• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient semi-quantum secret sharing protocol using single particles

    2023-09-05 08:47:30DingXing邢丁YifeiWang王藝霏ZhaoDou竇釗JianLi李劍XiuboChen陳秀波andLixiangLi李麗香
    Chinese Physics B 2023年7期
    關(guān)鍵詞:李劍

    Ding Xing(邢丁), Yifei Wang(王藝霏), Zhao Dou(竇釗),?, Jian Li(李劍),Xiubo Chen(陳秀波), and Lixiang Li(李麗香)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Information Security Center,School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China

    Keywords: semi-quantum secret sharing,efficiency,single particles,specific secret,particle reordering

    1.Introduction

    Secret sharing (SS)[1]is a widely used and efficient privacy protection protocol.It allows a dealer to share a secret among many agents,but only if they cooperate can the agents recover the dealer’s secret or they obtain nothing alone.[2–4]However, classical secret sharing (CSS) is unable to address the problem of eavesdropping if it is not combined with other technologies such as encryption,and the introduction of quantum algorithms brings a huge potential threat to classical encryption algorithms.[5,6]Fortunately, quantum cryptography can solve these security problems.By determining whether an eavesdropper has attempted to gain information about the secret, quantum secret sharing (QSS) can provide for secure secret transmission.

    In 1999,Hilleryet al.[7]proposed the first QSS protocol based on the three-particle entangled GHZ states, attracting extensive attention.Since then,many researchers have studied the field of quantum secret sharing, and kinds of QSS protocols have been put forward.[8–15]However, those QSS protocols require all participants (both the dealer and the agents)to possess full quantum capabilities (e.g., quantum measurement,quantum states preparation,and so on)while in general quantum resources are valuable and quantum operations are not easy to implement.

    In 2007,Boyeret al.[16]first presented the notion of semiquantum by presenting a protocol where one participant(Bob)is classical.In the definition of semi-quantum, two kinds of participants,quantum participant and classical participant are proposed.The quantum participant has full quantum capabilities and can perform all quantum operations while a classical participant can only perform the following operations when he accesses a segment of quantum channel: (a) generating qubits in the fixed computational basis(Zbasis){|0〉,|1〉};(b)measuring qubits in the fixedZbasis{|0〉,|1〉};(c)reflecting qubits without disturbance;(d)reordering qubits(via different delay lines).Since semi-quantum cryptography protocol only requires one participant to have the full quantum capability,it simplifies the execution difficulty of the protocols and has been widely applied to various quantum cryptography fields,such as semi-quantum key distribution,[17–19]semi-quantum secure direct communication,[20–22]semi-quantum private comparison[23–25]and semi-quantum secret sharing.[26–32]

    In 2010,Liet al.[26]proposed the first semi-quantum secret sharing (SQSS) protocol using the maximally entangled GHZ states.Two years later, Wanget al.[27]considered an SQSS protocol using the two-particle entangled states.In 2013, Liet al.[28]utilized easier two-particle product states to implement an SQSS protocol.After that, Xieet al.[29]designed a new SQSS protocol with GHZ-like states,which can share a specific bit string compared with the previous protocols.In 2018,Liet al.[30]proposed an SQSS protocol where classical participants can realize secret sharing without making any measurements and quantum Alice does not need quantum registers, which improves the relative efficiency.In the same year,Yeet al.[31]proposed two circular SQSS protocols using single particles where the second one releases the classical parties from the measurement capability.A more practical and flexible SQSS protocol based on the Bell states was proposed by Tianet al.[32]in 2021, which can share specific secrets with classical parties.However, inefficiency is still a major problem of SQSS protocols.

    In this paper,an SQSS protocol based on single particles is presented.An encoding method is used to make quantum Alice has the right to decide the shared secret message.After this, we use particle reordering to maximally utilize particles while ensuring security, so that there is no particle discarded or wasted in our protocol, improving the efficiency to nearly 100%.The resources used in the proposed protocol are simple single particles and are prepared only by the quantum party,reducing the difficulty of the resource preparation.Besides,the particles in our protocol are transmitted in a circular way,which makes the role of the agents equal, so this protocol is easy to be extended to multi-party secret sharing.And then,we analyze the security of the protocol to prove that our protocol is secure and can resist common attacks,such as interceptresend attack and measure-resend attack.

    The remaining parts of the paper are organized as follows.In Section 2, a novel SQSS protocol is described in detail.Next, the security analysis is in Section 3 while the comparison of the SQSS protocol with previous protocols is analyzed in Section 4.In Section 5,a conclusion is given.

    2.The proposed SQSS protocol

    In this section,we first present an encoding method.Secondly,we propose a three-party SQSS protocol based on single particles.Then,such SQSS protocol is generalized to the multiparty case.After that,we use an example to show the process of the protocol in detail.

    2.1.Encoding method

    To encode any integer as a bit string with equal numbers of 0 and 1, we try to present an encoding method, which can be applied in the protocol proposed thereafter.

    Inspired by this, based on the location where the first 1 appears, a 2N-bit string can be divided intoN+1 groups.If the first 1 appears in thei-th position, the remainingN ?1 1 can only appear in the later 2N ?iposition,so this group hascombinations.Then every group can be further divided into sub-groups based on the location where the next 1 appears and so on.Once theN-th 1 is located,all 1 are well positioned and the remaining positions will be filled with 0.According to this idea, we can propose an encoding method which is suitable for any numberN.

    An integerxwithin the range ofcan be expressed asx=C?b1?b2?···?bN,where

    1≤i ≤N,ai ∈N+.Theaiis a parameter to build parameterbiand indicates encoding positions.ThePiis an intermediate value

    If eachbi /= 0, the positions from the first 1 to theNth 1 will be 2N ?a1,2N ?a2,...,2N ?aN, or they will be 2N ?a1,2N ?a2,...,2N ?ak?1,N+k,N+k+1,...,2N,(k=min{i|bi=0}).

    Table 1.Encoding method and encoded results for N=3.

    2.2.Three-party SQSS protocol

    Suppose Alice has quantum capabilities while the others two participants Bob and Charlie are classical.Alice wants to share a secret with Bob and Charlie securely.The proposed three-party SQSS protocol is composed of the following steps.

    Step 1Alice decides the content of the shared secret at will and encodes the secret into a bit string with equal numbers of 0 and 1 by using the encoding method in Subsection 2.1.Suppose the length of this bit string is 2a.

    Step 2Alice first randomly selects one basis fromZbasis{|0〉,|1〉}andXbasis{|+〉,|?〉}.Using the particles|0〉and|+〉to stand for the classical bit and particles|1〉and|?〉to stand for the classical bit 1, based on the encoded string,Alice prepares all 2asingle particles from the selected one basis.After that, Alice reorders these particles.Note that the rearrangement order of particles is only known to Alice.

    Step 3Alice preparesmdecoy photons,each of which is randomly in one of the four states{|0〉,|1〉,|+〉,|?〉},inserts decoy photons to the reordered particles in random positions,and sends them to Bob.

    Step 4After confirming that Bob has received the particles, Alice publishes the insertion positions of a fraction of decoy photons.Before she publishes the states of these decoy photons,Bob must measure those photons inZbasis.For those photons in|0〉or|1〉,Bob checks the error rate,and for those in|+〉 or|?〉, Bob checks whether the measurements are evenly distributed.He aborts the protocol if the error or deviation rate exceeds a preset threshold.After the check,he disturbs the order of the remaining particles.Only Bob himself knows the rearrangement order of them.Finally,Bob sends all particles to Charlie.

    Step 5After Charlie announces the receipt of all particles from Bob, Alice publishes the insertion positions of another fraction of decoy photons.Then Bob publishes the transposition order of those photons,so Charlie can accurately measure those decoy photons inZbasis.She checks the measurements just like Bob based on the states published by Alice.After that,she does not need to do anything else but reorder the remaining particles secretly and send them back to Alice.

    Step 6After receiving particles from Charlie,Alice publishes the original positions of the rest of decoy photons.Bob and Charlie publish in turn their transposition order of these photons so Alice could get the final positions of the decoy photons in the existing particle sequence.Alice performs measurements in the corresponding basis of the decoy photons at these positions.By comparing the measurement results to the originally prepared photon states,Alice can calculate an error rate.If the error rate exceeds a preset threshold,they will abort this communication and restart the protocol.Otherwise, they continue to the next step.

    Step 7Alice measures all the remaining particles with the basis selected in step 2 and publishes the measurement results, that is, the encoded string that has been reordered by Alice,Bob,and Charlie.After that,Alice announces her rearrangement order.Only Bob and Charlie have cooperated,can they recover the original encoded string by sharing their own rearrangement order.Finally, they can get Alice’s secret by decoding the encoded string.

    2.3.Multi-party SQSS protocol

    The three-party SQSS protocol is easily generalized to multi-party SQSS protocol.

    Steps 1–5 are roughly the same as our three-party SQSS protocol,but at the end of step 5,Charlie sends the particles to the next classical participant,David,instead of Alice.

    Step 6After David announces the receipt of all particles,Alice publishes the insertion positions of a fraction of decoy photons and previous classical participants publish their transposition order of those decoy photons.Subsequently, David measures decoy photons and checks the measurements just like the Bob in step 4 based on the states published by Alice.After the check, he disturbs the order of remaining particles and sends the particles to the next classical participant.The remaining participants also operate as above, except that the last participant Zach sends the particles back to Alice.

    Step 7After receiving particles from Zach, Alice could get the final positions of the decoy photons with the help of all classical participants.The same as in step 6 in Subsection 2.2,Alice can make the corresponding measurements and calculate an error rate to detect eavesdropping.

    Step 8Alice publishes her rearrangement order and the measurement results of all the remaining particles measured in the basis selected in step 2.Classical participants can recover the encoded string only by cooperating.Finally, they can decode the encoded string to get Alice’s secret.

    The proposed multi-party SQSS protocol is implemented as above.

    2.4.Example

    Now,an example of our proposed SQSS protocol will be given in this part.

    3.Security analysi s

    In general, in the QSS protocol, internal attackers are more powerful than external eavesdroppers because they know more information about the secret.Therefore, we will focus on the security of the proposed SQSS protocol for dishonest internal participants below.

    3.1.Intercept-resend attack

    If Bob is a dishonest internal attacker, to obtain Alice’s shared secret, Bob can try to launch an intercept-resend attack as follows: he uses Alice’s particles as usual to perform the step 4.Then, he prepares a string of fake single particles and sends it to Charlie.After Charlie finishes his operation,Bob intercepts the particles that Charlie sends to Alice.By measuring this string of particles,Bob tries to obtain Charlie’s rearrangement order of the particles.

    However, Bob cannot determine the transposition order for particles in the same state|0〉 or|1〉.For example, if the sequence{|0〉,|1〉,|1〉,|0〉}is reordered to{|0〉,|1〉,|0〉,|1〉},the|1〉 on the second position may be unchanged or may be reordered to the fourth position.Consequently, Bob can not get exactly how Charlie disturbs the particles.Even if Bob can get Charlie’s rearrangement order,since he does not know the positions and states of decoy photons when he sends the fake particle sequence,his attack will introduce errors when Alice and Charlie detect eavesdropping.

    Therefore, Bob can obtain almost no information by launching intercept-resend attack without being detected.As a result,the intercept-resend attack fails.

    3.2.Measure-resend attack

    Without loss of generality, supposing Bob is a dishonest internal attacker, to obtain Alice’s shared secret, he can take two strategies below to perform measure-resend attack.

    (i)Bob intercepts the string of particles transmitted from Alice and measures all particles using the same basis (ZorXbasis).Based on the measurements, Bob generates a new quantum sequence with the same measurement results and resends it to Charlie.If Bob’s attack is not detected, Bob has a 1/2 chance of choosing the right basis Alice selects and obtaining access to the secrets Alice wants to share.However, his attack will introduce errors and be detected before he obtains any useful information.Suppose Charlie checksμdecoy photons inZbasis and Alice measuresηdecoy photons.If Bob chooses to measure all particles inZbasis, the probability that Bob will not be detected is (1/2)η/2, and if Bob chooses to measure all particles inXbasis,the probability that Bob will not be detected is (1/2)(η/2)+μ.Therefore,the average probability that the attack will not be detected is 1?(1/2)(η/2)+1×,and whenηis large enough,Bob’s attack cannot be successfully implemented.

    (ii) Bob intercepts the particles sent to Alice and measures all particles using the same basis (ZorXbasis).As the rearrangement order of the particles is only known by the operator himself,Bob cannot accurately obtain Alice’s shared secret without the help of Charlie, and this operation will be detected by eavesdropping detection.

    Stated thus, the proposed protocol is secure against measure-resend attack.

    3.3.Entanglement-measure attack

    Suppose a malicious internal attacker Bob attempts to steal the secret shared by Alice through the entangle-measure attack.As this protocol only uses decoy photons to detect eavesdropping, we only consider the effect on decoy photons for entangle-measure attacks.The entangle-measure attack from Bob can be described as follows: the unitary operationsUFattacking particles as they go from Bob to Charlie and the unitary operationsURattacking particles as they go back from Charlie to Alice, whereUFandURshare a common probe space with the state|ε〉.

    Theorem 1For the entangle-measure attack(UF,UR)performed by Bob inducing no error in eavesdropping detection,the final state of Bob’s probe should be independent of Alice’s measurement result.As a result, Bob gets no information on Alice’s shared secret.

    ProofAfter Bob has performedUF, the following relations should be established:

    where|ε00〉,|ε01〉,|ε10〉and|ε11〉represent the un-normalized states of Bob’s probe.

    For particles of any order, Bob needs the final state of the first register to be the same as the original state to pass the eavesdropping detection,soURmust satisfy the following conditions:

    From the equations above,it should hold that

    After inserting Eq.(11)into Eqs.(7)–(10),we have

    According to Eq.(12),if Bob is not detectable in the security check,he can not distinguish his final probe states.As a result,Bob gets no information on Alice’s shared secret QED.

    3.4.Trojan horse attack

    Here,Bob plans to use Trojan horse attack.After finishing his normal operation, he attaches the invisible photons or the spy photons to his particles and transmits all of them to Charlie for Trojan horse attack.[33]By analyzing spy photons in this string of particles sent to Alice by Charlie,Bob tries to obtain Charlie’s order of the particles.Nevertheless,by applying a photon number splitter(PNS)and a wavelength filter device(WF),the malicious operations can be easily resisted.[34]Hence, the presented protocol is secure against Trojan horse attack.

    3.5.Collusion attack

    In collusion attack, some participants can collude together to get the shadow of the share of other participants.

    In our protocol, to facilitate the description, we denote the classical participants of the(n+1)-party protocol asP1,P2,...,Pn.Suppose participantsPj?1andPj+1try to perform the protocol dishonestly to get thePj’s rearrangement order.Since particle reordering is an independent operation and the rearrangement order is known only toPjhimself,two dishonest participants can attack no more than the previous dishonest Bob did alone,they can not get this order by colluding together to perform attacks.

    Moreover,even(n?1)dishonest participants collude together, they do not know the positions and states of decoy photons beforePjreceives particles,which means they are unable to escapePj’s eavesdropping detection by publishing fake transposition order of decoy photons.As a consequence,their collusion attack will introduce errors and the protocol will be aborted,so Alice’s secrets will not be leaked.

    Therefore,our protocol is secure against collusion attack.

    4.Comparison

    We analyze and compare the performance of the proposed protocol with existing SQSS protocols.Our protocol makes progress in the following three aspects: simplifying the quantum resources,improving the protocol efficiency,and transmitting specific secrets.In Table 2, we make a more detailed comparison with the typical SQSS protocols in Refs.[26,28,31,32].

    As shown in Table 2,our protocol is based on single particles rather than entangled states or product states,reducing the difficulty of resource preparation.Moreover, we can see that the qubit efficiency of the proposed protocol is higher than all of the compared protocols, because it can approach 100% asNincreases (the decoy photons are ignored).Lastly, in most previous protocols,the shared secret is not specific,whereas in our protocol Alice can decide which secret message to share.

    Table 2.Comparisons of the SQSS protocols.

    Through the above comparison,the proposed protocol is more efficient and practical than existing ones.

    5.Conclusion

    We have presented a more efficient and practical SQSS protocol.The efficiency of protocol could approach 100%as the length of message increases.Our protocol is based on single particles,reducing the difficulty of resource preparation.In addition,the shared secret message can be determined by Alice herself which cannot be realized by some previous protocols.Finally,we analyze the security of the proposed protocol and fully prove that our protocol can resist common attacks.High efficiency is a big advantage of our protocol,and we will explore how to improve the efficiency of protocols in other semi-quantum cryptography fields in future work.

    Acknowledgments

    Project supported by the National Key Research and Development Program of China(Grant No.2020YFB1805405),the 111 Project(Grant No.B21049),the National Natural Science Foundation of China (Grant No.62272051), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014),and the Fundamental Research Funds for the Central Universities of China (Grant Nos.2019XD-A02 and 2020RC38).

    猜你喜歡
    李劍
    Variational quantum semi-supervised classifier based on label propagation
    The coupled deep neural networks for coupling of the Stokes and Darcy–Forchheimer problems
    兩塊寶石
    Probabilistic quantum teleportation of shared quantum secret
    Efficient quantum private comparison protocol utilizing single photons and rotational encryption
    Constructing the three-qudit unextendible product bases with strong nonlocality
    Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle
    Quantum partial least squares regression algorithm for multiple correlation problem
    Improving the purity of heralded single-photon sources through spontaneous parametric down-conversion process*
    Phase-sensitive Landau–Zener–St¨uckelberg interference in superconducting quantum circuit?
    99久久精品一区二区三区| 久久久欧美国产精品| 亚洲四区av| 亚洲精品乱久久久久久| 午夜福利在线观看免费完整高清在| 久久久国产欧美日韩av| 卡戴珊不雅视频在线播放| 天天操日日干夜夜撸| 在线观看免费视频网站a站| 建设人人有责人人尽责人人享有的| av卡一久久| 中文天堂在线官网| 成人美女网站在线观看视频| av女优亚洲男人天堂| 激情五月婷婷亚洲| 91aial.com中文字幕在线观看| 伦理电影大哥的女人| 中文字幕久久专区| 成人二区视频| 国产亚洲精品久久久com| 国产精品国产三级国产av玫瑰| 内射极品少妇av片p| av在线老鸭窝| 综合色丁香网| 久久久久久久久久成人| 黄色视频在线播放观看不卡| 最新中文字幕久久久久| 欧美最新免费一区二区三区| 人人妻人人爽人人添夜夜欢视频 | 寂寞人妻少妇视频99o| 亚洲色图综合在线观看| 亚洲一级一片aⅴ在线观看| 日本色播在线视频| 另类亚洲欧美激情| 日本黄色片子视频| 最近中文字幕高清免费大全6| 九九久久精品国产亚洲av麻豆| 99视频精品全部免费 在线| 久热这里只有精品99| 美女视频免费永久观看网站| 99久久综合免费| 国产女主播在线喷水免费视频网站| 三级国产精品片| 黄色怎么调成土黄色| 这个男人来自地球电影免费观看 | 久久99一区二区三区| 99久久人妻综合| 97精品久久久久久久久久精品| 午夜激情久久久久久久| 国产熟女午夜一区二区三区 | 国产成人一区二区在线| 丁香六月天网| 国产69精品久久久久777片| 亚洲,一卡二卡三卡| 国产精品欧美亚洲77777| 黄色日韩在线| 蜜桃久久精品国产亚洲av| 国产老妇伦熟女老妇高清| 国产精品偷伦视频观看了| 99re6热这里在线精品视频| 精品人妻一区二区三区麻豆| 久久ye,这里只有精品| 99久久中文字幕三级久久日本| 国产精品国产三级专区第一集| 极品教师在线视频| 我的女老师完整版在线观看| 熟女av电影| 国产在线男女| 国产色婷婷99| 99热这里只有是精品50| 免费黄频网站在线观看国产| 久久精品久久精品一区二区三区| 欧美日韩在线观看h| 在线观看三级黄色| 久久久久精品久久久久真实原创| 婷婷色麻豆天堂久久| 边亲边吃奶的免费视频| 黄色配什么色好看| 80岁老熟妇乱子伦牲交| 欧美成人午夜免费资源| 久久精品夜色国产| 亚洲婷婷狠狠爱综合网| 成人18禁高潮啪啪吃奶动态图 | 久久狼人影院| 欧美 日韩 精品 国产| 亚洲国产色片| 91久久精品国产一区二区成人| 国产精品欧美亚洲77777| 亚洲av男天堂| 观看av在线不卡| 国产真实伦视频高清在线观看| 久久女婷五月综合色啪小说| 色94色欧美一区二区| 久久久国产欧美日韩av| 少妇精品久久久久久久| 亚洲欧美清纯卡通| av一本久久久久| 丰满乱子伦码专区| 日日撸夜夜添| 男的添女的下面高潮视频| 亚洲成人av在线免费| 另类亚洲欧美激情| 免费黄频网站在线观看国产| 久久久久久久大尺度免费视频| 中文乱码字字幕精品一区二区三区| 精品少妇内射三级| 国产日韩一区二区三区精品不卡 | 午夜福利,免费看| 99久久精品一区二区三区| 又黄又爽又刺激的免费视频.| 免费观看a级毛片全部| 边亲边吃奶的免费视频| 熟女电影av网| 少妇高潮的动态图| 日日摸夜夜添夜夜添av毛片| 久久狼人影院| 亚洲av在线观看美女高潮| 亚洲国产最新在线播放| 国产精品久久久久久av不卡| 自拍欧美九色日韩亚洲蝌蚪91 | 观看美女的网站| 大码成人一级视频| 亚洲精品久久久久久婷婷小说| 精品熟女少妇av免费看| 夫妻性生交免费视频一级片| 黄色一级大片看看| 亚洲性久久影院| 蜜桃在线观看..| av视频免费观看在线观看| 国产乱人偷精品视频| 国产中年淑女户外野战色| a级毛色黄片| 欧美 日韩 精品 国产| 国产精品99久久99久久久不卡 | 中文字幕亚洲精品专区| 18禁动态无遮挡网站| 伊人久久国产一区二区| av线在线观看网站| 国产成人精品一,二区| 亚洲四区av| 一级毛片我不卡| 观看美女的网站| 久久6这里有精品| 99久久综合免费| 午夜福利视频精品| 国产日韩一区二区三区精品不卡 | 国产高清不卡午夜福利| 五月开心婷婷网| 国产探花极品一区二区| 91精品一卡2卡3卡4卡| 日韩电影二区| 观看免费一级毛片| 乱码一卡2卡4卡精品| 国产深夜福利视频在线观看| 亚洲精品乱码久久久v下载方式| 国产91av在线免费观看| 丝袜在线中文字幕| 热re99久久精品国产66热6| 国产极品粉嫩免费观看在线 | 成人免费观看视频高清| 少妇人妻精品综合一区二区| 日本欧美国产在线视频| 一级毛片我不卡| a级毛片免费高清观看在线播放| 成人特级av手机在线观看| 97超视频在线观看视频| 国产一区二区在线观看av| 日本午夜av视频| av在线观看视频网站免费| 一级,二级,三级黄色视频| 高清午夜精品一区二区三区| 日韩熟女老妇一区二区性免费视频| 人妻制服诱惑在线中文字幕| 免费大片黄手机在线观看| 成年人免费黄色播放视频 | 一级毛片黄色毛片免费观看视频| 成人亚洲精品一区在线观看| 黄色日韩在线| 波野结衣二区三区在线| 国产白丝娇喘喷水9色精品| 人人妻人人澡人人爽人人夜夜| 亚洲av二区三区四区| 国产精品.久久久| 熟女电影av网| 伊人亚洲综合成人网| 亚洲精品,欧美精品| 18禁裸乳无遮挡动漫免费视频| 汤姆久久久久久久影院中文字幕| 日本免费在线观看一区| 午夜福利在线观看免费完整高清在| 免费观看av网站的网址| 亚洲av日韩在线播放| 边亲边吃奶的免费视频| 在线观看免费日韩欧美大片 | 一区二区三区精品91| 免费播放大片免费观看视频在线观看| 国产一区二区在线观看av| 国产一区二区三区av在线| 婷婷色综合大香蕉| 久久久久久伊人网av| 狂野欧美激情性xxxx在线观看| 啦啦啦中文免费视频观看日本| 国产亚洲欧美精品永久| 各种免费的搞黄视频| 黑人猛操日本美女一级片| 一级二级三级毛片免费看| 国产高清有码在线观看视频| 亚洲综合精品二区| 99热6这里只有精品| 久久久久久久大尺度免费视频| 热re99久久精品国产66热6| 国产成人aa在线观看| 国产亚洲一区二区精品| 久久精品国产鲁丝片午夜精品| 午夜免费观看性视频| 老司机亚洲免费影院| 久久精品久久精品一区二区三区| 91久久精品国产一区二区成人| 91精品伊人久久大香线蕉| av国产久精品久网站免费入址| 亚洲成人手机| 亚洲va在线va天堂va国产| a 毛片基地| 香蕉精品网在线| 美女视频免费永久观看网站| 精品亚洲成a人片在线观看| 亚洲久久久国产精品| 寂寞人妻少妇视频99o| 69精品国产乱码久久久| 26uuu在线亚洲综合色| 国产精品福利在线免费观看| 美女脱内裤让男人舔精品视频| 国产精品99久久久久久久久| 又黄又爽又刺激的免费视频.| 久久久a久久爽久久v久久| 国产色婷婷99| 国产精品国产av在线观看| 国产成人一区二区在线| 日韩熟女老妇一区二区性免费视频| 国产有黄有色有爽视频| av网站免费在线观看视频| 免费人妻精品一区二区三区视频| 精品久久久久久久久亚洲| 亚洲国产av新网站| 九色成人免费人妻av| 久久韩国三级中文字幕| 国产无遮挡羞羞视频在线观看| 免费黄网站久久成人精品| 久久久国产欧美日韩av| 秋霞伦理黄片| 国产成人一区二区在线| 国产精品一区二区在线观看99| 免费观看av网站的网址| 国产亚洲5aaaaa淫片| 九色成人免费人妻av| 国产免费视频播放在线视频| 国产精品久久久久久久久免| 久久久久久久大尺度免费视频| 丝袜喷水一区| 亚洲国产精品999| 日本免费在线观看一区| av播播在线观看一区| 夫妻午夜视频| 国产精品久久久久久av不卡| 99久国产av精品国产电影| 如何舔出高潮| 一级爰片在线观看| 赤兔流量卡办理| 国产熟女欧美一区二区| 国产黄色免费在线视频| 各种免费的搞黄视频| 亚洲欧美日韩卡通动漫| 一级黄片播放器| 国产淫语在线视频| 免费观看在线日韩| 亚洲一区二区三区欧美精品| 成人国产av品久久久| 国产69精品久久久久777片| 老女人水多毛片| 丝袜脚勾引网站| a级毛色黄片| 国产乱人偷精品视频| 大又大粗又爽又黄少妇毛片口| 国产一区二区三区综合在线观看 | 少妇猛男粗大的猛烈进出视频| 下体分泌物呈黄色| 欧美成人午夜免费资源| 午夜免费男女啪啪视频观看| 欧美区成人在线视频| 欧美精品一区二区免费开放| 精品午夜福利在线看| 色视频在线一区二区三区| 亚洲av免费高清在线观看| 久热久热在线精品观看| 久热这里只有精品99| 最近中文字幕2019免费版| 欧美日韩精品成人综合77777| 久久影院123| 男人爽女人下面视频在线观看| 伊人久久国产一区二区| 色94色欧美一区二区| 国产一区二区在线观看日韩| 午夜免费鲁丝| 51国产日韩欧美| 97在线人人人人妻| 国产毛片在线视频| 最新的欧美精品一区二区| 午夜av观看不卡| 久久人人爽av亚洲精品天堂| 老司机影院成人| 久久久久久人妻| 国产成人一区二区在线| 美女大奶头黄色视频| 亚洲国产精品专区欧美| 日本爱情动作片www.在线观看| 在现免费观看毛片| 亚洲精品一区蜜桃| 国产成人freesex在线| 亚洲精品日韩在线中文字幕| 18禁裸乳无遮挡动漫免费视频| 一区二区三区四区激情视频| 国产精品一区www在线观看| av黄色大香蕉| 伊人久久精品亚洲午夜| a级毛片在线看网站| 国产欧美另类精品又又久久亚洲欧美| 91精品国产国语对白视频| 欧美3d第一页| 18+在线观看网站| 永久免费av网站大全| 日日撸夜夜添| 亚洲欧美日韩卡通动漫| 日本黄色片子视频| 人妻 亚洲 视频| 日本-黄色视频高清免费观看| 菩萨蛮人人尽说江南好唐韦庄| 精品少妇久久久久久888优播| 久久99热这里只频精品6学生| 国产老妇伦熟女老妇高清| av黄色大香蕉| 亚洲电影在线观看av| 亚洲第一区二区三区不卡| 深夜a级毛片| xxx大片免费视频| 精品久久国产蜜桃| 99久国产av精品国产电影| 伊人久久国产一区二区| 大香蕉久久网| 欧美日韩视频精品一区| 天堂8中文在线网| 国产日韩欧美视频二区| kizo精华| 亚洲真实伦在线观看| 久久午夜综合久久蜜桃| 少妇熟女欧美另类| 国产精品人妻久久久久久| 久久久久久久久久人人人人人人| 日韩中字成人| 亚洲色图综合在线观看| 国产爽快片一区二区三区| 日韩熟女老妇一区二区性免费视频| 国产午夜精品久久久久久一区二区三区| 免费不卡的大黄色大毛片视频在线观看| 天美传媒精品一区二区| 成人漫画全彩无遮挡| 在现免费观看毛片| 久久这里有精品视频免费| 一区二区三区精品91| 黄色毛片三级朝国网站 | av有码第一页| 国产一区二区三区av在线| 亚洲综合色惰| 国产高清有码在线观看视频| 婷婷色av中文字幕| 亚洲性久久影院| 国产熟女午夜一区二区三区 | a级毛片免费高清观看在线播放| 最近的中文字幕免费完整| 久久精品熟女亚洲av麻豆精品| 寂寞人妻少妇视频99o| 国产精品国产三级国产av玫瑰| av国产久精品久网站免费入址| 欧美成人午夜免费资源| 国产黄片美女视频| 精品久久久久久电影网| 欧美日韩国产mv在线观看视频| 十八禁高潮呻吟视频 | 91久久精品国产一区二区三区| 亚洲欧美一区二区三区国产| 日韩精品免费视频一区二区三区 | 99久久精品热视频| 99久国产av精品国产电影| 夜夜爽夜夜爽视频| 成人毛片60女人毛片免费| 91久久精品国产一区二区三区| 51国产日韩欧美| 免费看光身美女| 日韩制服骚丝袜av| 日韩欧美精品免费久久| 又黄又爽又刺激的免费视频.| 亚洲电影在线观看av| 亚洲自偷自拍三级| 麻豆成人午夜福利视频| 在线观看免费视频网站a站| 日韩av不卡免费在线播放| 欧美少妇被猛烈插入视频| 日韩 亚洲 欧美在线| 亚洲精华国产精华液的使用体验| 天天躁夜夜躁狠狠久久av| 成人影院久久| 国产无遮挡羞羞视频在线观看| 不卡视频在线观看欧美| 久久精品久久久久久噜噜老黄| 毛片一级片免费看久久久久| 久久久久久人妻| 在线天堂最新版资源| 啦啦啦在线观看免费高清www| 国产成人aa在线观看| 久久亚洲国产成人精品v| 中文欧美无线码| 国产成人免费无遮挡视频| 久久久久久久国产电影| 国产白丝娇喘喷水9色精品| 国产精品秋霞免费鲁丝片| 国语对白做爰xxxⅹ性视频网站| 国产日韩欧美在线精品| 男女边摸边吃奶| 一二三四中文在线观看免费高清| 高清毛片免费看| 中文字幕人妻丝袜制服| 国产视频首页在线观看| 国产69精品久久久久777片| 久久女婷五月综合色啪小说| 日本猛色少妇xxxxx猛交久久| 成人无遮挡网站| tube8黄色片| 亚洲电影在线观看av| 国产国拍精品亚洲av在线观看| 亚洲欧美一区二区三区国产| a级片在线免费高清观看视频| 国产精品成人在线| 黄色毛片三级朝国网站 | 自拍偷自拍亚洲精品老妇| 日日摸夜夜添夜夜爱| 国产亚洲av片在线观看秒播厂| 中文天堂在线官网| 久久久久久久精品精品| 欧美bdsm另类| 亚洲国产日韩一区二区| 桃花免费在线播放| av女优亚洲男人天堂| 不卡视频在线观看欧美| 草草在线视频免费看| 欧美日韩国产mv在线观看视频| 久久久久久人妻| 日本-黄色视频高清免费观看| 欧美另类一区| 亚洲成人一二三区av| .国产精品久久| 国产国拍精品亚洲av在线观看| 韩国av在线不卡| 成年人免费黄色播放视频 | 久久人人爽人人爽人人片va| 少妇熟女欧美另类| 精品酒店卫生间| 国产一区二区在线观看av| 日韩亚洲欧美综合| 91精品一卡2卡3卡4卡| 最黄视频免费看| 18禁在线无遮挡免费观看视频| 欧美精品高潮呻吟av久久| 熟女电影av网| 日韩精品有码人妻一区| 亚洲高清免费不卡视频| 亚洲av成人精品一区久久| 少妇人妻久久综合中文| 久久久久国产精品人妻一区二区| 99re6热这里在线精品视频| 婷婷色综合大香蕉| 最近手机中文字幕大全| 久久毛片免费看一区二区三区| 如日韩欧美国产精品一区二区三区 | 国产免费一区二区三区四区乱码| 狠狠精品人妻久久久久久综合| 寂寞人妻少妇视频99o| 综合色丁香网| 中文字幕人妻熟人妻熟丝袜美| 一区二区三区精品91| 精品国产国语对白av| 亚洲人成网站在线观看播放| 看非洲黑人一级黄片| av女优亚洲男人天堂| 亚洲成人av在线免费| 欧美国产精品一级二级三级 | 我的老师免费观看完整版| 亚洲av电影在线观看一区二区三区| 日日啪夜夜爽| 亚洲精品日韩在线中文字幕| 国产精品久久久久久av不卡| 大又大粗又爽又黄少妇毛片口| 91aial.com中文字幕在线观看| 国语对白做爰xxxⅹ性视频网站| 欧美97在线视频| 日本午夜av视频| 麻豆成人午夜福利视频| 性高湖久久久久久久久免费观看| 精品久久久久久久久av| 午夜精品国产一区二区电影| 天天操日日干夜夜撸| 久久人人爽av亚洲精品天堂| 又黄又爽又刺激的免费视频.| 日产精品乱码卡一卡2卡三| 最后的刺客免费高清国语| 久久久久久久久久成人| 爱豆传媒免费全集在线观看| 日本黄色片子视频| 国产成人精品久久久久久| 天美传媒精品一区二区| 免费少妇av软件| 观看av在线不卡| 国产日韩欧美视频二区| 欧美区成人在线视频| 噜噜噜噜噜久久久久久91| 免费黄网站久久成人精品| 午夜日本视频在线| 人妻人人澡人人爽人人| 国产伦精品一区二区三区四那| 草草在线视频免费看| 麻豆乱淫一区二区| 三级国产精品欧美在线观看| 在线观看美女被高潮喷水网站| 一级毛片aaaaaa免费看小| www.色视频.com| 男人狂女人下面高潮的视频| 精品人妻偷拍中文字幕| 成人无遮挡网站| 免费大片黄手机在线观看| 国产高清国产精品国产三级| 国产日韩欧美在线精品| 日韩伦理黄色片| 国产日韩欧美视频二区| 中文字幕人妻丝袜制服| 久久99热这里只频精品6学生| 国产av一区二区精品久久| 一区在线观看完整版| 国产日韩欧美视频二区| 我的老师免费观看完整版| 国产综合精华液| 80岁老熟妇乱子伦牲交| 69精品国产乱码久久久| 国产成人aa在线观看| h日本视频在线播放| 国产高清国产精品国产三级| 国产成人精品一,二区| 国产伦精品一区二区三区视频9| 免费看av在线观看网站| freevideosex欧美| 亚洲欧美清纯卡通| 免费大片黄手机在线观看| 伦理电影免费视频| 久久久国产欧美日韩av| 最黄视频免费看| 免费看日本二区| 这个男人来自地球电影免费观看 | 精品人妻一区二区三区麻豆| 国产一区二区三区av在线| 精品人妻熟女av久视频| 插逼视频在线观看| 亚洲欧美日韩卡通动漫| 亚洲无线观看免费| 欧美国产精品一级二级三级 | 日韩精品有码人妻一区| 啦啦啦啦在线视频资源| 国产永久视频网站| 久久国内精品自在自线图片| 久久女婷五月综合色啪小说| 久久99热这里只频精品6学生| 欧美变态另类bdsm刘玥| 777米奇影视久久| 国产在线一区二区三区精| 五月伊人婷婷丁香| 欧美3d第一页| 亚洲av国产av综合av卡| a 毛片基地| 大话2 男鬼变身卡| 一本久久精品| 夫妻性生交免费视频一级片| 久久 成人 亚洲| 久久精品国产亚洲av涩爱| 国产精品一区二区在线不卡| 久久精品熟女亚洲av麻豆精品| 黑人高潮一二区| 久久久久久久久久久丰满| 亚洲国产精品一区二区三区在线| 国产精品女同一区二区软件| a级片在线免费高清观看视频| xxx大片免费视频| 极品教师在线视频| 日本av免费视频播放| 美女视频免费永久观看网站| 欧美日韩精品成人综合77777| 特大巨黑吊av在线直播| 婷婷色综合大香蕉| 中文字幕亚洲精品专区| 久久99精品国语久久久| 亚洲精品成人av观看孕妇| 日产精品乱码卡一卡2卡三| 人妻系列 视频| 亚洲真实伦在线观看| 国产中年淑女户外野战色| 中文天堂在线官网| 曰老女人黄片| 国产熟女欧美一区二区| av在线播放精品| 看免费成人av毛片|