• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient semi-quantum secret sharing protocol using single particles

    2023-09-05 08:47:30DingXing邢丁YifeiWang王藝霏ZhaoDou竇釗JianLi李劍XiuboChen陳秀波andLixiangLi李麗香
    Chinese Physics B 2023年7期
    關(guān)鍵詞:李劍

    Ding Xing(邢丁), Yifei Wang(王藝霏), Zhao Dou(竇釗),?, Jian Li(李劍),Xiubo Chen(陳秀波), and Lixiang Li(李麗香)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Information Security Center,School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China

    Keywords: semi-quantum secret sharing,efficiency,single particles,specific secret,particle reordering

    1.Introduction

    Secret sharing (SS)[1]is a widely used and efficient privacy protection protocol.It allows a dealer to share a secret among many agents,but only if they cooperate can the agents recover the dealer’s secret or they obtain nothing alone.[2–4]However, classical secret sharing (CSS) is unable to address the problem of eavesdropping if it is not combined with other technologies such as encryption,and the introduction of quantum algorithms brings a huge potential threat to classical encryption algorithms.[5,6]Fortunately, quantum cryptography can solve these security problems.By determining whether an eavesdropper has attempted to gain information about the secret, quantum secret sharing (QSS) can provide for secure secret transmission.

    In 1999,Hilleryet al.[7]proposed the first QSS protocol based on the three-particle entangled GHZ states, attracting extensive attention.Since then,many researchers have studied the field of quantum secret sharing, and kinds of QSS protocols have been put forward.[8–15]However, those QSS protocols require all participants (both the dealer and the agents)to possess full quantum capabilities (e.g., quantum measurement,quantum states preparation,and so on)while in general quantum resources are valuable and quantum operations are not easy to implement.

    In 2007,Boyeret al.[16]first presented the notion of semiquantum by presenting a protocol where one participant(Bob)is classical.In the definition of semi-quantum, two kinds of participants,quantum participant and classical participant are proposed.The quantum participant has full quantum capabilities and can perform all quantum operations while a classical participant can only perform the following operations when he accesses a segment of quantum channel: (a) generating qubits in the fixed computational basis(Zbasis){|0〉,|1〉};(b)measuring qubits in the fixedZbasis{|0〉,|1〉};(c)reflecting qubits without disturbance;(d)reordering qubits(via different delay lines).Since semi-quantum cryptography protocol only requires one participant to have the full quantum capability,it simplifies the execution difficulty of the protocols and has been widely applied to various quantum cryptography fields,such as semi-quantum key distribution,[17–19]semi-quantum secure direct communication,[20–22]semi-quantum private comparison[23–25]and semi-quantum secret sharing.[26–32]

    In 2010,Liet al.[26]proposed the first semi-quantum secret sharing (SQSS) protocol using the maximally entangled GHZ states.Two years later, Wanget al.[27]considered an SQSS protocol using the two-particle entangled states.In 2013, Liet al.[28]utilized easier two-particle product states to implement an SQSS protocol.After that, Xieet al.[29]designed a new SQSS protocol with GHZ-like states,which can share a specific bit string compared with the previous protocols.In 2018,Liet al.[30]proposed an SQSS protocol where classical participants can realize secret sharing without making any measurements and quantum Alice does not need quantum registers, which improves the relative efficiency.In the same year,Yeet al.[31]proposed two circular SQSS protocols using single particles where the second one releases the classical parties from the measurement capability.A more practical and flexible SQSS protocol based on the Bell states was proposed by Tianet al.[32]in 2021, which can share specific secrets with classical parties.However, inefficiency is still a major problem of SQSS protocols.

    In this paper,an SQSS protocol based on single particles is presented.An encoding method is used to make quantum Alice has the right to decide the shared secret message.After this, we use particle reordering to maximally utilize particles while ensuring security, so that there is no particle discarded or wasted in our protocol, improving the efficiency to nearly 100%.The resources used in the proposed protocol are simple single particles and are prepared only by the quantum party,reducing the difficulty of the resource preparation.Besides,the particles in our protocol are transmitted in a circular way,which makes the role of the agents equal, so this protocol is easy to be extended to multi-party secret sharing.And then,we analyze the security of the protocol to prove that our protocol is secure and can resist common attacks,such as interceptresend attack and measure-resend attack.

    The remaining parts of the paper are organized as follows.In Section 2, a novel SQSS protocol is described in detail.Next, the security analysis is in Section 3 while the comparison of the SQSS protocol with previous protocols is analyzed in Section 4.In Section 5,a conclusion is given.

    2.The proposed SQSS protocol

    In this section,we first present an encoding method.Secondly,we propose a three-party SQSS protocol based on single particles.Then,such SQSS protocol is generalized to the multiparty case.After that,we use an example to show the process of the protocol in detail.

    2.1.Encoding method

    To encode any integer as a bit string with equal numbers of 0 and 1, we try to present an encoding method, which can be applied in the protocol proposed thereafter.

    Inspired by this, based on the location where the first 1 appears, a 2N-bit string can be divided intoN+1 groups.If the first 1 appears in thei-th position, the remainingN ?1 1 can only appear in the later 2N ?iposition,so this group hascombinations.Then every group can be further divided into sub-groups based on the location where the next 1 appears and so on.Once theN-th 1 is located,all 1 are well positioned and the remaining positions will be filled with 0.According to this idea, we can propose an encoding method which is suitable for any numberN.

    An integerxwithin the range ofcan be expressed asx=C?b1?b2?···?bN,where

    1≤i ≤N,ai ∈N+.Theaiis a parameter to build parameterbiand indicates encoding positions.ThePiis an intermediate value

    If eachbi /= 0, the positions from the first 1 to theNth 1 will be 2N ?a1,2N ?a2,...,2N ?aN, or they will be 2N ?a1,2N ?a2,...,2N ?ak?1,N+k,N+k+1,...,2N,(k=min{i|bi=0}).

    Table 1.Encoding method and encoded results for N=3.

    2.2.Three-party SQSS protocol

    Suppose Alice has quantum capabilities while the others two participants Bob and Charlie are classical.Alice wants to share a secret with Bob and Charlie securely.The proposed three-party SQSS protocol is composed of the following steps.

    Step 1Alice decides the content of the shared secret at will and encodes the secret into a bit string with equal numbers of 0 and 1 by using the encoding method in Subsection 2.1.Suppose the length of this bit string is 2a.

    Step 2Alice first randomly selects one basis fromZbasis{|0〉,|1〉}andXbasis{|+〉,|?〉}.Using the particles|0〉and|+〉to stand for the classical bit and particles|1〉and|?〉to stand for the classical bit 1, based on the encoded string,Alice prepares all 2asingle particles from the selected one basis.After that, Alice reorders these particles.Note that the rearrangement order of particles is only known to Alice.

    Step 3Alice preparesmdecoy photons,each of which is randomly in one of the four states{|0〉,|1〉,|+〉,|?〉},inserts decoy photons to the reordered particles in random positions,and sends them to Bob.

    Step 4After confirming that Bob has received the particles, Alice publishes the insertion positions of a fraction of decoy photons.Before she publishes the states of these decoy photons,Bob must measure those photons inZbasis.For those photons in|0〉or|1〉,Bob checks the error rate,and for those in|+〉 or|?〉, Bob checks whether the measurements are evenly distributed.He aborts the protocol if the error or deviation rate exceeds a preset threshold.After the check,he disturbs the order of the remaining particles.Only Bob himself knows the rearrangement order of them.Finally,Bob sends all particles to Charlie.

    Step 5After Charlie announces the receipt of all particles from Bob, Alice publishes the insertion positions of another fraction of decoy photons.Then Bob publishes the transposition order of those photons,so Charlie can accurately measure those decoy photons inZbasis.She checks the measurements just like Bob based on the states published by Alice.After that,she does not need to do anything else but reorder the remaining particles secretly and send them back to Alice.

    Step 6After receiving particles from Charlie,Alice publishes the original positions of the rest of decoy photons.Bob and Charlie publish in turn their transposition order of these photons so Alice could get the final positions of the decoy photons in the existing particle sequence.Alice performs measurements in the corresponding basis of the decoy photons at these positions.By comparing the measurement results to the originally prepared photon states,Alice can calculate an error rate.If the error rate exceeds a preset threshold,they will abort this communication and restart the protocol.Otherwise, they continue to the next step.

    Step 7Alice measures all the remaining particles with the basis selected in step 2 and publishes the measurement results, that is, the encoded string that has been reordered by Alice,Bob,and Charlie.After that,Alice announces her rearrangement order.Only Bob and Charlie have cooperated,can they recover the original encoded string by sharing their own rearrangement order.Finally, they can get Alice’s secret by decoding the encoded string.

    2.3.Multi-party SQSS protocol

    The three-party SQSS protocol is easily generalized to multi-party SQSS protocol.

    Steps 1–5 are roughly the same as our three-party SQSS protocol,but at the end of step 5,Charlie sends the particles to the next classical participant,David,instead of Alice.

    Step 6After David announces the receipt of all particles,Alice publishes the insertion positions of a fraction of decoy photons and previous classical participants publish their transposition order of those decoy photons.Subsequently, David measures decoy photons and checks the measurements just like the Bob in step 4 based on the states published by Alice.After the check, he disturbs the order of remaining particles and sends the particles to the next classical participant.The remaining participants also operate as above, except that the last participant Zach sends the particles back to Alice.

    Step 7After receiving particles from Zach, Alice could get the final positions of the decoy photons with the help of all classical participants.The same as in step 6 in Subsection 2.2,Alice can make the corresponding measurements and calculate an error rate to detect eavesdropping.

    Step 8Alice publishes her rearrangement order and the measurement results of all the remaining particles measured in the basis selected in step 2.Classical participants can recover the encoded string only by cooperating.Finally, they can decode the encoded string to get Alice’s secret.

    The proposed multi-party SQSS protocol is implemented as above.

    2.4.Example

    Now,an example of our proposed SQSS protocol will be given in this part.

    3.Security analysi s

    In general, in the QSS protocol, internal attackers are more powerful than external eavesdroppers because they know more information about the secret.Therefore, we will focus on the security of the proposed SQSS protocol for dishonest internal participants below.

    3.1.Intercept-resend attack

    If Bob is a dishonest internal attacker, to obtain Alice’s shared secret, Bob can try to launch an intercept-resend attack as follows: he uses Alice’s particles as usual to perform the step 4.Then, he prepares a string of fake single particles and sends it to Charlie.After Charlie finishes his operation,Bob intercepts the particles that Charlie sends to Alice.By measuring this string of particles,Bob tries to obtain Charlie’s rearrangement order of the particles.

    However, Bob cannot determine the transposition order for particles in the same state|0〉 or|1〉.For example, if the sequence{|0〉,|1〉,|1〉,|0〉}is reordered to{|0〉,|1〉,|0〉,|1〉},the|1〉 on the second position may be unchanged or may be reordered to the fourth position.Consequently, Bob can not get exactly how Charlie disturbs the particles.Even if Bob can get Charlie’s rearrangement order,since he does not know the positions and states of decoy photons when he sends the fake particle sequence,his attack will introduce errors when Alice and Charlie detect eavesdropping.

    Therefore, Bob can obtain almost no information by launching intercept-resend attack without being detected.As a result,the intercept-resend attack fails.

    3.2.Measure-resend attack

    Without loss of generality, supposing Bob is a dishonest internal attacker, to obtain Alice’s shared secret, he can take two strategies below to perform measure-resend attack.

    (i)Bob intercepts the string of particles transmitted from Alice and measures all particles using the same basis (ZorXbasis).Based on the measurements, Bob generates a new quantum sequence with the same measurement results and resends it to Charlie.If Bob’s attack is not detected, Bob has a 1/2 chance of choosing the right basis Alice selects and obtaining access to the secrets Alice wants to share.However, his attack will introduce errors and be detected before he obtains any useful information.Suppose Charlie checksμdecoy photons inZbasis and Alice measuresηdecoy photons.If Bob chooses to measure all particles inZbasis, the probability that Bob will not be detected is (1/2)η/2, and if Bob chooses to measure all particles inXbasis,the probability that Bob will not be detected is (1/2)(η/2)+μ.Therefore,the average probability that the attack will not be detected is 1?(1/2)(η/2)+1×,and whenηis large enough,Bob’s attack cannot be successfully implemented.

    (ii) Bob intercepts the particles sent to Alice and measures all particles using the same basis (ZorXbasis).As the rearrangement order of the particles is only known by the operator himself,Bob cannot accurately obtain Alice’s shared secret without the help of Charlie, and this operation will be detected by eavesdropping detection.

    Stated thus, the proposed protocol is secure against measure-resend attack.

    3.3.Entanglement-measure attack

    Suppose a malicious internal attacker Bob attempts to steal the secret shared by Alice through the entangle-measure attack.As this protocol only uses decoy photons to detect eavesdropping, we only consider the effect on decoy photons for entangle-measure attacks.The entangle-measure attack from Bob can be described as follows: the unitary operationsUFattacking particles as they go from Bob to Charlie and the unitary operationsURattacking particles as they go back from Charlie to Alice, whereUFandURshare a common probe space with the state|ε〉.

    Theorem 1For the entangle-measure attack(UF,UR)performed by Bob inducing no error in eavesdropping detection,the final state of Bob’s probe should be independent of Alice’s measurement result.As a result, Bob gets no information on Alice’s shared secret.

    ProofAfter Bob has performedUF, the following relations should be established:

    where|ε00〉,|ε01〉,|ε10〉and|ε11〉represent the un-normalized states of Bob’s probe.

    For particles of any order, Bob needs the final state of the first register to be the same as the original state to pass the eavesdropping detection,soURmust satisfy the following conditions:

    From the equations above,it should hold that

    After inserting Eq.(11)into Eqs.(7)–(10),we have

    According to Eq.(12),if Bob is not detectable in the security check,he can not distinguish his final probe states.As a result,Bob gets no information on Alice’s shared secret QED.

    3.4.Trojan horse attack

    Here,Bob plans to use Trojan horse attack.After finishing his normal operation, he attaches the invisible photons or the spy photons to his particles and transmits all of them to Charlie for Trojan horse attack.[33]By analyzing spy photons in this string of particles sent to Alice by Charlie,Bob tries to obtain Charlie’s order of the particles.Nevertheless,by applying a photon number splitter(PNS)and a wavelength filter device(WF),the malicious operations can be easily resisted.[34]Hence, the presented protocol is secure against Trojan horse attack.

    3.5.Collusion attack

    In collusion attack, some participants can collude together to get the shadow of the share of other participants.

    In our protocol, to facilitate the description, we denote the classical participants of the(n+1)-party protocol asP1,P2,...,Pn.Suppose participantsPj?1andPj+1try to perform the protocol dishonestly to get thePj’s rearrangement order.Since particle reordering is an independent operation and the rearrangement order is known only toPjhimself,two dishonest participants can attack no more than the previous dishonest Bob did alone,they can not get this order by colluding together to perform attacks.

    Moreover,even(n?1)dishonest participants collude together, they do not know the positions and states of decoy photons beforePjreceives particles,which means they are unable to escapePj’s eavesdropping detection by publishing fake transposition order of decoy photons.As a consequence,their collusion attack will introduce errors and the protocol will be aborted,so Alice’s secrets will not be leaked.

    Therefore,our protocol is secure against collusion attack.

    4.Comparison

    We analyze and compare the performance of the proposed protocol with existing SQSS protocols.Our protocol makes progress in the following three aspects: simplifying the quantum resources,improving the protocol efficiency,and transmitting specific secrets.In Table 2, we make a more detailed comparison with the typical SQSS protocols in Refs.[26,28,31,32].

    As shown in Table 2,our protocol is based on single particles rather than entangled states or product states,reducing the difficulty of resource preparation.Moreover, we can see that the qubit efficiency of the proposed protocol is higher than all of the compared protocols, because it can approach 100% asNincreases (the decoy photons are ignored).Lastly, in most previous protocols,the shared secret is not specific,whereas in our protocol Alice can decide which secret message to share.

    Table 2.Comparisons of the SQSS protocols.

    Through the above comparison,the proposed protocol is more efficient and practical than existing ones.

    5.Conclusion

    We have presented a more efficient and practical SQSS protocol.The efficiency of protocol could approach 100%as the length of message increases.Our protocol is based on single particles,reducing the difficulty of resource preparation.In addition,the shared secret message can be determined by Alice herself which cannot be realized by some previous protocols.Finally,we analyze the security of the proposed protocol and fully prove that our protocol can resist common attacks.High efficiency is a big advantage of our protocol,and we will explore how to improve the efficiency of protocols in other semi-quantum cryptography fields in future work.

    Acknowledgments

    Project supported by the National Key Research and Development Program of China(Grant No.2020YFB1805405),the 111 Project(Grant No.B21049),the National Natural Science Foundation of China (Grant No.62272051), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014),and the Fundamental Research Funds for the Central Universities of China (Grant Nos.2019XD-A02 and 2020RC38).

    猜你喜歡
    李劍
    Variational quantum semi-supervised classifier based on label propagation
    The coupled deep neural networks for coupling of the Stokes and Darcy–Forchheimer problems
    兩塊寶石
    Probabilistic quantum teleportation of shared quantum secret
    Efficient quantum private comparison protocol utilizing single photons and rotational encryption
    Constructing the three-qudit unextendible product bases with strong nonlocality
    Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle
    Quantum partial least squares regression algorithm for multiple correlation problem
    Improving the purity of heralded single-photon sources through spontaneous parametric down-conversion process*
    Phase-sensitive Landau–Zener–St¨uckelberg interference in superconducting quantum circuit?
    日日啪夜夜爽| 精品一区二区免费观看| 久久久久精品性色| 大片电影免费在线观看免费| 99热网站在线观看| 母亲3免费完整高清在线观看 | 一级片'在线观看视频| 高清欧美精品videossex| 婷婷色麻豆天堂久久| 丝袜喷水一区| 国产成人免费无遮挡视频| 视频在线观看一区二区三区| 日本91视频免费播放| 18禁在线无遮挡免费观看视频| 国产免费福利视频在线观看| 欧美成人午夜免费资源| 久久精品久久久久久噜噜老黄| 亚洲三级黄色毛片| 国产成人aa在线观看| 日本猛色少妇xxxxx猛交久久| 精品少妇久久久久久888优播| 亚洲三级黄色毛片| 日日啪夜夜爽| 美女视频免费永久观看网站| 九色成人免费人妻av| 在线观看免费高清a一片| 欧美日韩综合久久久久久| av电影中文网址| 夜夜爽夜夜爽视频| 久久精品夜色国产| 777米奇影视久久| 女人久久www免费人成看片| 精品久久久精品久久久| 亚洲精品久久久久久婷婷小说| 日韩在线高清观看一区二区三区| 欧美日韩成人在线一区二区| 欧美97在线视频| 国产1区2区3区精品| 天天躁夜夜躁狠狠久久av| 在线亚洲精品国产二区图片欧美| 高清不卡的av网站| 国产精品人妻久久久影院| 十分钟在线观看高清视频www| 天天躁夜夜躁狠狠躁躁| av天堂久久9| 国产精品免费大片| 亚洲精品乱久久久久久| www.色视频.com| 波多野结衣一区麻豆| 两性夫妻黄色片 | 国产av码专区亚洲av| 伦精品一区二区三区| 国产色婷婷99| 乱人伦中国视频| 香蕉精品网在线| 亚洲精品456在线播放app| 在线免费观看不下载黄p国产| 国产成人a∨麻豆精品| 青青草视频在线视频观看| 午夜免费鲁丝| 久久人人爽av亚洲精品天堂| 免费av中文字幕在线| 最近最新中文字幕免费大全7| 亚洲激情五月婷婷啪啪| 男女下面插进去视频免费观看 | 欧美精品av麻豆av| 黑人猛操日本美女一级片| 夫妻午夜视频| 伦理电影免费视频| 夫妻午夜视频| 制服人妻中文乱码| 天堂8中文在线网| 久久久久人妻精品一区果冻| 国国产精品蜜臀av免费| 精品国产乱码久久久久久小说| 欧美日韩视频精品一区| 在线观看免费日韩欧美大片| 免费人妻精品一区二区三区视频| 国产女主播在线喷水免费视频网站| 国产探花极品一区二区| 欧美激情 高清一区二区三区| 国产一区有黄有色的免费视频| 一边摸一边做爽爽视频免费| 久久久精品区二区三区| a 毛片基地| 男人爽女人下面视频在线观看| 夫妻午夜视频| 国产综合精华液| 啦啦啦视频在线资源免费观看| 亚洲内射少妇av| 亚洲精品乱久久久久久| 日本vs欧美在线观看视频| 久久精品国产自在天天线| 老司机影院毛片| 亚洲国产精品999| 深夜精品福利| 捣出白浆h1v1| 久久精品国产亚洲av涩爱| 欧美激情国产日韩精品一区| 看十八女毛片水多多多| 不卡视频在线观看欧美| 国产在线免费精品| 久久精品人人爽人人爽视色| 国产熟女欧美一区二区| 中文字幕另类日韩欧美亚洲嫩草| 在线天堂中文资源库| 国产精品.久久久| 人人妻人人澡人人爽人人夜夜| 热99久久久久精品小说推荐| 精品视频人人做人人爽| 人妻 亚洲 视频| 久久这里有精品视频免费| 天天影视国产精品| 秋霞伦理黄片| 精品视频人人做人人爽| 久热这里只有精品99| 亚洲精品久久成人aⅴ小说| 亚洲精华国产精华液的使用体验| 亚洲图色成人| 熟女人妻精品中文字幕| 少妇人妻精品综合一区二区| a 毛片基地| 天美传媒精品一区二区| 一级毛片 在线播放| 国产极品天堂在线| 这个男人来自地球电影免费观看 | av免费在线看不卡| 各种免费的搞黄视频| 女人精品久久久久毛片| 黑人猛操日本美女一级片| 两个人看的免费小视频| 精品少妇久久久久久888优播| 欧美少妇被猛烈插入视频| 又粗又硬又长又爽又黄的视频| 国产精品免费大片| 中文字幕最新亚洲高清| 亚洲国产av新网站| 亚洲综合色惰| 五月伊人婷婷丁香| 久久99蜜桃精品久久| 七月丁香在线播放| 日韩av免费高清视频| 久久久久久久精品精品| 卡戴珊不雅视频在线播放| 少妇猛男粗大的猛烈进出视频| 亚洲内射少妇av| 99久久人妻综合| 最近中文字幕高清免费大全6| 亚洲综合色网址| 9色porny在线观看| 卡戴珊不雅视频在线播放| 最后的刺客免费高清国语| 九色亚洲精品在线播放| 人妻系列 视频| 热re99久久精品国产66热6| 亚洲少妇的诱惑av| 精品亚洲成国产av| 尾随美女入室| 肉色欧美久久久久久久蜜桃| 久久免费观看电影| 99香蕉大伊视频| 少妇的逼好多水| 青青草视频在线视频观看| 国语对白做爰xxxⅹ性视频网站| av国产久精品久网站免费入址| 国产成人免费无遮挡视频| 久久国内精品自在自线图片| 少妇熟女欧美另类| 美女视频免费永久观看网站| 91成人精品电影| 热99久久久久精品小说推荐| 国产成人精品福利久久| 最新的欧美精品一区二区| 免费在线观看黄色视频的| 久久人人爽人人爽人人片va| 人人澡人人妻人| 99九九在线精品视频| 三级国产精品片| 国产精品久久久久久久久免| 久久久a久久爽久久v久久| 国产午夜精品一二区理论片| 亚洲久久久国产精品| 老司机影院毛片| 国产精品成人在线| 国产精品国产三级国产av玫瑰| 亚洲美女视频黄频| 少妇的逼好多水| 一区二区三区四区激情视频| 热99国产精品久久久久久7| 激情视频va一区二区三区| 乱码一卡2卡4卡精品| 欧美日本中文国产一区发布| 一级片免费观看大全| 1024视频免费在线观看| 伊人亚洲综合成人网| 亚洲美女视频黄频| 国产视频首页在线观看| 亚洲高清免费不卡视频| 女性被躁到高潮视频| 在线亚洲精品国产二区图片欧美| 欧美成人精品欧美一级黄| 久久婷婷青草| 日韩,欧美,国产一区二区三区| 伦理电影大哥的女人| 亚洲一区二区三区欧美精品| 成人国语在线视频| 黑人欧美特级aaaaaa片| 国内精品宾馆在线| 免费看av在线观看网站| 精品亚洲成国产av| 国产在线免费精品| 男女边摸边吃奶| 一级毛片 在线播放| 亚洲欧美日韩卡通动漫| 美女国产高潮福利片在线看| 自线自在国产av| 午夜福利乱码中文字幕| 色94色欧美一区二区| 最新的欧美精品一区二区| 在线观看三级黄色| 亚洲婷婷狠狠爱综合网| 亚洲精品成人av观看孕妇| 老女人水多毛片| 人妻一区二区av| 久久99一区二区三区| av福利片在线| 少妇的逼好多水| 9191精品国产免费久久| 黄色 视频免费看| 亚洲av.av天堂| 久久人人爽人人爽人人片va| 免费大片18禁| 精品久久久精品久久久| 啦啦啦啦在线视频资源| 男女午夜视频在线观看 | 波野结衣二区三区在线| 日韩av在线免费看完整版不卡| 国产精品偷伦视频观看了| www.色视频.com| 视频中文字幕在线观看| www日本在线高清视频| 久久精品国产鲁丝片午夜精品| 熟妇人妻不卡中文字幕| 亚洲久久久国产精品| 日韩av在线免费看完整版不卡| 欧美日韩视频精品一区| 国产男女内射视频| 国产老妇伦熟女老妇高清| 少妇精品久久久久久久| 久久鲁丝午夜福利片| 18在线观看网站| 五月玫瑰六月丁香| 99九九在线精品视频| 香蕉精品网在线| 宅男免费午夜| 亚洲国产日韩一区二区| 色5月婷婷丁香| 1024视频免费在线观看| 亚洲av福利一区| www.熟女人妻精品国产 | 另类精品久久| 久久久a久久爽久久v久久| 亚洲国产日韩一区二区| 只有这里有精品99| 国产成人精品婷婷| 欧美日韩国产mv在线观看视频| www日本在线高清视频| 男女午夜视频在线观看 | 亚洲欧洲日产国产| 最近中文字幕高清免费大全6| videossex国产| 妹子高潮喷水视频| 精品一区二区三卡| 人体艺术视频欧美日本| 亚洲国产精品专区欧美| 美女内射精品一级片tv| 啦啦啦啦在线视频资源| 秋霞伦理黄片| 寂寞人妻少妇视频99o| 国产成人91sexporn| 日日爽夜夜爽网站| 婷婷色av中文字幕| 亚洲,欧美,日韩| 亚洲一区二区三区欧美精品| 有码 亚洲区| 久久99热这里只频精品6学生| 国产精品嫩草影院av在线观看| 欧美日韩亚洲高清精品| 午夜福利乱码中文字幕| 国产熟女欧美一区二区| 国产精品秋霞免费鲁丝片| xxxhd国产人妻xxx| 韩国高清视频一区二区三区| 久久久欧美国产精品| freevideosex欧美| www.熟女人妻精品国产 | 亚洲国产精品999| 大香蕉久久成人网| 制服人妻中文乱码| 青春草国产在线视频| 国产av一区二区精品久久| 国产精品 国内视频| www.熟女人妻精品国产 | videosex国产| 91国产中文字幕| 亚洲精品国产色婷婷电影| 丝袜脚勾引网站| 久久毛片免费看一区二区三区| 久久久国产精品麻豆| 极品人妻少妇av视频| 午夜老司机福利剧场| 18禁观看日本| 黑丝袜美女国产一区| 日本vs欧美在线观看视频| 女性被躁到高潮视频| 日韩成人伦理影院| 91aial.com中文字幕在线观看| 亚洲av福利一区| 日本欧美国产在线视频| 一个人免费看片子| 国产精品久久久久久久电影| 国产精品人妻久久久影院| 亚洲欧美清纯卡通| 高清在线视频一区二区三区| 人人妻人人澡人人爽人人夜夜| 日韩av不卡免费在线播放| 国产精品免费大片| 少妇 在线观看| 久久婷婷青草| 日韩人妻精品一区2区三区| 多毛熟女@视频| 日韩一区二区三区影片| 80岁老熟妇乱子伦牲交| 国产成人精品久久久久久| 成人国语在线视频| 日本欧美国产在线视频| tube8黄色片| 人体艺术视频欧美日本| 亚洲美女视频黄频| 美女内射精品一级片tv| 亚洲av在线观看美女高潮| 久久99一区二区三区| 国产日韩一区二区三区精品不卡| 中文字幕亚洲精品专区| 欧美成人午夜免费资源| 99国产综合亚洲精品| 少妇的丰满在线观看| 下体分泌物呈黄色| 赤兔流量卡办理| 日韩av不卡免费在线播放| 亚洲精品国产色婷婷电影| 99热6这里只有精品| 少妇被粗大的猛进出69影院 | 色婷婷av一区二区三区视频| 王馨瑶露胸无遮挡在线观看| 自线自在国产av| videosex国产| av又黄又爽大尺度在线免费看| 好男人视频免费观看在线| 亚洲国产看品久久| 亚洲精品日韩在线中文字幕| 日本av手机在线免费观看| 国产一级毛片在线| 成年人免费黄色播放视频| 精品国产一区二区久久| 99久久精品国产国产毛片| 久久狼人影院| 亚洲美女黄色视频免费看| 黄片播放在线免费| 黑人巨大精品欧美一区二区蜜桃 | 青春草亚洲视频在线观看| 国产69精品久久久久777片| 在线天堂中文资源库| 桃花免费在线播放| 国产精品久久久久久av不卡| 亚洲欧美色中文字幕在线| 欧美日韩成人在线一区二区| 少妇猛男粗大的猛烈进出视频| 啦啦啦啦在线视频资源| 国产精品国产av在线观看| 日本午夜av视频| 精品国产国语对白av| 天天影视国产精品| 亚洲精品自拍成人| av在线播放精品| 日本91视频免费播放| 人成视频在线观看免费观看| 美女xxoo啪啪120秒动态图| 飞空精品影院首页| 成年美女黄网站色视频大全免费| 国产国语露脸激情在线看| 91精品伊人久久大香线蕉| av在线app专区| 久久久久久久久久久久大奶| 中国国产av一级| 自线自在国产av| 久久人妻熟女aⅴ| 国产欧美另类精品又又久久亚洲欧美| 91在线精品国自产拍蜜月| 久久精品国产a三级三级三级| 国产伦理片在线播放av一区| 26uuu在线亚洲综合色| 精品少妇内射三级| 免费少妇av软件| 日本与韩国留学比较| 国产成人a∨麻豆精品| 亚洲国产毛片av蜜桃av| 18在线观看网站| 国产精品久久久久久av不卡| 精品一区二区三卡| 日韩av不卡免费在线播放| 欧美日韩视频高清一区二区三区二| 99久国产av精品国产电影| 日韩精品免费视频一区二区三区 | 一边亲一边摸免费视频| 欧美成人午夜精品| videosex国产| 亚洲精品色激情综合| 妹子高潮喷水视频| 人体艺术视频欧美日本| 在线观看国产h片| 欧美亚洲日本最大视频资源| 国产一区二区三区综合在线观看 | 性色avwww在线观看| 久久国产精品男人的天堂亚洲 | av国产精品久久久久影院| 韩国精品一区二区三区 | 一级a做视频免费观看| 少妇人妻精品综合一区二区| 国产在线免费精品| 久久久久视频综合| 国产精品99久久99久久久不卡 | 精品久久久久久电影网| 亚洲av免费高清在线观看| 久热这里只有精品99| 亚洲熟女精品中文字幕| 卡戴珊不雅视频在线播放| 新久久久久国产一级毛片| 高清黄色对白视频在线免费看| 七月丁香在线播放| 成年人午夜在线观看视频| 午夜视频国产福利| 亚洲色图 男人天堂 中文字幕 | 在线免费观看不下载黄p国产| 亚洲精华国产精华液的使用体验| 日本与韩国留学比较| 国产成人免费无遮挡视频| 久久久a久久爽久久v久久| 亚洲激情五月婷婷啪啪| 久久韩国三级中文字幕| av在线app专区| 午夜日本视频在线| 中文字幕最新亚洲高清| 亚洲精品一区蜜桃| 男女边摸边吃奶| 王馨瑶露胸无遮挡在线观看| 赤兔流量卡办理| 极品人妻少妇av视频| 一区二区三区乱码不卡18| 国产不卡av网站在线观看| 亚洲国产av新网站| 最近的中文字幕免费完整| 亚洲成色77777| 亚洲欧洲精品一区二区精品久久久 | 丝袜人妻中文字幕| 亚洲婷婷狠狠爱综合网| 人妻 亚洲 视频| 看非洲黑人一级黄片| 亚洲五月色婷婷综合| 精品国产露脸久久av麻豆| 国产日韩一区二区三区精品不卡| 成年av动漫网址| 国产黄频视频在线观看| 9色porny在线观看| 黄片无遮挡物在线观看| 国产亚洲精品久久久com| 九草在线视频观看| 国产精品免费大片| 丝袜喷水一区| 黄片无遮挡物在线观看| 欧美精品亚洲一区二区| 一级毛片黄色毛片免费观看视频| 国产男女内射视频| 伊人久久国产一区二区| 中文欧美无线码| 午夜激情av网站| 久久人妻熟女aⅴ| 欧美人与性动交α欧美软件 | 一区二区av电影网| 日韩 亚洲 欧美在线| 欧美最新免费一区二区三区| 在线观看国产h片| 国产免费又黄又爽又色| 少妇人妻久久综合中文| 中文字幕免费在线视频6| 在线观看免费日韩欧美大片| 热99国产精品久久久久久7| 黄色一级大片看看| 搡老乐熟女国产| 成人午夜精彩视频在线观看| 日韩中文字幕视频在线看片| 韩国精品一区二区三区 | 日韩免费高清中文字幕av| 久久久久国产网址| 久久久久人妻精品一区果冻| 久久久久久久亚洲中文字幕| 最黄视频免费看| 妹子高潮喷水视频| 亚洲一码二码三码区别大吗| 日韩欧美精品免费久久| 国产探花极品一区二区| 搡老乐熟女国产| 男女无遮挡免费网站观看| 国产一区亚洲一区在线观看| 在线亚洲精品国产二区图片欧美| 中国美白少妇内射xxxbb| 国产精品免费大片| 免费少妇av软件| 国产成人免费观看mmmm| 如何舔出高潮| 18在线观看网站| 欧美日韩av久久| 久久99一区二区三区| 高清欧美精品videossex| 国产在线免费精品| xxxhd国产人妻xxx| 伦精品一区二区三区| 久久久精品94久久精品| 午夜影院在线不卡| 亚洲国产精品专区欧美| 久热久热在线精品观看| 欧美日韩视频精品一区| 亚洲精品第二区| 亚洲av中文av极速乱| av不卡在线播放| 插逼视频在线观看| 日韩免费高清中文字幕av| 国产精品一区二区在线观看99| 男女国产视频网站| 午夜免费观看性视频| 国产欧美另类精品又又久久亚洲欧美| 又黄又粗又硬又大视频| 久久久久久久久久久免费av| 久久97久久精品| 亚洲在久久综合| 国产免费一级a男人的天堂| 日日摸夜夜添夜夜爱| 久久韩国三级中文字幕| 赤兔流量卡办理| 国产爽快片一区二区三区| av播播在线观看一区| 国产乱来视频区| 国产极品天堂在线| 国语对白做爰xxxⅹ性视频网站| 少妇的逼水好多| 搡女人真爽免费视频火全软件| 水蜜桃什么品种好| 伦理电影大哥的女人| 青青草视频在线视频观看| 国产老妇伦熟女老妇高清| 亚洲欧美精品自产自拍| 久久国内精品自在自线图片| 色5月婷婷丁香| 成人影院久久| 精品亚洲成国产av| 亚洲国产av影院在线观看| a级毛片黄视频| 亚洲欧美精品自产自拍| 日本欧美国产在线视频| 国产在线视频一区二区| 国产亚洲最大av| 18禁动态无遮挡网站| 精品国产一区二区久久| 亚洲国产成人一精品久久久| 亚洲精品视频女| 99热全是精品| 99精国产麻豆久久婷婷| 国产精品女同一区二区软件| 免费少妇av软件| 亚洲熟女精品中文字幕| 晚上一个人看的免费电影| 99香蕉大伊视频| 曰老女人黄片| 成年人免费黄色播放视频| 精品久久蜜臀av无| 欧美亚洲日本最大视频资源| 国产精品成人在线| 国产69精品久久久久777片| 中文天堂在线官网| 国产精品一区www在线观看| 久久久久精品人妻al黑| 久久人人爽人人爽人人片va| 9热在线视频观看99| 天天躁夜夜躁狠狠久久av| 成人18禁高潮啪啪吃奶动态图| 韩国av在线不卡| 亚洲成人av在线免费| 精品国产国语对白av| 久久久久久久久久成人| 少妇猛男粗大的猛烈进出视频| 久久av网站| 国产激情久久老熟女| 亚洲国产看品久久| 一区二区av电影网| 丁香六月天网| 中文字幕人妻熟女乱码| 99久久人妻综合| 免费不卡的大黄色大毛片视频在线观看| 免费黄色在线免费观看| 在线观看免费日韩欧美大片| 九色亚洲精品在线播放| 一区二区三区精品91| 国产69精品久久久久777片| 亚洲av欧美aⅴ国产| 国产日韩欧美视频二区|