• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research progress in quantum key distribution

    2023-12-15 11:48:26ChunXueZhang張春雪DanWu吳丹PengWeiCui崔鵬偉JunChiMa馬俊馳YueWang王玥andJunMingAn安俊明
    Chinese Physics B 2023年12期
    關鍵詞:春雪

    Chun-Xue Zhang(張春雪), Dan Wu(吳丹), Peng-Wei Cui(崔鵬偉), Jun-Chi Ma(馬俊馳),Yue Wang(王玥), and Jun-Ming An(安俊明),2,3,?

    1State Key Laboratory on Integrated Optoelectronics,Institute of Semiconductors,Chinese Academy of Sciences,Beijing 100083,China

    2Center of Materials Science and Optoelectronics Engineering,University of Chinese Academy of Sciences,Beijing 100049,China

    3College of Materials Science and Opto-Electronic Technology,University of Chinese Academy of Sciences,Beijing 100049,China

    Keywords: quantum key distribution(QKD),sources,detectors,chip

    1.Introduction

    Cryptography is a discipline that studies encryption, decryption and related techniques in a number of fields,including information security, computer science and mathematics.It aims to protect the confidentiality,integrity and availability of information.In 1948, Shannon, an American communications expert,proposed the basic concept of information theory in his paper[1]that all information known to people can be transformed into the form of 0,1 bits for storage and transmission and processing,which is important in many fields such as communications, computer science, physics and statistics.In 1976,Whitfield Diffie and Martin Hellman introduced the concept of public key encryption[2]and introduced a public key encryption algorithm based on the discrete logarithm problem.In 1978, Ron Rivest, Adi Shamir and Leonard Adleman proposed RSA encryption algorithm.[3]

    Quantum cryptography is a branch of cryptography that uses the principles of quantum mechanics to secure messages.The most peculiar feature of quantum mechanics is the existence of indivisible quanta and entangled systems.[4]Unlike traditional cryptography,quantum cryptography uses quantum bits to transmit encrypted information, and its basic principle is to use the unpredictability and coherence of quantum states to ensure the confidentiality of information.Quantum cryptography consists of two main parts,quantum key distribution and quantum authentication.We focus on quantum key distribution.Charles Bennett and Gilles Brassard’s paper[5]published in 1984 introduced a new concept,quantum key distribution, and proposed the BB84 protocol.The protocol uses two orthogonal bases to encode a key and achieves secure key distribution through the coherence and irreducibility of quantum states.The BB84 protocol is also known as a four-state protocol, where the four quantum states are horizontal, vertical,left-skewed and right-skewed.By using a combination of these quantum states,secure key distribution can be achieved.

    Although quantum cryptography is considered to be a more secure method of cryptography in theory, there are still some technical challenges and difficulties in its practical application.

    2.QKD protocols

    2.1.Development process

    In 1984, Charles Bennett and Gilles Brassard proposed the BB84 protocol, the first protocol for quantum key distribution and one of the most classical and practical protocols.The protocol uses two orthogonal bases to encode the key and achieves secure key distribution through the coherence and irreducibility of quantum states.In 1991, professor Ekert of the Oxford University proposed the E91 protocol,[6]which is an entanglement-based QKD protocol.In 1992, Charles H.Bennett proposed the B92 protocol,[7]a quantum authentication protocol based on single-photon polarization states,which could detect eavesdropping attacks and guarantee absolute security.In the same year, Bennett, Brassard and Mermin proposed the BBM92 protocol,[8]which aims to achieve higher efficiency and lower resource consumption by combining the advantages of BB84 and B92 protocols.Continuous-variable protocol (CV-QKD) uses an infinite-dimensional and continuous Hilbert space to encode quantum states, and the information exists in the form of continuously distributed Gaussian random numbers.In 1999,the first CV-QKD was proposed,[9]which based on discrete modulation of Gaussian states.In 2001,CV-QKD based on continuous modulation of Gaussian states was proposed.[10]According to the different types of light sources, CV-QKD can be divided into squeezed-state protocol,[10,11]coherent-state protocol[12,13]and entangledstate protocol.In 2002,Japanese scholar Inoue first proposed the use of differential phase shift protocol(DPS),[14]which is a phase modulation-based.In 2003,Hwang proposed the idea of a decoy state,[15]and in 2005, Prof.Wang Xiangbin from Tsinghua University and H K Lo’s group in Canada,Prof.Luo Kaiguang, Prof.Ma Xiongfeng and Prof.Chen Kai independently developed the decoy state quantum key distribution.[16]In 2005, Stucki proposed the COW protocol, which uses the temporal information of light pulses to encode the eavesdropping situation by randomly adding decoy states and detecting inter-pulse coherence.[17]In 2006, Antonio Ac′?net al.proposed the device-independent QKD protocol (DI-QKD ),where by measuring the entangled state,both parties can generate a key that is resistant not only to eavesdroppers constrained by the laws of quantum mechanics, but also to postquantum eavesdroppers constrained only by the assumption of the no-signal principle.[18]In 2008, the continuous-variable two-way protocol was proposed.[19]In 2012, Lo’s group in Canada and Braunstein’s group in UK independently proposed the measurement device independent quantum key distribution protocol (MDI-QKD),[20]which uses entanglement exchange to shut down all attacks against detectors at once.In 2014, Japanese and American scientists proposed the roundrobin differential-phase-shift (RRDPS) protocol,[21]which is based on the DPS protocol and adds a variable delay line(VD).Compared with conventional QKD, it has a higher bit error threshold and is feasible in harsher circumstances with a high bit error rate and short communication time.In 2018,Lucamariniet al.proposed a two-field quantum key distribution protocol (TF-QKD) that breaks the PLOB boundary.[22]The TF-QKD protocol has the same level of security as the MDI-QKD protocol, with measurement device-independent security.In the same year, a variant protocol of TF-QKD was proposed by the research team of Ma Xiongfeng from Tsinghua University, which is phase-matching quantum key distribution (PM-QKD),[23]which can overcome the linear key rate constraint by matching the phases of two coherent states and encoding the key information into the common phase,and developed a quantum bit-based security proof different from the traditional one.Other variants of TF-QKD include sending or not sending TF-QKD(SNS-TF-QKD),[24]no phase post-selection TF-QKD (NPP-TF-QKD).[25]In 2022,Ma Xiongfeng’s research team at Tsinghua University proposed the mode-pairing quantum key distribution protocol(MP-QKD),[26]where the encoded key bits and bases are determined during data post-processing, using conventional second-order interference,without causing global phase locking.

    Table 1.A comparison of several protocols.

    A detailed review of protocols such as MDI-QKD and TF-QKD is as follows.MDI-QKD was first proposed in 2012,[20]with its post-processing to form a security key based on Charlie’s published measurements, which are the results of Bell measurements, and Alice and Bob’s determination of the correlation of the two parties’ data.The eavesdropper Eve cannot know Alice’s and Bob’s data even if she controls Charlie, Eve can only know the correlation of the data.The first proof-of-principle experiment was subsequently reported in 2013,[27]demonstrating this new QKD method in the laboratory over more than 80 km of wound fiber and at various locations in the city of Calgary.The paper[28]provides a proof-of-principle demonstration of a polarization-encoded MDI-QKD protocol that transmits weakly coherent states over two 8.5 km long fiber-optic links.In a paper published in the same year,[29]the MDI-QKD protocol was demonstrated by developing an efficient,low-noise up conversion single photon detector that can operate at a clock rate of 2 GHz with a transmission range of over 250 km and a secure key rate of over 1 kbps at a distance of 100 km,which is immune to all hacking strategies on detection.In 2014,the USTC extended the secure transmission distance of MDI-QKD to 200 km by developing a fully automated,highly stable system with a 75 MHz clock frequency and a superconducting nanowire single photon detector with a detection efficiency of more than 40%,[3]achieving secure key rates more than three orders of magnitude.The first implementation of polarization-encoded MDI-QKD was demonstrated at the University of Toronto.[31]By optimizing the parameters in the decoy state protocol,it was demonstrated that it is feasible to implement polarization coded MDI-QKD with existing commercial equipment.In 2015, Guo Guangcan’s team at USTC proposed a phase-coded phase-referencefree experiment MDI-QKD scheme.[32]As proof, a proof-ofprinciple experiment using a Faraday-Michaelson interferometer is given.The experimental system operates at 1 MHz and has an average secure key rate of 8.309 bps for a fiber length of 20 km between Alice and Bob.In 2014, Pan’s team at the USTC developed an automatic feedback MDI-QKD system operating at high clock rates,[33]which was field tested by deploying a total length of 30 km of fibre-optic network,achieving a secure key rate of 16.9 b/s.In 2016,the Korea Institute of Science and Technology addressed the pattern matching problem present in the system by introducing the plug-and-play concept in the MDI-QKD system.[34]In the same year, the University of Cambridge introduced a new pulsed laser seeding technique[35]to obtain high visible interference from gainswitched lasers to perform MDI-QKD at critical rates in excess of 1 Mbit/s at a finite size range never before possible.A research team from Tsinghua University proposed a fourstrength decoy-state MDI-QKD protocol,[36]which greatly improved the key rate.Pan Jianwei’s group at the USTC performed an experimental demonstration of MDI-QKD using an optimized four-strength decoy state method on 404 km of ultra-low-loss fibre and 311 km of standard fibre.[37]In 2017,Guangcan Guo’s group demonstrated a reference-frameindependent (RFI) MDI-QKD scheme based on polarizationdisruptive units,[38]which has inherent stability;thus,the final secure key rate is insensitive to polarization random perturbations and phase reference drift.In 2018, the National University of Defense Technology reported the results of reference frame-independent MDI-QKD at 160 km distance with a clock frequency of 50 MHz,[39]and experimentally implemented a four-strength RFI-MDI-QKD protocol at 100 km and 120 km transmission distances.In 2019, Pan’s team reported the results of the first high-rate MDI-QKD experiment over an asymmetric channel,[40]which demonstrated a 10-fold increase in key rate over the previous MDI-QKD protocol in the large-channel asymmetric case and extended the secure transmission distance by more than 20 km-50 km in standard telecommunication fibres by using a 7-strength optimization approach.In 2020, Pan’s team experimentally demonstrated a 1.25 GHz silicon photonic chip MDI-QKD system using polarization encoding,[41]achieving random modulation of polarization state and decoy strength,and demonstrating a finite key secret rate of 31 bits/s over 36 dB channel loss (or 180 km of standard fiber).In the same year, Peking University demonstrated an all-chip MDI-QKD system, including two transmitter chips and a server chip, using integrated silicon photonic technology.[42]The system is capable of producing polarization-encoded weakly coherent states with polarization extinction ratios in excess of 20 dB, sufficient for low error MDI-QKD.In proof-of-concept experiments,the chip-based MDI-QKD system produced a key rate of 2.923×10-6per pulse at a distance corresponding to 50 km of standard fibre, with a detection efficiency of 25% and a predicted distance of 120 km with a detection efficiency of 85%.Pan’s team developed a robust adaptive optics system for high-precision time synchronisation and frequency locking between independent photon sources far apart, achieving the first free-space MDI-QKD in a 19.2 km urban-atmosphere channel well beyond the effective atmospheric thickness,[43]and its experiments were the first step towards satellite-based MDI-QKD.In 2021,Nanjing University achieved a heterogeneously integrated superconducting silicon photonic chip,[44]using the unique high-speed properties of optical waveguideintegrated superconducting detectors.They performed the first best Bell state measurement (BSM) of time-bin encoded quantum bits generated by two independent lasers, and obtained a secure key rate of 24.0 dB loss 6.166 kbps at a clock frequency of 125 MHz, which is comparable to the experimental results of the state-of-the-art MDI-QKD at GHz clock frequency.In 2021, researchers from Nanjing University of Posts and Telecommunications demonstrated RFIMDI-QKD over 200 km and 300 km of optical fiber.[45,46]Meanwhile, they also presented an experiment demonstration of the 5-intensity MDI-QKD, which achieved a positive secure key rate over 442 km.[47]Researchers from Beijing University of Posts and Telecommunications proposed continuous-variable MDI-QKD with one-time shot-noise unit calibration, which lays the foundation for future research.[48]In 2022,researchers from Nanjing University proposed asynchronous MDI-QKD (also called mode-pairing MDI-QKD),which can surpass the key capacity without phase tracking and phase locking.[49]Researchers from Nanjing University of Posts and Telecommunications demonstrated semi-measuredevice-independent quantum state tomography.[50]In 2023,researchers from Nanjing University demonstrated the experimental implementation of asynchronous MDI-QKD in intercity networks,which is practical and efficient.[51]In 2023,the Beijing Academy of Quantum Information Sciences experimentally overcame the rate-loss limit without global phase tracking.[52]Researchers from the University of Science and Technology of China demonstrated intercity mode-pairing MDI-QKD without global phase-locking.[53]

    In 2018,Lucamariniet al.proposed a two-field quantum key distribution protocol that breaks the PLOB bound, twinfield quantum key distribution, TF-QKD.[22]TF-QKD protocol has the same security level as MDI-QKD protocol, with measurement-device-independent security.TF-QKD protocol involves three parties, where Alice and Bob are legitimate communication parties, and Charlie is an untrusted measurement party.Alice and Bob are both senders, each of them has a laser and an interferometer arm; Alice (Bob) phaserandomizes the light pulses, then performs phase encoding,and sends them to Charlie for interference measurement via quantum channel.The core idea of TF-QKD is to adopt a special quantum signal encoding method to reduce the threat of attack types such as PNS attack.In traditional QKD systems, a pulse is usually used to represent a quantum bit,which may result in a very close time between pulses, making it susceptible to pulse overlap attack.However, in TFQKD, each quantum bit is split into multiple pulses, which are sent at fixed time intervals.For example, if a quantum bit is split into four pulses, the sender will send these four pulses in sequence, with the same time interval between pulses.This encoding method makes the time structure of the signal more complex, making it difficult for attackers to exploit the temporal relationship of pulses to launch attacks,such as pulse overlap attack.By using this special encoding method, TF-QKD can effectively reduce the threat of pulse overlap attack on key distribution, thus improving the security of the protocol.This encoding method design is one of the core features of the TF-QKD protocol.TF-QKD is a special type of MDI-QKD.[54]In 2018,a variant protocol of TFQKD was proposed, PM-QKD, where researchers from the University of Waterloo used non-phase-randomized coherent states as test states to propose an improved PM-QKD protocol, and showed that PM-QKD can overcome the repeaterless bound with currently available technology.[55]In 2018,researchers from Tsinghua University proposed SNS-TF-QKD,which presents a small error rate onZ-basis because it does not request single-photon interference on this basis.[33]In 2019,researchers from the University of Science and Technology of China proposed NPP-TF-QKD,which does not require active phase randomization and post-selection,and has a higher key rate within effective distance.[34]In 2019, Spanish researchers proposed an improved TF-QKD protocol that eliminates the post-selection requirement for global phase matching, and researchers from the University of Toronto provided a proof-of-principle demonstration.[56]In 2021, researchers from Nanjing University proposed a method to increase the distance of TF-QKD by adding entangled sources,[57]in the same year, researchers from Toshiba proposed a dual-band stabilization scheme that increased the secure key rate over long distances by two orders of magnitude,[58]and researchers from University of Toronto experimentally demonstrated TFQKD on optical channels with asymmetric loss.[59]In 2022,researchers from the University of Science and Technology of China extended the distance of TF-QKD to 830 km.[60]In the same year, researchers from Beijing University of Posts and Telecommunications proposed TF-QKD based on wavelength-division-multiplexing technology, which further increased the secret key rate of TF-QKD and its variants.[61]In 2023,researchers from Nanjing University proposed a twophoton TF-QKD protocol that eliminates the strict constraints on intensity and probability,[62]in the same year, researchers from the University of Science and Technology of China achieved 100 km TF-QKD.[63]TF-QKD is a very promising field that offers new possibilities for ultra-long-distance quantum secure communication.With the continuous development of technology, we can expect more achievements in this field in the future.

    2.2.Quantum attacks and security proofs

    Here are the quantum attacks and security proofs.Although QKD has excellent potential as a secure communication technology,it also faces various challenges from quantum attacks.These attacks aim to compromise the confidentiality of communication by exploiting the characteristics of quantum communication.Here are some important types of quantum attacks and their corresponding security proofs and defense methods: common quantum attacks include photon-numbersplitting attack,[64]phase-remapping attack,[65]nonrandomphase attack,[66]Fake-state attack,[67]time-shift attack[68]and detection blinding attack,[69]etc.Security proofs include Lo-Chau security proof,[70]Shor-Preskill proof: reduction to prepare-and-measure schemes,[71]Koashi’s complementarity approach[72]and entropic approach,[73]etc.Recent research progress on quantum attacks and security proofs can be seen in Ref.[74].QKD systems can use various techniques and protocols to resist different types of quantum attacks,to improve the stability and efficiency of the system.For example,to defend against photon-number-splitting attack,single-photon sources and single-photon detectors can be used to reduce the possibility of photon splitting.To defend against phase-remapping attack, random phases can be introduced in the communication link to detect and prevent phase-remapping attack.In addition, time-based calibration and detection methods can be used to ensure that the transmitted phases are consistent and correct.Besides these technical measures, various protocols can also be used to enhance the security of QKD systems.For example,the MDI-QKD protocol aims to mitigate the threats that attackers may introduce in the measurement devices.The security proof of MDI-QKD usually involves the untrustworthiness and asymmetry of the measurement devices.By performing measurements between different nodes on the communication link, MDI-QKD can resist various eavesdropping and tampering attempts by attackers, because attackers cannot control both communication nodes’ measurements at the same time.As quantum technology continues to develop,new types of quantum attacks may emerge.The rise of quantum computing may lead to new attack methods, as the computational power of quantum computers may threaten current encryption algorithms.Attackers may use quantum computers to decrypt past communications, exposing previous keys.In addition,attackers may try to design more covert attack methods using phenomenon such as quantum entanglement.As quantum technology continues to evolve, researchers and engineers are exploring the concept of post-quantum cryptography.Post-quantum cryptography aims to develop new encryption methods that can withstand quantum computing attacks, to protect communication and data.This may involve new mathematical and physical concepts, as well as new encryption algorithms that are applicable in a quantum computing environment.However, this also brings the challenge of the transition period,i.e.,how to smoothly transition to a new encryption system.Although quantum communication technologies such as QKD have high security in theory,they may be subject to limitations of physical implementation and innovative challenges from attackers in actual deployment.Losses in optical fibers,interference of photons,imperfections of devices,etc.,may all lead to a decrease in the security of actual systems.Therefore,how to effectively address these issues in actual systems and ensure the security of quantum communication systems remains a challenge.As quantum communication technology develops, it will become possible to build large-scale quantum networks.However, the security issues of quantum networks will also increase accordingly.In this case, how to ensure the security of communication between multiple nodes, how to distribute and manage keys, and how to prevent potential attacks are all important issues that need to be addressed.Although quantum technology provides new possibilities for communication security,it also raises a series of new attack threats.Through continuous research and innovation,scientists and engineers will continue to improve the security of quantum communication technology,to ensure that future communication systems can withstand various potential attacks and provide reliable protection for communication confidentiality and integrity.

    3.Advances in chip-based QKD research

    For the silicon-based QKD chip,the first QKD transmitter to be fabricated on a standard foundry silicon photonic platform by a research team of the University of Toronto in 2016, the team designed structures integrating two identical ring modulators, a variable optical attenuator and a polarization modulator to implement BB84 polarization encoding.The work demonstrates the use of foundry silicon photonics for low-cost,wafer-scale quantum information fabrication components.[75]In the same year,the University of Bristol research team demonstrated a method to overcome the saturation and phase-dependent loss limitations of high-speed carrier depletion in standard silicon photonic fabrication using silicon photonic devices combined with high-speed,low-error quantum key distribution modulation with slow thermal optical DC deviation and fast (10 GHz bandwidth) carrier depletion modulation, and implemented the COW protocol, BB84 polarization-encoded,and BB84 time-bin coding.[76]In 2017,the Sandia National Laboratory’s research team demonstrated a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that uses a generic structure for both transmit and receive functions.When the circuit acts as a transmitter,light passes through the MZM from both arms of the MZM through a term shifter amplitude modulator and a polarization beam splitting rotator,and finally through a polarization beam splitter achieves BB84 polarization encoding and decoding.[77]In 2018, the Massachusetts Institute of Technology’s research team demonstrated a silicon photonic QKD encoder in the first high-speed polarization QKD field test, designed with two MZMs and grating couplers encoder chip, demonstrating that photonic integrated circuits are a promising and scalable resource for forming future metropolitan quantum-secure communication networks.[78]In 2019,the Huawei research team introduced a time-bin approach to the silicon photonic transceiver,the silicon photonic emitter consists of three MZIs and one AMZI.The first MZI is used to generate the decoy state and the second MZI is used to balance the optical loss into the two arms of the AMZI.Through the AMZI,each laser pulse is divided into two time bins with the same intensity and a specific phase difference.The intensities of the two time-bin pulses are selectively modulated by the third MZI.As the refractive index changes when the chip temperature changes, the AMZI produces a large phase shift and the static operating point shifts, resulting in a large BER.The team designed and implemented a feedback procedure to correctly initialize and stabilize the static operating points of the two bases, thus reducing the quantum BER.[79]In 2020, Pan’s team demonstrated a 1.25 GHz silicon photonic chip using a polarization encoding MDI-QKD system with light pulses generated from a laser coupled into a silicon photonic emitter chip with an integrated intensity modulator, variable optical attenuator and polarization modulator,followed by Bell testing,a study that demonstrated the miniaturization, low-cost fabrication and compatibility of siliconbased MDI-QKD with CMOS microelectronics compatibility,among other advantages, as a promising solution for future quantum-safe networks.[41]In the same year,a research team at Peking University demonstrated a full-chip MDI-QKD system using integrated silicon photonic technology, including two transmitter chips and a server chip.For each transmitter chip, a pulse-modulated laser is coupled to a silicon waveguide via a grating coupler.The first MZI modulator generates the signal and decoy state by varying the laser intensity,and another phase modulator performs random phase modulation of the input pulse to ensure the assumption of phase randomization, which then enters the polarization modulator for modulation.[42]In 2021, an Italian research team proposed a silicon-based encoder for daylight quantum key distribution at 1550 nm.[80]Nanjing University achieved a heterogeneous integration of superconducting silicon photonic chip.[44]The Institute of Semiconductor Research, Chinese Academy of Sciences, carried out research on the application of silica AMZI in QKD coding and decoding in recent years,[81]and the optimal interferometric temperature point of single-light-level AMZI chip was obtained by using pulse selfinterference method.In 2022, researchers from the University of Science and Technology of China proposed a prototype QKD transmitter by developing integrated silicon photonics and electronics technologies.[82]Researchers at the Institute of Semiconductors, Chinese Academy of Sciences proposed a simplified and reconfigurable silicon photonic encoder.[83]Researchers at the USTC used silica AMZI integrated with Faraday mirrors to improve the optimal interferometric antipolarization performance,[84]achieving a secure key rate of 1.34 Mbps at 50 km.In 2023, the University of Science and Technology of China achieved a hundred-megabit-rate QKD by developing key technologies such as high-fidelity integrated photonic quantum state manipulation and high-countrate superconducting single-photon detection.[85]Swiss and Italian scientists jointly developed a high-speed integrated QKD system.[86]Table 2 shows the research progress of silicon-based QKD.

    Table 2.The research progress of silicon-based QKD.

    4.Quantum light sources

    Quantum light sources produce non-classical light states such as single photons or entangled photon pairs,which are essential for a wide range of quantum applications such as quantum key distribution, quantum computing, quantum sensing,etc.QKD systems can be divided into discrete-variable and continuous-variable protocols depending on the protocol.The light sources for both are called discrete and continuous light sources, respectively.Discrete light sources are most commonly known as single photon sources, single photon entanglement sources and weak single photon sources, while continuous light sources are most commonly known as Gaussian sources.Several quantum light sources are described next.

    4.1.Quantum dot based sources

    Quantum dot (QD) light sources are semiconductor nanostructures that produce single photons through a process of radiative compounding of excitons confined within the QD.Due to their unique size dependence,quantum dots exhibit discrete energy levels that result in quantized electronic states.This quantization of energy levels allows the production of single photons with well-defined wavelengths, making QD light sources particularly suitable for quantum communication and computing applications.

    Significant progress has been made in recent years in the development and optimization of QD light sources.Some of the notable advances in this area include the following aspects.

    Material systems: various material systems have been investigated to fabricate quantum dot light sources, and the choice of material system plays a critical role in determining the emission wavelength and performance of QD light sources.For example, InAs/GaAs QDs emit photons in the near-infrared region, making them suitable for telecommunication applications,and more research on InAs/GaAs QDs can be read.[90]Research has focused on optimizing growth techniques such as molecular beam epitaxy (MBE) and chemical vapour deposition(CVD)[91]to achieve high quality quantum dot structures with narrow emission linewidths, high quantum efficiencies and low multiphoton emission probabilities.Deterministic quantum dot emission: one of the main challenges for quantum dot light sources is to achieve deterministic emission of single photons with well-controlled spatial and spectral properties.Reference [92] summarizes the research progress and challenges of chip-integrated deterministic quantum light sources.Researchers have demonstrated various techniques to improve the determinism of quantum dot emission,such as cavity-enhanced QD emission[93-95]and spectral filtering.[96]Cavity-enhanced quantum dot emission relies on coupling the quantum dot to an optical cavity (e.g.,a microdisk or photonic crystal cavity),thereby increasing the spontaneous emission rate and making single photon emission highly efficient and directional.Spectral filtering techniques involve the use of optical filters, such as standard fixtures or wavelength-selective couplers,to selectively transmit photons with the desired wavelength, thereby increasing the spectral purity of the emitted photons.

    Integration with photonic structures: the integration of QD light sources with photonic structures such as waveguides,beam splitters and multiplexers enables the realization of complex photonic circuits for quantum information processing.Recent advances in this field include monolithic integration of QD light sources with silicon and photonic platforms based on group III-V semiconductors,as well as the development of hybrid integration techniques that combine the advantages of different materials.

    QD light sources have several ideal characteristics for QKD, such as high brightness, narrow linewidth, tunable wavelength,and compatibility with fiber networks.Moreover,QD can emit entangled photon pairs, enabling more efficient and robust QKD protocols, such as the BBM92 protocol.[97]QD can also be integrated with photonic structures: integrating QD light sources with photonic structures(such as waveguides, splitters, and multiplexers) can realize complex photonic circuits for quantum information processing.The latest advances in this field include monolithic integration of QD light sources with silicon and III-V semiconductor-based photonic platforms,and the development of hybrid integration techniques that combine the advantages of different materials.The information about integration with silicon, you can read Ref.[98], which improves the performance and reliability of QD-based QKD systems.

    However,QD light sources also face some challenges and limitations in QKD applications.For example, QD usually requires low temperature and complex control techniques to achieve high-quality single-photon or entangled photon emission.QDs are also affected by decoherence and noise effects,which degrade the quantum state of the emitted photons, reducing the security and key rate of QKD.In addition,QDs are sensitive to fabrication defects and environmental fluctuations,which affect their emission characteristics and stability.

    Therefore,QD light sources have great potential in QKD applications,but also need further development and optimization to overcome their drawbacks.Reference [99] provides a good review of the research progress and applications of QD in QKD,and some research groups have demonstrated proof-ofprinciple experiments of QKD using QD light sources.[100,101]In 2022,a research group from Technische Universit¨at Berlin reported on the first QKD testbed using a compact benchtop quantum dot single-photon source operating at telecom wavelengths.[102]Heriot-Watt University achieved asymptotic positive key rate in 175 km telecom fiber based on QD,[10]which is a step toward long-distance single-photon emission quantum networks.Sapienza University of Rome’s research team implemented a quantum communication protocol during daytime for the first time using a quantum dot source.[104]But to achieve practical and robust QKD systems based on QD,more efforts are needed.

    4.2.Spontaneous parameter down-conversion sources

    Spontaneous parametric down-conversion (SPDC) has become an essential tool for generating entangled photon pairs, which play a significant role in quantum communication and computation.SPDC occurs when a nonlinear crystal is pumped with high-energy photons, which subsequently decay into two lower-energy photons with conservation of energy and momentum.The process can be classified into two types: type-I, where both down-converted photons have the same polarization,and type-II,where the photons have orthogonal polarizations.The entanglement of photon pairs can be established in various degrees of freedom,including polarization,spatial modes,and time-frequency domains.

    The efficiency of the SPDC process depends on several factors,such as the phase-matching condition,the choice of nonlinear crystal, and the pump beam properties.Phase matching, which ensures momentum conservation, is critical for achieving high conversion efficiency.Different techniques,like birefringent phase matching and quasi-phase matching,can be employed to fulfill the phase-matching condition.More on SPDC can be found in the Ref.[105].

    SPDC light sources are light sources that generate single photons or entangled photon pairs using the spontaneous parametric down-conversion process.SPDC light sources have some advantages and disadvantages in QKD applications.Advantages: SPDC single-photon sources can produce high-quality entangled photon pairs with good coherence and polarization properties;[106]SPDC single-photon sources can greatly improve the secure transmission distance in QKD applications.[107]Disadvantages: SPDC light sources require precise control of laser intensity and phase matching conditions to achieve high-quality single photon or entangled photon emission.These conditions may be affected by environmental factors such as temperature, humidity, mechanical vibration, etc., resulting in reduced stability and reliability of SPDC light sources; SPDC light sources may produce excess multi-photon pairs, which reduce the purity and fidelity of single photon or entangled photon pairs.To eliminate this effect, complex techniques such as time-division multiplexing or photon-number-resolving detectors are required;SPDC single-photon sources require complex experimental setups,including stable pump lasers,nonlinear crystals,narrow-band filters and low-noise detectors.The system’s practicality is still lower than that of weak coherent source.

    4.3.Four-wave mixing sources

    Four-wave mixing(FWM)is a third-order nonlinear optical process that enables the generation of correlated and entangled photon pairs.FWM has attracted considerable attention due to its compatibility with integrated photonic platforms,tunability,and the potential for generating photon pairs at telecom wavelengths.

    FWM arises from the interaction of multiple optical waves in a nonlinear medium, resulting in the generation of new frequency components.The process involves the mixing of three input waves with frequenciesω1,ω2, andω3to generate a fourth wave with frequencyω4.The energy and momentum conservation conditions must be satisfied for efficient FWM to occur.

    In the context of quantum information processing,FWM is typically employed in the degenerate regime, where two pump photons at frequencyωpinteract to create signal and idler photons at frequenciesωsandωi,respectively.The generated photon pairs can exhibit quantum correlations in various degrees of freedom,such as time-frequency and spatial modes.

    Compared to other methods of generating entangled photons, such as SPDC or quantum dot sources, QKD based on FWM has some advantages and disadvantages.Some of the advantages are: FWM can produce high-quality, highbrightness, low-noise entangled photons, which can improve the key rate and transmission distance of QKD systems;FWM can be implemented on various platforms, such as fibers,waveguides or microresonators, which can facilitate the integration and scalability of QKD systems; FWM can generate entangled photons at telecom wavelengths, compatible with existing optical communication infrastructure and equipment.Some of the disadvantages are: FWM requires high pump power and precise phase matching conditions,which increase the complexity and cost of QKD systems; FWM is sensitive to environmental fluctuations (such as temperature or polarization changes), which degrade the quality and stability of entangled photons;FWM may suffer from crosstalk and interference from other optical signals in the same medium,which reduces the security and efficiency of QKD systems.QKD based on FWM is an active research topic in quantum communication, and some recent advances include: in 2019, a team from Singapore reported a chip-scale CV-QKD system based on silicon photonics integration.[87]They achieved a key rate of 0.14 kbit/s over 100 km fiber transmission, demonstrating the potential of low-cost and compact QKD devices.In 2020,the University of Science and Technology of China in collaboration with Tsinghua University reported a 509 km ultralow-loss fiber transmission QKD based on an improved twinfield protocol and superconducting nanowire single-photon detectors.[108]They achieved a key rate of about 0.1 bit/s,setting a new record for discrete-variable QKD systems.In 2023, the University of Science and Technology of China reported a 1002 km point-to-point fiber transmission QKD based on low-crosstalk phase reference signal control and ultra-lownoise single-photon detectors.[63]They achieved a key rate of 0.002 bit/s, breaking the record for repeaterless fiber-based QKD.

    5.Quantum detectors

    Quantum detectors play a vital role in a variety of quantum information processing applications.They are used to measure and manipulate quantum states in quantum communication systems,quantum computing architectures and quantum sensing devices.Three prominent types of quantum detectors are avalanche photodiode detectors (APD), quantum dot detectors and superconducting nanowire single photon detectors(SNSPD).The system parameters of single-photon detectors include: spectral range,dead time,dark count rate,detection efficiency, timing jitter and photon-number-resolving capability.[109]

    5.1.Single-photon avalanche photodiodes

    Single-photon avalanche photodiodes are semiconductorbased detectors that operate in Geiger mode.When a single incident photon triggers a carrier multiplication snow, a detectable current pulse is generated.One of the main challenges of APDs is the high dark count rate, i.e., the rate at which the detector produces a signal without any photons.This is caused by the thermal generation of electron-hole pairs in the depletion region, which can trigger an avalanche.Various techniques have been developed to reduce the dark count rate, including cooling the APD to low temperatures, gating the APD to reduce the detection time window, and improving the quality of the diode structure to reduce the number of defect states.The advantages of APD include: high sensitivity, compact structure, high gain and high accuracy, etc.,and its disadvantages include high dark count rate,high working voltage, etc.Reference [110] introduces several types of avalanche photodiode detectors made of different materials.With the advancement of research and technology, avalanche photodiodes will evolve towards higher performance, lower noise,lower cost,higher speed,etc.For example,researchers from the University of California Santa Barbara reported low dark current high gain InAs quantum dot avalanche photodetectors monolithically grown on Si.[111]The Ohio State University researchers reported high gain, low noise 1550 nm GaAsSb/AlGaAsSb avalanche photodiodes.[112]In QKD, researchers have studied the performance of differential phase shift quantum key distribution using InGaAs/InP and silicon APD.[113]Researchers will continue to explore new semiconductor materials,improve semiconductor processes,and optimize device structures and circuit designs to enhance the performance of APD.

    5.2.Single-photon detectors based on quantum dots

    A quantum dot detector is a device that utilizes the optoelectronic properties of quantum dots to detect infrared light.Quantum dots are semiconductor nanostructures with dimensions in the nanometer scale,with tunable energy band structure and discrete energy levels,so that selective absorption and emission of infrared light at different wavelengths can be realized.Quantum dot detectors have a wide range of applications, such as night vision, medical imaging, environmental monitoring,and quantum information.

    The working principle of quantum dot detectors can be divided into two parts: photoelectric conversion and electron amplification.In the photoelectric conversion part,when a photon enters a quantum dot, it excites electrons, making the quantum dot a positively charged hole.These holes are blocked by a barrier layer to prevent them from flowing back into the quantum dot.The holes are then pushed towards the electrodes by the electric field,which in turn creates an electric current.This process is therefore the conversion of photon energy into electron energy.In the electron amplification section,a gain region is placed around the current electrode.A high voltage is applied to the gain region to create a high field.As the electrons pass through the gain region, they interact with the ions in the region,creating electron-hole pairs which continue to move and enter the current electrode to create a larger current.The process is therefore one of converting one electron into multiple electrons, resulting in the amplification of electrons.Because the process of electron amplification amplifies not only the signal current but also the noise current,quantum dot detectors are usually somewhat noisy.To reduce the noise, filters can be added to the detector or a low-noise amplifier can be used,for example.

    The advantages of quantum dot detectors include high sensitivity, tunable band gap, simple fabrication and high integration, etc., and their disadvantages include poor stability,high defect density, etc.The research on quantum dot detectors has made some important progress, but also faces some challenges and problems.At present, quantum dot detectors are mainly divided into two categories: epitaxial quantum dot detectors (eQDIPs) and colloidal quantum dot detectors (cQDIPs).Epitaxial quantum dot detectors are fabricated by growing quantum dot arrays with regular arrangement and high crystalline quality on semiconductor substrates using techniques such as molecular beam epitaxy (MBE) or metal organic chemical vapor deposition(MOCVD),and then making electrodes and packaging.Colloidal quantum dot detectors are fabricated by synthesizing quantum dot particles with different compositions and sizes using solution methods, and then forming thin films or arrays by self-assembly or inkjet printing, and then making electrodes and packaging.Epitaxial quantum dot detectors have high photoelectric conversion efficiency and response speed,but also have some drawbacks, such as high growth temperature, long growth cycle,high growth cost, difficulty in wavelength tuning, low pixel density, etc.Colloidal quantum dot detectors have low production cost and high pixel density,and can achieve detection of wide-band infrared light, but also have some drawbacks,such as low carrier mobility, high defect density, poor stability, etc.In recent years, with the innovation of material synthesis and device design,the performance of quantum dot detectors has been significantly improved.For example, in the field of epitaxial quantum dot detectors,the detection of midwave infrared (MWIR) and long-wave infrared (LWIR) light was achieved by optimizing the quantum dot structure and material composition;[114]the photoelectric gain and responsivity were improved by introducing heterostructures and multilayer structures;[115]the pixel density and sensitivity were improved by using new readout circuits (ROIC).[116]In the field of colloidal quantum dot detectors, the carrier transport performance and surface passivation effect were improved by combining with materials such as metal halide perovskites,graphene, carbon nanotubes, etc.[114]The gain and response speed were improved by adopting different structures such as photodiode type,photoconductive type or field effect transistor type; large-area infrared imaging was realized by integrating with CMOS or TFT readout circuits.Although some breakthroughs have been made in quantum dot detectors, there are still many problems and challenges to overcome: to improve the detection rate and sensitivity of quantum dot detectors.This requires further optimization of the material composition,size,morphology,structure,surface modification,etc.,of quantum dots to improve their light absorption and emission efficiency,reduce defect density and Auger recombination,enhance carrier separation and transport,reduce dark current and noise,etc.,to expand the detection wavelength range of quantum dot detectors.At present, most quantum dot detectors are limited to the short-wave infrared (SWIR) region, while the detection of MWIR and LWIR regions is still challenging.This requires the development of new quantum dot materials,such as lead salt, mercury telluride, indium antimonide, etc.,to achieve absorption and emission of longer wavelength infrared light, and to solve the problems of stability, toxicity,processability,etc.of these materials;to reduce the fabrication cost and complexity of quantum dot detectors.At present,most quantum dot detectors rely on high-temperature, highvacuum, high-precision equipment and processes for fabrication,which limits their scale production and application.This requires the development of new methods for quantum dot synthesis and assembly, such as liquid-phase exchange, solgel, spin coating, etc., to achieve high-quality quantum dot films or arrays under low-temperature, atmospheric pressure and low-cost conditions.And integrate them effectively with readout circuits to improve the stability and reliability of quantum dot detectors.At present, most quantum dot detectors show performance degradation or failure under the influence of environmental factors(such as temperature,humidity,oxygen, etc.), which affect their service life and safety.This requires improving the surface protection layer and packaging layer of quantum dots to enhance their resistance to environmental factors, and conduct systematic aging tests and fault diagnosis to evaluate their stability and reliability.Quantum dot detectors are less used in the QKD field,mainly focusing on quantum dot light sources.

    5.3.Superconducting nanowire single-photon detectors

    Superconducting nanowire single-photon detectors(SNSPD) are based on the principle of detecting changes in the resistance of superconducting materials caused by photon absorption.When a photon is absorbed, it creates a localized region of normal conductivity in the superconducting wire, resulting in a measurable change in resistance.Further reviews of superconducting nanowire detectors can be found in Refs.[62-64].The advantages of SNSPD include high detection efficiency, low dark count rate, small timing jitter, short dead time and wide spectral response, etc., and its disadvantages include low working temperature, complex equipment,etc.In recent years,SNSPD technology has made great progress, constantly refreshing the performance indicators such as detection efficiency, dark count rate, timing jitter and dead time.In addition, researchers are also striving to push SNSPD technology to the next level: to achieve photon counting, fast time-tagging imaging and multi-pixel technology, and to be compatible with quantum photonic integrated circuits.The detection efficiency and time resolution of SNSPD are related to the temperature, so researchers are looking for a superconducting material that can work at high temperature to reduce the cooling cost and improve the system reliability.Researchers at the Massachusetts Institute of Technology achieved single-photon detection using hightemperature superconductors,[117]expanding the family of superconducting materials.The detection efficiency and time resolution of SNSPD are also related to the geometry and topology of the nanowire,so researchers are exploring different nanowire designs to optimize the performance of SNSPD.For example, a spiral nanowire was proposed, which can increase the probability of photon-nanowire interaction and thus improve the detection efficiency.[118]In addition, a nanowire structure based on a superconducting quantum interference device(SQUID)was proposed,[119]which can achieve photon number resolution.SQUID is an instrument that uses the characteristics of superconducting materials to detect magnetic field changes.It can be used to measure extremely weak magnetic field signals, with high sensitivity and time resolution.The application fields of SNSPD are also expanding,in addition to quantum information,bioimaging,photodetection and ranging,etc.,SNSPD can also be used in astronomy,medicine,security detection and other aspects.[120]In QKD,German researchers designed a rack-sized multi-channel SNSPD system to achieve ultrafast QKD.[121]Researchers from the University of Science and Technology of China demonstrated a fiberbased dual-field QKD over 1002 km using SNSPD to suppress noise to about 0.02 Hz.[122]More research on superconducting nanowire detectors can be found in Refs.[122,123].

    6.QKD based on optical fibre

    6.1.QKD for telecommunication wavelengths

    Telecommunication wavelengths QKD typically operate in the C-band (1530 nm-1565 nm) and L-band (1565 nm-1625 nm), where fibre transmission has minimal attenuation due to the inherent properties of silica-based fibres.These wavelengths are suitable for long distance transmission as they coincide with the lowest loss window in the fibre,which is essential for maintaining the quantum state of the photon.In addition,QKD at communication wavelengths benefits from mature and developed technologies such as high-quality laser sources,detectors and optical fibre components designed for communication networks.In contrast, other wavelength QKD systems operate outside the traditional telecommunication wavelength range with high losses in fibre transmission,and experiments with spatial QKD are carried out in Ref.[124]using 850 nm wavelengths.

    6.2.Quantum relay technology

    As the communication distance increases, the communication capability becomes worse, and currently, the maximum transmission distance of an optical fibre-based QKD system without quantum repeaters is 658 km for ultra-low loss transmission fibre transmission.[125]Instead, there are two solutions to achieve long-range communication, one is satellite-based quantum communication, and the other is to use quantum repeaters.[126]The core technologies in quantum repeaters include entanglement switching,[127]entanglement purification[128]and quantum storage,[129]and a detailed description of quantum repeaters can be found in Ref.[130].There are several reasons that hinder the development of quantum repeater technology.Firstly, quantum repeaters: several metrics for assessing the performance of quantum machines are discussed in Ref.[131],including fidelity,efficiency,storage time, bandwidth, capacity to store multiple photons and dimensionality and wavelength.

    Performance improvements remain a challenge.Atomic heterostructures, trapped ions and rare-earth ion-doped crystals,among others,[132]are among the most promising candidates for quantum memory, but each has its own set of difficulties, such as sensitivity to environmental noise, scalability and system complexity.Second, quantum entanglement generation: quantum relays rely on the distribution of entangled quantum bit pairs between distant nodes.The generation of such entangled pairs is hampered by the exponential decay of entanglement fidelity,also known as the photon loss problem,caused by fibre fading and detector inefficiencies.Third, entanglement exchange: to establish entanglement between remote nodes, entanglement exchange is required.This operation involves performing Bell state measurements (BSM) on incoming quantum bits and is technically challenging.Fourth,quantum error correction: quantum repeaters must efficiently manage the errors introduced during entanglement generation,distribution and processing.Fifth: scalability and integration:quantum repeater networks need to be scalable and interoperable with other quantum communication systems.Designing scalable and efficient quantum repeater architectures that can be integrated with existing fibre-optic networks and future quantum internet infrastructures is a complex task.Sixth,materials and fabrication challenges: implementing quantum repeater technology requires the development of suitable materials and fabrication techniques to achieve the required performance while maintaining low-loss and low-noise levels.This includes the development of low-loss waveguides, highefficiency photonic detectors, and optimized manufacturing processes for quantum memories and other components of quantum repeater systems.The above points are also areas that researchers need to focus on.

    6.3.Challenges

    Signal attenuation due to fibre loss and scattering is a major challenge for fibre-based QKD systems.As the distance between communicating parties increases, the potential for photon loss also increases, resulting in a reduction in key generation rate and secure communication range.How to improve the secure communication range with low BER is a concern for fibre optic QKD systems.

    7.Space QKD system

    Space QKD enables secure long-range quantum communications by overcoming the distance limitations of terrestrial QKD systems that rely on fibre-optic or free-space links.By using satellites,space QKD can establish secure links between ground stations located on different continents,greatly extending the range of secure quantum communication networks.Space QKD has the following steps to achieve this.Firstly,Alice prepares a series of quantum bits, which are quantum states encoded in particles such as photons, and Alice uses a free-space optical link to send the prepared quantum bits to the satellite via the ground station.Secondly,the satellite acts as a trusted node or relay during the communication process.This step is where the space environment comes into play, as the quantum bits must travel through the Earth’s atmosphere and possibly through the vacuum of space, which can introduce transmission losses,noise and other interference.Finally,the satellite receives the quantum bits and performs quantum operations on them, or simply relays them to another ground station where the second party(Bob)is located.

    7.1.Satellite-based QKD

    7.1.1.Mozi satellite

    On 16 August 2016, China launched the world’s first quantum science experiment satellite,Mozi,from the Jiuquan Satellite Launch Centre.The main objective of the satellite is to demonstrate the feasibility of using satellite links for secure long-range quantum communication.The satellite is equipped with a range of advanced quantum communication technologies,including an entangled photon source,a single photon detector and an ultrafast polarization modulator.These technologies enable Mozi to perform a variety of quantum communication experiments, including entanglement-based QKD,decoy state QKD and entanglement distribution.In 2017,Pan’s team reported the first satellite-to-ground quantum communication experiment at a distance scale of more than 1200 km using the Mozi satellite,[122]demonstrating the distribution of two entangled photons from a satellite to two ground stations separated by 1203 km,and observing the survival of entanglement and violation of Bell’s inequality.[133]In 2020,entanglementbased QKD at a finite secret key rate of 0.12 bit/s between two ground stations separated by 1120 km without trusted relays being demonstrated, improving the efficiency of the link for two-photon distribution by a factor of about four compared to Ref.[134].In 2021,a large-scale fibre-optic network of more than 700 fibre-optic QKD links and two high-speed satellite-to-ground free-space QKD links, built an integrated space-to-ground quantum communication network for the first time.[135]

    7.1.2.Other satellite missions

    In the field of quantum key distribution,various countries have promoted the development of space quantum communication technology.Following the success of China’s Mozi satellite for satellite-based ground-based quantum key distribution,many countries and organizations have launched their own space QKD programmes.For example, the European Space Agency’s SAGA project: the SAGA project aims to establish a global quantum communications network that uses satellite technology to provide high-speed, secure quantum key distribution between ground sites.The objectives of the project include research and development of quantum communication technologies applicable to satellites,determination of key performance parameters for quantum communication satellites and assessment of requirements for practical application scenarios.Canada’s QEYSSAT project aims to demonstrate the application of quantum key distribution technology for secure online communications on earth.

    7.2.Satellite-to-ground satellite links

    Satellite-ground links refer to the establishment of quantum communication links between satellites and ground stations.The focus of research on satellite-ground links includes challenges such as overcoming atmospheric turbulence,reducing background noise and improving receiver sensitivity.In recent years,researchers have successfully solved these problems and demonstrated the feasibility of satellite-ground links.[124,133-135]

    7.3.Satellite-based QKD

    Satellite-satellite links refer to the technology for establishing quantum communication links in space, by transmitting quantum bits between two or more satellites in orbit.Such a link allows quantum communication on a global scale and enables complex quantum network topologies.Research on satellite-satellite links is still in its infancy.At present, the focus of research includes improving the alignment and tracking accuracy between satellites, reducing the influence of the space environment on the quantum state, and improving the stability of the link.

    7.4.Intercontinental satellite links

    Intercontinental satellite links are satellites that enable quantum communications between different continents.This kind of link can greatly extend the coverage of quantum communication and achieve secure communication on a global scale.The Mozi satellite has successfully realized an intercontinental quantum communication link between China and Austria.[136]

    7.5.Challenge and prospects

    There are the following challenges, firstly, atmospheric turbulence: atmospheric turbulence can cause photons to be deflected during transmission, thus affecting the alignment accuracy between the satellite and the ground station.Researchers need to develop stable adaptive optics to overcome the effects of atmospheric turbulence.Second,alignment and tracking: in space quantum communications, accurate alignment and tracking between satellites and ground stations is critical.High precision and high speed alignment and tracking techniques need to be developed to ensure the stability of the communication link.Thirdly, background noise: background light such as sunlight can cause interference to quantum communications and reduce communication efficiency.Solving this problem requires studying how to filter background noise and improve the sensitivity of the receiver.Fourth,signal loss:in space communication links,signal loss is a major challenge.To reduce signal loss, researchers need to optimize photon sources and improve the sensitivity of detectors and investigate more efficient quantum error correction techniques.

    Global quantum communication networks: with the development of quantum communication technology in space,the future promises to enable quantum communication networks on a global scale, thus providing highly secure communication services.Satellite-satellite links: researchers will continue to explore satellite-satellite quantum communication technologies to enable more complex quantum network topologies.Intercontinental quantum communications: with advances in space quantum communication technology,quantum communications between different continents may be possible in the future, further extending the reach of quantum communications.Quantum satellite clusters: researchers may investigate the use of multiple quantum satellites to form clusters to improve communication efficiency,coverage and reliability.In conclusion,space quantum key distribution technology faces a number of challenges, but as research progresses and technology advances, a highly secure quantum communication network on a global scale becomes possible in the future.

    8.Application and prospects

    8.1.Secure communications

    One of the most obvious applications for QKD is secure communications,where QKD allows both parties to establish secure encryption keys that cannot be intercepted or copied by eavesdroppers.This makes it ideal for situations where secure communications are critical, such as diplomatic communications,or commercial transactions where sensitive information is shared.The stability and transmission distance limitations of quantum channels are important challenges.The fidelity of quantum bits decreases during long-distance transmission,resulting in an increase in bit error rates,which affects the security of the key.The use of quantum entangled states and quantum error-correcting codes can improve the stability of the channel.At the same time, the use of relay stations can extend the transmission distance.Relay stations can perform quantum entanglement distribution and error correction.

    8.2.Financial transactions

    QKD can also be used to protect financial transactions,especially those conducted over long distances.By using QKD, financial institutions can secure their transactions and protect their customers’ financial information from hackers and other malicious actors.Financial transactions require high levels of security and real-time performance.Traditional QKD systems may have limitations in transmission speed and realtime performance.Developing more efficient QKD protocols,such as continuous-variable QKD,can improve transmission speed.In addition,combining classical cryptography and quantum encryption can achieve higher real-time performance while ensuring security.

    8.3.Government applications

    QKD has many potential applications in government environments.For example, it can be used to protect classified communications, protect critical infrastructure communications on the battlefield.Government sectors require high levels of security and need to resist various advanced attack methods,such as quantum computer attacks.Developing quantum key distribution schemes can resist known quantum attacks, such as quantum relay attacks and quantum side-channel attacks.In addition,combining traditional information protection measures,such as physical security and multi-level encryption,can provide higher levels of defense.

    8.4.Internet of things security

    As the internet of things becomes more widespread,there is a growing need for secure communications between devices.QKD can be used to provide secure communications between IoT devices,protecting them from hacking and other security threats.Internet of things devices have limited resources and cannot support complex encryption and decryption operations,while also ensuring low-latency and efficient communication.Developing lightweight QKD schemes suitable for IoT environments,such as those based on quantum key binding.In addition,traditional encryption techniques combined with quantum secure communication can be explored to balance security and efficiency.

    8.5.Quantum internet

    QKD is also a key technology for the development of the quantum internet.The quantum internet will be a network of interconnected quantum computers and other devices that can share information in a completely secure and hacker-proof manner.Building a large-scale quantum internet requires highly reliable quantum nodes and complex quantum communication architectures,as well as efficient quantum routing and management.Developing scalable quantum network architectures, utilizing quantum relay stations to connect different nodes, enables the achievement of quantum communication across larger distances.At the same time, efficient quantum routing algorithms and network management strategies must be developed to ensure the stability and reliability of communication.

    9.Conclusion and perspectives

    We have summarized the research progress in QKD.For QKD protocols, quantum light sources and quantum detectors, the research focuses on improving the security of QKD.The trend of chip-based QKD is to continuously improve its key rate and transmission distance, as well as to reduce the BER.Fiber-based QKD and spatial QKD are also evolving and the application of QKD is very important.In addition,QKD is developing towards intelligence and network.Machine learning methods are expected to improve the performance of QKD systems to better meet the needs of secure communication.Machine learning methods can use historical data and real-time data to predict phase changes and zerophase voltages in QKD systems and control the corresponding devices in real time, thereby improving the stability and efficiency of the system;[137]machine learning methods can use LSTM networks to learn the data change rules in QKD systems and adjust the network parameters and structure dynamically according to environmental factors and device characteristics, thereby improving the intelligence and flexibility of the system;[138]machine learning methods can combine other coding schemes and QKD protocols to design more suitable features and labels, thereby improving the security and fault tolerance of the system.These methods need to be combined with in-depth quantum physics and cryptography expertise to fully exploit their potential and ensure system security.QKD networking can improve the interoperability,scalability,flexibility and robustness of quantum networks,as well as exploit the advantages of different QKD protocols, such as high key rates, high security, long distance transmission, etc.QKD networking requires solving some challenging problems,such as protocol conversion,[139]resource allocation, node architecture, network management, etc., and it can also be combined with other quantum communication technologies, such as quantum secure direct communication (QSDC) and quantum teleportation (QST), to achieve higher-level quantum information services.

    Future research and development will continue to promote the advancement of QKD technology so that it can be more widely applied to practical networks and communication systems.This development trend is expected to bring significant improvements to the field of information security,ensuring the privacy and integrity of communication data.Despite some progress, QKD also has many challenges.One of the main difficulties is to ensure security from the theory,and another difficulty is to ensure security from the device.Although the road of QKD development is full of challenges, its application prospect is still bright.

    Acknowledgments

    Project supported by the Innovation Program for Quantum Science and Technology (Grant No.2021ZD0300701),the National Key Research and Development Program of China(Grant No.2018YFA0306403),and the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB43000000).

    猜你喜歡
    春雪
    詩畫
    散文詩(2024年4期)2024-03-19 08:45:50
    春雪啊春雪
    徽州春雪
    江淮法治(2022年3期)2022-03-16 06:54:26
    春雪
    薛從倫
    南風(2020年32期)2020-12-09 08:35:02
    春雪
    北京春雪
    《關中春雪》(油畫)
    海燕(2017年5期)2017-05-12 03:01:18
    春雪
    春雪(攝影)
    亚洲婷婷狠狠爱综合网| 国产私拍福利视频在线观看| 久久久久久久亚洲中文字幕| 欧美激情在线99| 中文亚洲av片在线观看爽| 超碰97精品在线观看| 中文精品一卡2卡3卡4更新| 国产探花极品一区二区| 午夜激情欧美在线| 久久99热这里只有精品18| 国产亚洲精品av在线| 成人性生交大片免费视频hd| 亚洲av成人精品一二三区| 欧美+日韩+精品| 少妇熟女欧美另类| 亚洲国产欧美人成| 麻豆久久精品国产亚洲av| 国产av一区在线观看免费| 免费大片18禁| 2021天堂中文幕一二区在线观| 久久这里有精品视频免费| 亚洲最大成人手机在线| 久久久久久伊人网av| 免费无遮挡裸体视频| 午夜福利成人在线免费观看| 日本爱情动作片www.在线观看| 国产精品国产三级专区第一集| 国产精品野战在线观看| 好男人在线观看高清免费视频| 国产精品一及| 少妇高潮的动态图| 午夜精品国产一区二区电影 | 亚洲精品影视一区二区三区av| 少妇人妻一区二区三区视频| 欧美高清成人免费视频www| 能在线免费观看的黄片| 高清av免费在线| 成人毛片60女人毛片免费| 日本一本二区三区精品| 大香蕉97超碰在线| 免费看光身美女| 桃色一区二区三区在线观看| 久久久精品94久久精品| 男女啪啪激烈高潮av片| 91av网一区二区| 草草在线视频免费看| 成人三级黄色视频| 男人舔奶头视频| 国产精品久久久久久久电影| 丝袜喷水一区| 亚洲av免费高清在线观看| 亚洲精品色激情综合| 日本免费在线观看一区| 久久久a久久爽久久v久久| 最近手机中文字幕大全| 久久精品久久久久久噜噜老黄 | 亚洲一级一片aⅴ在线观看| av.在线天堂| 男女那种视频在线观看| 亚洲四区av| 国产av不卡久久| 边亲边吃奶的免费视频| av专区在线播放| 三级国产精品片| 校园人妻丝袜中文字幕| 国产一区二区在线观看日韩| 亚洲色图av天堂| 99久久成人亚洲精品观看| 午夜老司机福利剧场| 亚洲自偷自拍三级| 欧美精品一区二区大全| 免费一级毛片在线播放高清视频| 国产成人aa在线观看| 久久久精品94久久精品| 国产av在哪里看| 精品少妇黑人巨大在线播放 | 神马国产精品三级电影在线观看| 尾随美女入室| 中文字幕制服av| 亚洲精品影视一区二区三区av| 在线免费观看的www视频| 欧美精品一区二区大全| 伦精品一区二区三区| 九九爱精品视频在线观看| 最近手机中文字幕大全| 欧美一区二区国产精品久久精品| 91av网一区二区| 国产精品久久久久久久电影| 看片在线看免费视频| 久久精品国产99精品国产亚洲性色| 一二三四中文在线观看免费高清| 99久久中文字幕三级久久日本| 我的老师免费观看完整版| 欧美日本视频| 欧美高清性xxxxhd video| 免费观看的影片在线观看| 日本免费a在线| 亚洲av免费高清在线观看| 精品99又大又爽又粗少妇毛片| av专区在线播放| 亚洲中文字幕一区二区三区有码在线看| 成人三级黄色视频| 99在线人妻在线中文字幕| 97热精品久久久久久| 99热这里只有精品一区| 人人妻人人看人人澡| .国产精品久久| 日本免费一区二区三区高清不卡| 美女大奶头视频| 少妇的逼好多水| av视频在线观看入口| 在线免费观看不下载黄p国产| 男女那种视频在线观看| 国产探花极品一区二区| 免费看a级黄色片| АⅤ资源中文在线天堂| 精品久久久久久久久久久久久| 老师上课跳d突然被开到最大视频| 国产成人一区二区在线| 国产极品精品免费视频能看的| 亚洲真实伦在线观看| 草草在线视频免费看| 日韩强制内射视频| 91精品伊人久久大香线蕉| 熟女人妻精品中文字幕| 麻豆乱淫一区二区| 亚洲av不卡在线观看| 夜夜爽夜夜爽视频| 久久久久久久亚洲中文字幕| 亚洲不卡免费看| 日本一本二区三区精品| 国产精品久久久久久久久免| 91精品国产九色| 欧美变态另类bdsm刘玥| 亚洲欧美精品自产自拍| 精品国产三级普通话版| 一级毛片电影观看 | 日韩高清综合在线| 最近2019中文字幕mv第一页| 亚洲av不卡在线观看| 国产日韩欧美在线精品| 国产免费男女视频| 亚洲av日韩在线播放| 97人妻精品一区二区三区麻豆| 国产成人免费观看mmmm| 我的女老师完整版在线观看| 国产精品爽爽va在线观看网站| 嫩草影院精品99| 美女xxoo啪啪120秒动态图| 中文字幕熟女人妻在线| 男女边吃奶边做爰视频| 亚洲av一区综合| 久久99热这里只频精品6学生 | 成人性生交大片免费视频hd| 成人av在线播放网站| 非洲黑人性xxxx精品又粗又长| 久久精品久久久久久久性| 超碰97精品在线观看| 久久草成人影院| 久久精品国产99精品国产亚洲性色| 人妻系列 视频| 桃色一区二区三区在线观看| 国产精品蜜桃在线观看| 欧美高清成人免费视频www| 日韩欧美在线乱码| 伦精品一区二区三区| 熟妇人妻久久中文字幕3abv| 亚洲人成网站在线观看播放| 日日摸夜夜添夜夜添av毛片| av福利片在线观看| 欧美日韩综合久久久久久| 夫妻性生交免费视频一级片| 成年版毛片免费区| 在线a可以看的网站| 亚洲中文字幕一区二区三区有码在线看| 午夜日本视频在线| 日本午夜av视频| 日韩中字成人| 久久精品久久久久久噜噜老黄 | 国产91av在线免费观看| 久热久热在线精品观看| 成人二区视频| 日本黄色片子视频| 一卡2卡三卡四卡精品乱码亚洲| 夜夜爽夜夜爽视频| 欧美高清成人免费视频www| 色5月婷婷丁香| 久久久久久久久久成人| 欧美最新免费一区二区三区| 国内少妇人妻偷人精品xxx网站| 国产精品无大码| 在线观看一区二区三区| 日本wwww免费看| 五月玫瑰六月丁香| 国产精品女同一区二区软件| 嫩草影院入口| 国产精品熟女久久久久浪| 乱系列少妇在线播放| 免费在线观看成人毛片| 国产精品久久久久久久久免| 国产在视频线在精品| 亚洲三级黄色毛片| 波多野结衣巨乳人妻| 高清视频免费观看一区二区 | 国产毛片a区久久久久| 国产免费福利视频在线观看| 天天躁夜夜躁狠狠久久av| 亚洲成人精品中文字幕电影| eeuss影院久久| 免费av不卡在线播放| 美女xxoo啪啪120秒动态图| 99在线人妻在线中文字幕| av在线天堂中文字幕| 听说在线观看完整版免费高清| 久久久精品欧美日韩精品| 嫩草影院精品99| 我要搜黄色片| 日韩大片免费观看网站 | 日韩强制内射视频| av在线播放精品| 亚洲综合精品二区| 国产成人aa在线观看| 一级av片app| 国产综合懂色| 赤兔流量卡办理| 不卡视频在线观看欧美| 美女脱内裤让男人舔精品视频| 精品一区二区三区人妻视频| 国产三级在线视频| 丰满乱子伦码专区| 亚洲av熟女| 如何舔出高潮| 直男gayav资源| 赤兔流量卡办理| 在线观看66精品国产| 日韩精品青青久久久久久| 3wmmmm亚洲av在线观看| 亚洲精品久久久久久婷婷小说 | 久久精品国产自在天天线| 色综合亚洲欧美另类图片| 天堂√8在线中文| 欧美一区二区亚洲| 亚洲高清免费不卡视频| 久热久热在线精品观看| 一个人看视频在线观看www免费| ponron亚洲| 亚洲18禁久久av| 能在线免费看毛片的网站| 久热久热在线精品观看| 欧美高清成人免费视频www| 国产免费福利视频在线观看| 亚洲国产精品专区欧美| 久久久精品94久久精品| 国产片特级美女逼逼视频| 青春草视频在线免费观看| 人妻夜夜爽99麻豆av| 麻豆国产97在线/欧美| 日韩一区二区三区影片| 亚洲国产精品合色在线| 亚洲av.av天堂| 午夜免费激情av| 久久久久久久亚洲中文字幕| 身体一侧抽搐| 亚洲av免费在线观看| 午夜福利视频1000在线观看| 欧美一级a爱片免费观看看| 中文亚洲av片在线观看爽| 国产亚洲91精品色在线| 国产精品一区www在线观看| 少妇熟女aⅴ在线视频| 日韩大片免费观看网站 | 久久人妻av系列| 日韩欧美 国产精品| 国产视频首页在线观看| 女的被弄到高潮叫床怎么办| 插逼视频在线观看| 嫩草影院精品99| 亚洲精品一区蜜桃| 插逼视频在线观看| 欧美性猛交黑人性爽| 狂野欧美白嫩少妇大欣赏| 国产在线男女| 看非洲黑人一级黄片| 美女cb高潮喷水在线观看| 国产亚洲av片在线观看秒播厂 | 免费人成在线观看视频色| 亚洲精品亚洲一区二区| av卡一久久| 日韩欧美国产在线观看| 国产成人精品久久久久久| 99热网站在线观看| 亚洲欧美清纯卡通| 成人美女网站在线观看视频| 夜夜看夜夜爽夜夜摸| 免费不卡的大黄色大毛片视频在线观看 | 我的老师免费观看完整版| 欧美精品国产亚洲| av女优亚洲男人天堂| 久久久欧美国产精品| 日本与韩国留学比较| 天美传媒精品一区二区| 女的被弄到高潮叫床怎么办| 在线天堂最新版资源| 国产精品女同一区二区软件| 亚洲欧美精品综合久久99| 女人久久www免费人成看片 | 韩国av在线不卡| 久久久久国产网址| 国产不卡一卡二| 日本av手机在线免费观看| 一卡2卡三卡四卡精品乱码亚洲| 人体艺术视频欧美日本| 久久人人爽人人爽人人片va| 人妻系列 视频| 一个人看的www免费观看视频| 黑人高潮一二区| 午夜激情福利司机影院| 少妇熟女aⅴ在线视频| 日韩大片免费观看网站 | av黄色大香蕉| 91久久精品电影网| 综合色丁香网| 久久久久久久国产电影| 永久网站在线| 18禁在线播放成人免费| 亚洲美女搞黄在线观看| 少妇高潮的动态图| 亚洲精品乱久久久久久| 亚洲成人久久爱视频| 全区人妻精品视频| 一边摸一边抽搐一进一小说| 亚洲成人av在线免费| 国产黄片视频在线免费观看| 天天一区二区日本电影三级| 免费观看性生交大片5| 国产精品人妻久久久久久| 久久精品影院6| 男女那种视频在线观看| 国产欧美另类精品又又久久亚洲欧美| 中文在线观看免费www的网站| 精品国产三级普通话版| av线在线观看网站| 亚洲欧美成人综合另类久久久 | 亚洲国产精品专区欧美| 精品人妻一区二区三区麻豆| 日韩制服骚丝袜av| 国产精品久久电影中文字幕| 色噜噜av男人的天堂激情| 嘟嘟电影网在线观看| 国产三级在线视频| 久久精品国产99精品国产亚洲性色| 日产精品乱码卡一卡2卡三| 最近的中文字幕免费完整| 午夜福利网站1000一区二区三区| 国产精品熟女久久久久浪| 在线天堂最新版资源| 午夜福利在线观看吧| 亚洲色图av天堂| 女人十人毛片免费观看3o分钟| 亚洲在久久综合| 舔av片在线| 国产又色又爽无遮挡免| 国产视频首页在线观看| 色5月婷婷丁香| 一级二级三级毛片免费看| 麻豆一二三区av精品| 久久久久久国产a免费观看| 欧美潮喷喷水| 欧美性猛交黑人性爽| 精品久久久久久久人妻蜜臀av| 国产成人福利小说| 看黄色毛片网站| 九九热线精品视视频播放| 免费一级毛片在线播放高清视频| 男女边吃奶边做爰视频| kizo精华| 日本免费a在线| 欧美激情国产日韩精品一区| 岛国在线免费视频观看| 网址你懂的国产日韩在线| 亚洲欧美日韩卡通动漫| 亚洲成色77777| 91精品伊人久久大香线蕉| 成年版毛片免费区| 午夜老司机福利剧场| 插逼视频在线观看| 精品欧美国产一区二区三| 成年女人看的毛片在线观看| 国产老妇伦熟女老妇高清| 成年女人看的毛片在线观看| 成人av在线播放网站| 22中文网久久字幕| 三级毛片av免费| 婷婷色麻豆天堂久久 | 久久精品夜夜夜夜夜久久蜜豆| 成人二区视频| 久久精品夜夜夜夜夜久久蜜豆| 亚洲精品乱码久久久v下载方式| 婷婷六月久久综合丁香| 天堂影院成人在线观看| 亚洲国产欧洲综合997久久,| 麻豆一二三区av精品| 日韩强制内射视频| 国产免费男女视频| 91精品伊人久久大香线蕉| 免费av不卡在线播放| 性色avwww在线观看| 欧美区成人在线视频| 午夜老司机福利剧场| 日本免费在线观看一区| 亚洲欧美中文字幕日韩二区| 日本五十路高清| 久久精品国产亚洲网站| 91aial.com中文字幕在线观看| 亚洲精品456在线播放app| eeuss影院久久| 欧美成人午夜免费资源| 亚洲精品乱久久久久久| 天堂av国产一区二区熟女人妻| 亚洲欧洲日产国产| 91狼人影院| 国产精品女同一区二区软件| 99久久九九国产精品国产免费| 卡戴珊不雅视频在线播放| 国产白丝娇喘喷水9色精品| 亚洲国产最新在线播放| 午夜福利网站1000一区二区三区| 久久人人爽人人片av| 国产午夜精品久久久久久一区二区三区| 日本黄色片子视频| 午夜a级毛片| 亚洲天堂国产精品一区在线| 少妇的逼好多水| 久久久久久久久中文| 国产亚洲午夜精品一区二区久久 | videos熟女内射| 免费电影在线观看免费观看| av专区在线播放| 九九热线精品视视频播放| 国产成人一区二区在线| 天天躁日日操中文字幕| 国产极品精品免费视频能看的| 成人性生交大片免费视频hd| 亚洲自拍偷在线| 亚洲人成网站在线播| 久久99热这里只有精品18| 国产一区有黄有色的免费视频 | 免费大片18禁| 国产精品1区2区在线观看.| 毛片女人毛片| 日日啪夜夜撸| 亚洲人成网站在线播| 色吧在线观看| 又爽又黄a免费视频| 久久精品夜夜夜夜夜久久蜜豆| 午夜福利视频1000在线观看| 久久久久性生活片| 你懂的网址亚洲精品在线观看 | 亚洲人成网站在线观看播放| 亚洲国产精品专区欧美| 一二三四中文在线观看免费高清| 五月玫瑰六月丁香| 久久精品国产亚洲网站| 国产极品精品免费视频能看的| 一区二区三区免费毛片| 国产精品一区二区在线观看99 | 日韩制服骚丝袜av| 久久久久久久久久久丰满| 国产精品av视频在线免费观看| 亚洲精品乱码久久久v下载方式| 免费观看a级毛片全部| 麻豆av噜噜一区二区三区| 国内少妇人妻偷人精品xxx网站| 久久久色成人| 人妻夜夜爽99麻豆av| 一本一本综合久久| 夜夜看夜夜爽夜夜摸| 亚洲欧美清纯卡通| 国产老妇女一区| 69av精品久久久久久| 国产精品不卡视频一区二区| 色综合站精品国产| 人人妻人人看人人澡| 激情 狠狠 欧美| 日韩视频在线欧美| 国产精品一区二区三区四区久久| 高清在线视频一区二区三区 | 超碰av人人做人人爽久久| 免费观看精品视频网站| 久久久久久久久大av| 免费看日本二区| 亚洲精品自拍成人| 中文乱码字字幕精品一区二区三区 | 成人亚洲精品av一区二区| 成人三级黄色视频| 美女高潮的动态| 免费看a级黄色片| 久久99热6这里只有精品| 亚洲精品日韩在线中文字幕| 成人性生交大片免费视频hd| 人妻夜夜爽99麻豆av| 男人和女人高潮做爰伦理| 亚洲国产高清在线一区二区三| 少妇猛男粗大的猛烈进出视频 | 日日啪夜夜撸| 成人午夜高清在线视频| 亚洲国产日韩欧美精品在线观看| 精品久久国产蜜桃| 久久精品熟女亚洲av麻豆精品 | 男的添女的下面高潮视频| 中文乱码字字幕精品一区二区三区 | 啦啦啦韩国在线观看视频| 国产成人精品婷婷| 亚洲在线自拍视频| 最近最新中文字幕免费大全7| 中文字幕人妻熟人妻熟丝袜美| 午夜a级毛片| 亚洲不卡免费看| 99久久精品热视频| 国产乱人偷精品视频| 搡女人真爽免费视频火全软件| 特大巨黑吊av在线直播| 少妇人妻一区二区三区视频| 欧美3d第一页| 亚洲国产精品sss在线观看| 特大巨黑吊av在线直播| 久久人人爽人人爽人人片va| 亚洲欧美日韩东京热| av卡一久久| 在线a可以看的网站| 插阴视频在线观看视频| 国产极品天堂在线| 免费黄网站久久成人精品| 最近最新中文字幕免费大全7| 亚洲欧美成人精品一区二区| 一边摸一边抽搐一进一小说| av.在线天堂| 男人和女人高潮做爰伦理| 两个人的视频大全免费| 中文字幕制服av| 亚洲av.av天堂| 亚洲av成人精品一区久久| 99在线人妻在线中文字幕| 久久久久国产网址| 国产人妻一区二区三区在| 日韩欧美精品v在线| 女人被狂操c到高潮| 3wmmmm亚洲av在线观看| 午夜福利成人在线免费观看| 久久这里只有精品中国| 尤物成人国产欧美一区二区三区| 99热网站在线观看| 99久久成人亚洲精品观看| 久久99热这里只有精品18| 99久久成人亚洲精品观看| 亚州av有码| 久久久久久久亚洲中文字幕| 久久久久久久久久黄片| 久久久久久久亚洲中文字幕| 亚洲国产欧美在线一区| 国产精品电影一区二区三区| 九色成人免费人妻av| 可以在线观看毛片的网站| 久久久精品94久久精品| 中国美白少妇内射xxxbb| 综合色丁香网| 久久久久久久久久久免费av| 亚洲高清免费不卡视频| 精品国产露脸久久av麻豆 | 亚洲最大成人av| 精品国产一区二区三区久久久樱花 | av专区在线播放| 国产成人a∨麻豆精品| 亚洲av中文av极速乱| 日韩欧美国产在线观看| 免费大片18禁| 人妻夜夜爽99麻豆av| 99热这里只有精品一区| 欧美一区二区国产精品久久精品| 三级男女做爰猛烈吃奶摸视频| 麻豆精品久久久久久蜜桃| 国产精品一及| 一个人看视频在线观看www免费| 99在线视频只有这里精品首页| 日本午夜av视频| 免费一级毛片在线播放高清视频| 一区二区三区免费毛片| 久久99蜜桃精品久久| 国产色婷婷99| 一个人观看的视频www高清免费观看| 午夜日本视频在线| 久久久a久久爽久久v久久| 69人妻影院| 日韩一本色道免费dvd| 国产在线一区二区三区精 | 美女被艹到高潮喷水动态| 精品久久久久久久末码| 日产精品乱码卡一卡2卡三| 国产成人精品一,二区| 一二三四中文在线观看免费高清| 午夜日本视频在线| 99热这里只有是精品50| 最近中文字幕高清免费大全6| 精品人妻偷拍中文字幕| 乱码一卡2卡4卡精品| 91在线精品国自产拍蜜月| 中文天堂在线官网| 国产乱人偷精品视频| 午夜亚洲福利在线播放| 久久热精品热| 国产又黄又爽又无遮挡在线| 国产高清有码在线观看视频| 午夜日本视频在线| 国产综合懂色| 中文字幕熟女人妻在线|