The second test also contains five steps.

    Identify null and alternative hypothesis Under the significance level of the first testα1and the number of the first testm,let us consider the hypothesis testing problem about the null hypothesisHo2: the counting rate of acceptingHo1with the first test is reasonable and the alternative hypothesisHa2:the counting rate of acceptingHo1with the first test is unreasonable.

    Construct the test statistic Supposing that each first test is independent and identically distributed,the confidence level of the first test isq=1?α1. Let us consider further about the first test. The results contain two cases,namely,acceptingHo1or rejectingHo1. Thereby, one can regard each first test as a Bernoulli trial. Note that the probability of acceptingHo1isq. Suppose the number of the first test and that of acceptingHo1aremandξ,respectively.mis the times that the first hypothesis testing procedure is repeated. The value ofmis set by the experimenter himself. If the experimental conditions permit(i.e.,a fast enough repetition rates),the larger the value ofm, the better the result.ξrefers to the times of accepting hypothesisHo1when we repeat the first testmtimes. That is to say,for each first test executed,if the test result is accepting hypothesisHo1,the value ofξwill be increased by one. Then,ξwill obey the binomial distribution with parameters (m,q),for short,

    Whenmq ≥5 andmq(1?q)≥5,by the law of large numbers and the central limit theorem, the binomial distribution with parameters(m,q)can be approximatively regarded as the normal distribution with meanmqand variancemq(1?q),written as

    wherezis the value ofZand is just the test statistic that we find.

    Find the value of the test statistic Selectmand recordξ. Substituting these data into Eq.(13),one can get the value of the test statisticz.

    Choose a significance level We need to choose a significance levelα2(typically,α1=α2) for the second test.According to the null hypothesis of the second testHo2, we deduce that the second test is a two-tailed hypothesis testing.The rejection region of the second test is|z|≥z[1?α2/2]wherez[1?α2/2]can be obtained by Eq.(14). More precisely,the variables?z[1?α2/2]andz[1?α2/2]refer to the boundary values between the rejection region and the acceptance region for the second test. Let the left side of Eq. (14) be equal toα2/2,the upper limit of the integral will be?z[1?α2/2]. According to the symmetry of the probability density function of the normal distribution,z[1?α2/2]can be obtained.

    Make a decision Compare the test statisticzwith the critical valuesz[1?α2/2]and?z[1?α2/2]. Ifz>z[1?α2/2]orz

    If the result is judged to be an attack,the lower bound ofQ1and the upper bound ofe1will be estimated by the existing decoy-state method,and then the secure key rate will be calculated by Eq.(1). If the result is no attack,then the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys. Under the assumption that the bit error is equal to the phase error even for multiphoton pulses, the secure key rate formula Eq.(1)becomes

    By comparing Eqs. (1) and (15), we can easily see the improvement of the secure key rate.

    3. Experiments and analysis

    In the preceding section, we show the details of our detection method. Now,we move forward to the corresponding experiments based on the aforementioned method and analyze the experimental results. The experimental setup is based on the platform of polarization encoding decoy-state BB84 implementation, with commercial compact devices at 625 MHz clock rate,[40,41]with some different parameters such as the wavelength and mean photon numbers. The mean photon numbers of the signal state and decoy state are typical around 0.4 and 0.1,respectively.[42]The block size for parameter estimation is set to 500 kbits to guarantee the freshness of final keys.[41,43]Meanwhile,ηis set to a typical value 10?3,which contains a typical detection efficiency of 10%and a transmittance of 1%with a 100 km-length fiber.[40]

    3.1. The first test

    The experimental parameters and their corresponding values of the first test are listed in Table 1. After calculation,we obtain the value of the test statisticy=4.90. When the significance level of the first testα1=0.05, the critical values arey[1?α1/2]=12.71 and?y[1?α1/2]=?12.71. Due to?12.71<4.90<12.71, the test statistic does not fall inside the rejection region and we fail to rejectHo1. In other words,we infer that there is no weaker version of PNS attack on the channel and the probability of being wrong is no more than 5%. The schematic diagram of the first test is illustrated in Fig.1.

    Table 1. Experimental parameters and their corresponding values of the first test.

    Fig.1. The schematic diagram of the first test. The value of the test statistic y is 4.90. Given the significance level of the first test α1=0.05,the critical values are y[1?α1/2]=12.71 and ?y[1?α1/2]=?12.71.

    3.2. The second test

    In this part, we interpret the empirical results to check the correctness of the first test via the NIST Statistical Test Suite. The number of the first test and that of acceptingHo1arem=984 andξ=945,respectively. The experimental parameters and their corresponding values of the second test are listed in Table 2. In practical QKD systems, one cannot accurately control the number of signal pulses Alice emitsN1and that of decoy pulses Alice emitsN2. Fortunately,although the values ofN1for each first test are not completely identical,they are very close and have the same order of magnitude.For simplicity, we ignore the effect of the minimal deviation of differentN1and take the same strategy toN2.

    After calculation, we obtain the value of the test statisticz= 1.49. Given the significance level of the second testα2= 0.05, the critical values arez[1?α2/2]= 1.96 and?z[1?α2/2]=?1.96. Since?1.96< 1.49< 1.96, the test statistic does not fall inside the rejection region and we fail to rejectHo2. This means that the counting rate of acceptingHo1is reasonable, and also further affirms the correctness of our method. That is to say,under the null hypothesis of no weaker version of PNS attack, we can judge there is no weaker version of PNS attack on the channel with an error probability of less than 5%. And then we can use Eq. (15) to calculate the secure key rate. The schematic diagram of the second test is illustrated in Fig.2.

    Table 2. Experimental parameters and their corresponding values of the second test.

    Fig. 2. The schematic diagram of the second test. The value of the test statistic z is 1.49. Given the significance level of the second test α2=0.05,the critical values are z[1?α2/2]=1.96 and ?z[1?α2/2]=?1.96.

    4. Conclusion and discussion

    In summary, we first recover the lost information of the existing decoy-state protocols when detecting the type of PNS attack which significantly changes the observed values of Alice and Bob, and extract out a Cauchy distribution statistic.Based on this information,we propose a new detection method including the first test and the second test. Most importantly,the error probability of detection can be precisely calculated in our method and we also give the calculations. Finally,according to the judgment result, we give the corresponding secure key rate. In particular,compared with the existing decoy-state protocols,the secure key rate with our method has a great improvement if the judgment result is no attack. Meanwhile,the associated experiments we performed also verify the correctness of our scheme. Nevertheless,all judgment results in this paper are obtained under the condition that the null hypothesis is no weaker version of PNS attack, which significantly changes the observed values of legitimate users. In other words,the gain of signal state or decoy state will change significantly after the type of PNS attack.[13–15,29]However, we can do nothing about stronger PNS attacks that retain the gain of signal state and decoy state,such as partial PNS attacks,[30]because the premise of the derivation no longer holds,and the type II error probability of our method in this case will be insufferable even close to unity. It should be noted that the ultimate goal of this line of research is to confirm that there are no all types of PNS attacks. For this reason, compared with the existing decoy-state methods[31–33]to directly estimate the secure key rate,our method is not yet able to be directly applied in practice now. But at least we give a new idea to detect the type of PNS attack which significantly changes the observed values of legitimate users,and improve the secure key rate and efficiency.

    As for future work, one direction is to extend our approach to resist stronger version of PNS attacks.[30]In addition, in the absence of weaker version of PNS attack, since the distribution of the photon numbers received by Bob is approximated with a normal distribution,except that the ratio of two independent random variables obeying the standard normal distribution obeys a Cauchy distribution used in the paper,we can also use the conclusion that the sum ofnindependent random variables obeying the normal distribution still obeys a normal distribution or that the sum of squares ofnindependent random variables obeying the standard normal distribution still obeys a chi-square distribution ofndegrees of freedom,to determine whether there is an attack and to calculate the type I error probability. It can be seen from the above analysis that our method can also be applied to other protocols containing more than one decoy state. Therefore,the other direction is to extend our method to other decoy-state QKD protocols, such as three different intensities of coherent photon source[36,44,45]and four different intensities of coherent photon source.[35]

    猜你喜歡
    亞龍陳雷
    潘諾尼亞龍 板踝龍——向淡水進(jìn)發(fā)
    Numerical simulation study of ionization characteristics of argon dielectric barrier discharge
    冷靜是一種智慧,寬恕是一種力量
    船舶上層建筑建造工藝探討
    陳雷膠漆
    偷拍鏡頭
    時(shí)尚“吃播”陳雷:邊吃邊秀邊掙錢
    陳雷講“三嚴(yán)三實(shí)”專題黨課
    陳雷主持召開全國(guó)水庫(kù)安全度汛視頻會(huì)議
    老牌亞龍的嶄新活力
    757午夜福利合集在线观看| 久久久久久久精品吃奶| 给我免费播放毛片高清在线观看| 精品久久久久久成人av| 在线十欧美十亚洲十日本专区| 中文亚洲av片在线观看爽| 日韩成人在线观看一区二区三区| 九色成人免费人妻av| 精品久久久久久久末码| 精品无人区乱码1区二区| 国产色爽女视频免费观看| 婷婷亚洲欧美| 色在线成人网| 亚洲av一区综合| 亚洲人成电影免费在线| 国产 一区 欧美 日韩| 国产精品亚洲美女久久久| 我的老师免费观看完整版| 久久久成人免费电影| 哪里可以看免费的av片| 好男人在线观看高清免费视频| www国产在线视频色| 一级毛片女人18水好多| 在线天堂最新版资源| 日韩欧美国产一区二区入口| 国产精品爽爽va在线观看网站| 久久午夜亚洲精品久久| 国产久久久一区二区三区| 无限看片的www在线观看| 在线观看av片永久免费下载| 国产一区二区亚洲精品在线观看| 美女 人体艺术 gogo| 高潮久久久久久久久久久不卡| 久久香蕉精品热| 国产精品香港三级国产av潘金莲| 啪啪无遮挡十八禁网站| 日本三级黄在线观看| 国产探花极品一区二区| 午夜福利在线在线| 久久精品综合一区二区三区| 午夜激情欧美在线| 18+在线观看网站| 国产高潮美女av| 精品乱码久久久久久99久播| 久久九九热精品免费| 精品久久久久久久久久久久久| 757午夜福利合集在线观看| 午夜福利18| 精品久久久久久久毛片微露脸| 亚洲国产色片| 在线国产一区二区在线| 波多野结衣高清无吗| 国产欧美日韩精品亚洲av| 最后的刺客免费高清国语| 亚洲第一电影网av| 久久香蕉精品热| 国产精品久久久久久精品电影| 欧美激情在线99| 少妇的丰满在线观看| 中文字幕高清在线视频| 亚洲精品在线观看二区| 99国产综合亚洲精品| 狂野欧美白嫩少妇大欣赏| 看免费av毛片| 日韩精品青青久久久久久| 天堂√8在线中文| 毛片女人毛片| 国产精品电影一区二区三区| 亚洲中文字幕一区二区三区有码在线看| 日韩欧美一区二区三区在线观看| www.www免费av| 国产精品永久免费网站| 国产视频一区二区在线看| 亚洲美女视频黄频| 午夜老司机福利剧场| 国产成人啪精品午夜网站| 成人高潮视频无遮挡免费网站| 精品人妻1区二区| 久久久久久大精品| 免费在线观看成人毛片| 欧美乱码精品一区二区三区| 丁香欧美五月| 国产高清有码在线观看视频| 亚洲精品乱码久久久v下载方式 | 99国产精品一区二区蜜桃av| 欧洲精品卡2卡3卡4卡5卡区| 国产精品一区二区三区四区免费观看 | 亚洲内射少妇av| tocl精华| 中文字幕高清在线视频| av国产免费在线观看| 制服丝袜大香蕉在线| 美女高潮的动态| 国产熟女xx| 2021天堂中文幕一二区在线观| 中文字幕熟女人妻在线| 亚洲第一欧美日韩一区二区三区| 特级一级黄色大片| 91av网一区二区| 制服丝袜大香蕉在线| 老司机福利观看| 欧美绝顶高潮抽搐喷水| 国产不卡一卡二| 久久6这里有精品| av片东京热男人的天堂| 在线十欧美十亚洲十日本专区| 国产高清激情床上av| 亚洲五月天丁香| 精品久久久久久久久久久久久| 久久香蕉精品热| 99精品欧美一区二区三区四区| 欧美乱妇无乱码| 夜夜躁狠狠躁天天躁| 亚洲一区二区三区色噜噜| 亚洲国产欧洲综合997久久,| 国产中年淑女户外野战色| av专区在线播放| 91字幕亚洲| 综合色av麻豆| 精品日产1卡2卡| 欧美不卡视频在线免费观看| 99热只有精品国产| bbb黄色大片| 亚洲国产欧美网| 日本五十路高清| 18禁在线播放成人免费| 内地一区二区视频在线| 成年女人看的毛片在线观看| 黄片大片在线免费观看| 日日夜夜操网爽| 亚洲精品在线观看二区| 日日干狠狠操夜夜爽| 精品久久久久久成人av| 99视频精品全部免费 在线| 欧美黑人欧美精品刺激| 亚洲国产色片| 一本综合久久免费| 最新中文字幕久久久久| 久久九九热精品免费| 黄色丝袜av网址大全| 日本成人三级电影网站| 国产精品一区二区三区四区久久| 在线免费观看不下载黄p国产 | 欧美中文综合在线视频| 亚洲成人免费电影在线观看| 亚洲无线在线观看| 精品日产1卡2卡| 精品不卡国产一区二区三区| 国产一区二区亚洲精品在线观看| 久久久国产成人精品二区| 亚洲va日本ⅴa欧美va伊人久久| 一级a爱片免费观看的视频| 99国产精品一区二区蜜桃av| 真实男女啪啪啪动态图| 男女午夜视频在线观看| 中国美女看黄片| 99热这里只有是精品50| 99视频精品全部免费 在线| 国产av不卡久久| 亚洲人与动物交配视频| 国产伦精品一区二区三区四那| 国产精品影院久久| 亚洲精品久久国产高清桃花| 黑人欧美特级aaaaaa片| ponron亚洲| 黄色视频,在线免费观看| 老司机午夜福利在线观看视频| 免费无遮挡裸体视频| 久久精品国产清高在天天线| 热99re8久久精品国产| 久久久久免费精品人妻一区二区| 久久99热这里只有精品18| 久久久色成人| 两性午夜刺激爽爽歪歪视频在线观看| 宅男免费午夜| 久久久国产成人精品二区| av福利片在线观看| 十八禁网站免费在线| 午夜激情福利司机影院| 少妇熟女aⅴ在线视频| 久久久成人免费电影| 亚洲国产色片| 成人亚洲精品av一区二区| 国产亚洲精品一区二区www| 成人高潮视频无遮挡免费网站| 色哟哟哟哟哟哟| 欧美bdsm另类| 天天添夜夜摸| 欧美极品一区二区三区四区| 此物有八面人人有两片| 最近最新免费中文字幕在线| 人人妻人人看人人澡| 色噜噜av男人的天堂激情| 给我免费播放毛片高清在线观看| 久久精品国产亚洲av涩爱 | 亚洲欧美一区二区三区黑人| 成人一区二区视频在线观看| 久久这里只有精品中国| 一级黄片播放器| 免费无遮挡裸体视频| АⅤ资源中文在线天堂| 亚洲avbb在线观看| 午夜福利高清视频| 日本一二三区视频观看| 在线播放无遮挡| 久久精品国产亚洲av香蕉五月| 欧美日韩一级在线毛片| 全区人妻精品视频| 亚洲七黄色美女视频| 亚洲人成网站高清观看| 亚洲乱码一区二区免费版| 国产精品久久视频播放| 亚洲在线观看片| 久久精品91蜜桃| 亚洲国产欧洲综合997久久,| 麻豆成人午夜福利视频| 91在线观看av| 少妇丰满av| 国产成人影院久久av| 亚洲男人的天堂狠狠| 亚洲欧美日韩东京热| 18禁国产床啪视频网站| 91麻豆av在线| 亚洲av成人不卡在线观看播放网| 男人的好看免费观看在线视频| 国产亚洲精品综合一区在线观看| 中文字幕人妻丝袜一区二区| 老司机午夜十八禁免费视频| 日韩中文字幕欧美一区二区| 国产精品爽爽va在线观看网站| 欧美日韩亚洲国产一区二区在线观看| 国产乱人视频| 国产精华一区二区三区| 久久精品国产亚洲av涩爱 | 最近最新免费中文字幕在线| 精品99又大又爽又粗少妇毛片 | 久久婷婷人人爽人人干人人爱| 亚洲人成网站在线播放欧美日韩| 欧美高清成人免费视频www| 免费人成在线观看视频色| 99riav亚洲国产免费| 69av精品久久久久久| 在线观看美女被高潮喷水网站 | 欧美日韩精品网址| 国产精品一区二区三区四区免费观看 | 在线播放无遮挡| 精品午夜福利视频在线观看一区| 一区二区三区高清视频在线| 熟女电影av网| av天堂中文字幕网| 美女免费视频网站| 国产精品免费一区二区三区在线| 亚洲av免费在线观看| 亚洲av一区综合| 日韩欧美 国产精品| netflix在线观看网站| 脱女人内裤的视频| 欧美高清成人免费视频www| 又紧又爽又黄一区二区| 好男人电影高清在线观看| 3wmmmm亚洲av在线观看| 国产三级在线视频| 国产日本99.免费观看| 久9热在线精品视频| 一个人看的www免费观看视频| 国产精品电影一区二区三区| 757午夜福利合集在线观看| 亚洲一区二区三区色噜噜| 88av欧美| 免费搜索国产男女视频| 午夜福利成人在线免费观看| 色老头精品视频在线观看| 1000部很黄的大片| 亚洲电影在线观看av| 欧美在线黄色| 黄片小视频在线播放| 中文字幕人妻丝袜一区二区| 久久精品91无色码中文字幕| 别揉我奶头~嗯~啊~动态视频| 特大巨黑吊av在线直播| 丰满人妻熟妇乱又伦精品不卡| 非洲黑人性xxxx精品又粗又长| e午夜精品久久久久久久| 内地一区二区视频在线| 午夜激情福利司机影院| 观看免费一级毛片| 偷拍熟女少妇极品色| 首页视频小说图片口味搜索| 十八禁人妻一区二区| 亚洲精品久久国产高清桃花| 国产精品精品国产色婷婷| 亚洲精品久久国产高清桃花| 欧美成人a在线观看| 俺也久久电影网| www国产在线视频色| 天堂影院成人在线观看| 亚洲午夜理论影院| av中文乱码字幕在线| 嫁个100分男人电影在线观看| 一级毛片女人18水好多| 他把我摸到了高潮在线观看| 国产精品美女特级片免费视频播放器| 免费人成在线观看视频色| 少妇丰满av| 亚洲欧美日韩高清专用| 在线观看66精品国产| 国产国拍精品亚洲av在线观看 | 天堂√8在线中文| av视频在线观看入口| 性色avwww在线观看| 在线天堂最新版资源| 午夜两性在线视频| 国产午夜精品久久久久久一区二区三区 | 亚洲av五月六月丁香网| 一区二区三区激情视频| 九九在线视频观看精品| 亚洲av成人av| 亚洲avbb在线观看| 久久久久亚洲av毛片大全| 美女cb高潮喷水在线观看| 韩国av一区二区三区四区| 国产欧美日韩一区二区三| 1024手机看黄色片| 欧美绝顶高潮抽搐喷水| 国产一区二区三区在线臀色熟女| 国产在视频线在精品| 久久久久亚洲av毛片大全| www.www免费av| 啦啦啦观看免费观看视频高清| 黄色日韩在线| 亚洲av五月六月丁香网| 两个人的视频大全免费| 法律面前人人平等表现在哪些方面| 黄色片一级片一级黄色片| 日本黄色片子视频| 无人区码免费观看不卡| 亚洲国产欧美网| 日本成人三级电影网站| 亚洲国产高清在线一区二区三| 成人国产一区最新在线观看| 日韩欧美三级三区| 淫秽高清视频在线观看| 国产欧美日韩一区二区精品| 真人做人爱边吃奶动态| 最好的美女福利视频网| 亚洲,欧美精品.| 亚洲欧美日韩卡通动漫| 久久草成人影院| 在线国产一区二区在线| 1000部很黄的大片| 久久久久久久久大av| 欧美成人a在线观看| 麻豆成人午夜福利视频| 一级a爱片免费观看的视频| 亚洲人成网站在线播放欧美日韩| av国产免费在线观看| 老汉色av国产亚洲站长工具| 欧美激情在线99| 亚洲在线观看片| 全区人妻精品视频| 免费av毛片视频| 亚洲性夜色夜夜综合| 免费观看的影片在线观看| 青草久久国产| 亚洲欧美一区二区三区黑人| 精品午夜福利视频在线观看一区| 亚洲成人免费电影在线观看| 深夜精品福利| 亚洲黑人精品在线| 国产在视频线在精品| 国产午夜福利久久久久久| 一二三四社区在线视频社区8| 给我免费播放毛片高清在线观看| 日韩大尺度精品在线看网址| 一本综合久久免费| 精品人妻偷拍中文字幕| 国产欧美日韩一区二区三| 亚洲av第一区精品v没综合| 在线看三级毛片| 熟妇人妻久久中文字幕3abv| 国产野战对白在线观看| 一个人免费在线观看电影| 老司机午夜福利在线观看视频| 亚洲最大成人中文| 国产蜜桃级精品一区二区三区| 一区二区三区免费毛片| 精品人妻一区二区三区麻豆 | 免费人成在线观看视频色| 人妻夜夜爽99麻豆av| 国产精品日韩av在线免费观看| 欧美黑人巨大hd| 老司机午夜十八禁免费视频| 精品久久久久久久久久免费视频| 日韩中文字幕欧美一区二区| 一个人免费在线观看电影| 欧美日韩国产亚洲二区| 久久久久久大精品| 国产又黄又爽又无遮挡在线| 一级a爱片免费观看的视频| 亚洲人与动物交配视频| 国产免费一级a男人的天堂| 国产精品久久视频播放| 天堂av国产一区二区熟女人妻| 国产欧美日韩精品亚洲av| svipshipincom国产片| 午夜影院日韩av| 亚洲人成电影免费在线| 久久国产精品影院| 国产精品嫩草影院av在线观看 | 久久午夜亚洲精品久久| 女同久久另类99精品国产91| 69av精品久久久久久| 国产精品 欧美亚洲| 日韩欧美在线乱码| 国产精品影院久久| 亚洲,欧美精品.| 91久久精品国产一区二区成人 | www.熟女人妻精品国产| 又黄又爽又免费观看的视频| 日韩欧美一区二区三区在线观看| 欧美性猛交黑人性爽| 久久久久国内视频| 男女视频在线观看网站免费| 国产高清videossex| 亚洲无线观看免费| 一进一出抽搐gif免费好疼| 夜夜爽天天搞| 老司机深夜福利视频在线观看| 亚洲七黄色美女视频| 欧美日本视频| 久久久久久国产a免费观看| 久久久精品大字幕| 亚洲av美国av| 日本三级黄在线观看| 亚洲国产精品999在线| 欧美黄色淫秽网站| 欧美又色又爽又黄视频| 在线观看免费午夜福利视频| 婷婷精品国产亚洲av在线| 成年人黄色毛片网站| 国内精品一区二区在线观看| 噜噜噜噜噜久久久久久91| 国产精品亚洲美女久久久| 国产精品爽爽va在线观看网站| 脱女人内裤的视频| 宅男免费午夜| 窝窝影院91人妻| 国产精品一区二区三区四区久久| 法律面前人人平等表现在哪些方面| 亚洲av二区三区四区| 亚洲内射少妇av| 久久久久久久亚洲中文字幕 | 久久久久亚洲av毛片大全| 免费观看的影片在线观看| 又紧又爽又黄一区二区| 欧美中文综合在线视频| 久久久久久九九精品二区国产| 给我免费播放毛片高清在线观看| 国产视频一区二区在线看| 精品一区二区三区视频在线 | 免费搜索国产男女视频| 变态另类成人亚洲欧美熟女| 俄罗斯特黄特色一大片| 黑人欧美特级aaaaaa片| 久久欧美精品欧美久久欧美| 少妇裸体淫交视频免费看高清| 亚洲第一电影网av| 日韩成人在线观看一区二区三区| 99riav亚洲国产免费| 我的老师免费观看完整版| 午夜激情欧美在线| 男女午夜视频在线观看| 内地一区二区视频在线| 大型黄色视频在线免费观看| 禁无遮挡网站| 成人精品一区二区免费| 亚洲国产精品999在线| 99在线视频只有这里精品首页| 成人一区二区视频在线观看| 欧美+亚洲+日韩+国产| 久久香蕉国产精品| 黄色丝袜av网址大全| 亚洲一区二区三区色噜噜| 成年女人永久免费观看视频| 熟女人妻精品中文字幕| 亚洲欧美日韩东京热| 亚洲七黄色美女视频| 免费看光身美女| 在线观看午夜福利视频| 网址你懂的国产日韩在线| 欧美成人一区二区免费高清观看| 一个人看视频在线观看www免费 | 窝窝影院91人妻| 成年女人永久免费观看视频| 免费看光身美女| 久久精品综合一区二区三区| 成人高潮视频无遮挡免费网站| 亚洲av熟女| 久久香蕉精品热| 桃红色精品国产亚洲av| 老熟妇仑乱视频hdxx| 毛片女人毛片| 精品久久久久久久人妻蜜臀av| 黄色女人牲交| 日韩av在线大香蕉| 精品午夜福利视频在线观看一区| 国产成人av激情在线播放| 日韩欧美 国产精品| 99国产综合亚洲精品| 日韩亚洲欧美综合| 男女那种视频在线观看| 国产三级在线视频| 亚洲人成伊人成综合网2020| 国产精品综合久久久久久久免费| 亚洲av熟女| 啦啦啦韩国在线观看视频| 欧美bdsm另类| 国产成人影院久久av| 脱女人内裤的视频| 日韩欧美精品v在线| 性色avwww在线观看| 99热这里只有是精品50| 两个人的视频大全免费| 久久久精品欧美日韩精品| 国产精品亚洲av一区麻豆| 国产亚洲精品久久久久久毛片| www.www免费av| 精品福利观看| 母亲3免费完整高清在线观看| 色哟哟哟哟哟哟| 在线观看日韩欧美| 国产亚洲精品一区二区www| 男女视频在线观看网站免费| 一区二区三区国产精品乱码| 国产成人福利小说| 天堂av国产一区二区熟女人妻| 亚洲aⅴ乱码一区二区在线播放| 国产精品乱码一区二三区的特点| 日韩欧美精品免费久久 | 色视频www国产| 国产蜜桃级精品一区二区三区| 国产又黄又爽又无遮挡在线| 国产精品av视频在线免费观看| 精品久久久久久成人av| 久久国产乱子伦精品免费另类| 国产中年淑女户外野战色| 日本成人三级电影网站| 女生性感内裤真人,穿戴方法视频| 成年免费大片在线观看| 手机成人av网站| 亚洲av美国av| 精品熟女少妇八av免费久了| 亚洲色图av天堂| 亚洲国产欧美人成| 最新美女视频免费是黄的| 91久久精品电影网| 91久久精品国产一区二区成人 | 精品人妻偷拍中文字幕| 高清毛片免费观看视频网站| 高清在线国产一区| 一区福利在线观看| 国产精品美女特级片免费视频播放器| 精品一区二区三区视频在线观看免费| 日日干狠狠操夜夜爽| 日韩欧美国产在线观看| 99国产极品粉嫩在线观看| 久久九九热精品免费| 又黄又粗又硬又大视频| 日韩欧美一区二区三区在线观看| 亚洲男人的天堂狠狠| 国产一区在线观看成人免费| 美女高潮的动态| 一a级毛片在线观看| 久久人妻av系列| 精品乱码久久久久久99久播| 免费看十八禁软件| 欧美日韩瑟瑟在线播放| 中文字幕人妻丝袜一区二区| av女优亚洲男人天堂| 变态另类成人亚洲欧美熟女| 国内毛片毛片毛片毛片毛片| 可以在线观看毛片的网站| 久久中文看片网| 欧美日韩亚洲国产一区二区在线观看| 国产精品影院久久| 听说在线观看完整版免费高清| 欧美一区二区国产精品久久精品| 亚洲av成人精品一区久久| 国产高清激情床上av| 九色国产91popny在线| 变态另类丝袜制服| 欧美日韩精品网址| 给我免费播放毛片高清在线观看| 又粗又爽又猛毛片免费看| 亚洲国产中文字幕在线视频| 91麻豆精品激情在线观看国产| 精品人妻一区二区三区麻豆 | 日韩精品青青久久久久久| 成年人黄色毛片网站| 国产精品综合久久久久久久免费| 日本 欧美在线| 成人永久免费在线观看视频| 久久久国产精品麻豆| 亚洲第一电影网av| 亚洲国产精品999在线| 午夜精品久久久久久毛片777| 亚洲va日本ⅴa欧美va伊人久久| 黄片小视频在线播放| 99久国产av精品| 午夜免费成人在线视频| 在线观看午夜福利视频| 人人妻人人澡欧美一区二区| 亚洲第一欧美日韩一区二区三区| 久久国产乱子伦精品免费另类| 中文字幕久久专区|