• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code

    2024-04-01 02:08:34XuYinboGaoMingyiZhuHuaqingChenBowenXiangLianShenGangxiang
    China Communications 2024年3期

    Xu Yinbo,Gao Mingyi,Zhu Huaqing,Chen Bowen,Xiang Lian,Shen Gangxiang

    Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network,Suzhou Key Laboratory of Advanced Optical Communication Network Technology,the School of Electronic and Information Engineering,Soochow University,No.1 Shizi Street,Suzhou 215006,China

    Abstract: Orthogonal frequency division multiplexing passive optical network (OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget.However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping.Quantum noise stream cipher (QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON.Meanwhile,it is indispensable to exploit forward error correction (FEC) to control errors in data transmission.However,when QNSC and FEC are jointly coded,the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced.In this work,we propose a physical layer encryption scheme based on polar-code-assisted QNSC.In order to improve the code rate and security of the transmitted signal,we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM,16/256-QAM,16/1024-QAM,16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber.For the transmitted 16/4096-QAM QNSC signal,compared with the conventional QNSC method,the proposed method increases the code rate from 0.1 to 0.32 with enhanced security.

    Keywords: physical layer encryption;polar code;quantum noise stream cipher

    I.INTRODUCTION

    Orthogonal frequency division multiplexing passive optical network (OFDM-PON) is a promising optical access technology due to its high spectral efficiency,superior anti-dispersion property and simple equalization requirement and so on[1-5].However,the PON with the downlink broadcast is susceptible to eavesdropping and therefore the communication security is always an enduring issue.The information security at the upper layer of the optical access network is realized by the encryption algorithm and the identity authentication method in each layer of the open system interconnection reference model[6-9].Although the upper-layer security mechanism can provide security protection for the optical access network to a certain extent,the issues in the physical layer cannot be avoided.First,the encryption mechanism at the upper layer cannot protect its header and control information,and the control information of the upper layer data is easily exposed to the lower layer.Second,the physical layer may face the risk of hardware facilities being destroyed,while the upper security mechanism mainly protects binary encoded information,and cannot provide the equipment level protection required by the physical layer[10].Third,the signal transmission rate of the physical layer is high,while the upper security mechanism only protects low-speed data.Therefore,it is not sufficient to rely on the upper security mechanism to ensure the security of optical access network.The security protection of the physical layer can provide a more comprehensive security guarantee for information transmission[11-14].

    Many schemes have been proposed to enhance the security of the physical layer,where the quantum noise stream cipher(QNSC)is a classic physical layer encryption method based on encryption protocol of Y-00 [15].The Y-00 protocol is well compatible with fiber optic communication facilities and the highspeed and long-distance secure transmission systems based on the QNSC have been experimentally demonstrated [15-21].To prevent the information from being cracked during transmission,the QNSC hides the plaintext information in quantum noise and amplified spontaneous emission(ASE)noise.A 70-Gb/s singlechannel 128-QAM signal was transmitted over 100 km with a net spectral efficiency of as high as 10.3 bits/s/Hz by combining the QNSC with a quantum key distribution (QKD) technique [21].If the eavesdropping is detected,the QKD will discard the key and send a new key at different times.However,the above scheme is limited to the lower QKD rate [22].Meanwhile,a two-segment silicon photonics modulator was designed for cascaded modulation to realize a 232QAM QNSC secure 320-km fiber transmission system [18].Here,the security of the system is enhanced based on the complicated hardware to increase the modulation order of signal.However,higher the modulation order is,more the required redundancy is.Meanwhile,in the QNSC system,many basis bits are required to convert a low-order signal into a highorder signal.Therefore,the long pseudo-random bit sequences (PRBS) are indispensable.Compared to the PRBS,long chaotic sequences have stronger randomness,and require less shared parameters at the transceiver.Thus,the chaotic sequences with stronger randomness were introduced to the QNSC system,which can reduce the key length for matching with the low-rate QKD transmission[20].

    The forward error correction (FEC) scheme is indispensable in the PON system [6].Currently,polar code and low-density parity check code(LDPC)code are mainly FEC techniques and both are linear block codes.The polar code is based on channel polarization,and the LDPC is composed of sparse check matrix [23,24].Compared to the LDPC,the polar code has higher flexibility,which makes it more popular in the application of encryption [25].However,the improvement of transmission performance inevitably requires more redundant bits.Taking the redundant bits into account,the code rate is quite low in the conventional QNSC system when the FEC is appended.

    To solve the issue of large redundancy caused by the joint encoding of QNSC and FEC,we propose a polar-code-assisted QNSC scheme.When the signal is encoded by polar code,the redundant information from the chaotic sequences is extracted.Then the data bits and the redundant bits are allocated in the high-bit positions (leftmost bits) and the low-bit positions(rightmost bits)for QNSC encoding by applying bit interleavers instead of introducing extra redundancy.The reuse of redundant information avoids additional redundant information in the QNSC encryption.During the signal transmission,the redundant information as the basis bits increases the modulation size of the encrypted signal,which makes the signal more susceptible to noise and prevents it from being eavesdropped.At the receiver,the bit allocations of the signal are restored to decrypt the data,which can be easily delivered by a secure and low-speed QKD system.We experimentally demonstrate the proposed scheme in a 12.5GBd IM/DD orthogonal frequency division multiplexing (OFDM) transmission over 30-km standard single mode fiber (SSMF) and evaluated its performance by measuring the BER curves of 16/64-quadrature amplitude modulation (QAM),16/256-QAM,16/1024-QAM,16/4096-QAM QNSC signals.Compared to the conventional QNSC method,the code rate of 16/4096-QAM QNSC signal has increased from 0.1 to 0.32 based on the proposed method.

    Some schemes have also been proposed to enhance the security of the physical layer,where encryption schemes based on chaotic systems are widely used due to their high sensitivity to initial values and ergodicity [26-28].However,the chaotic system is a deterministic system and sensitive to the initial conditions.The proposed scheme combines chaotic systems with quantum noise stream,which greatly enhances the security performance of the system.Moreover,the encryption schemes in the optical domain require additional expensive optical components,which is also challenging to control the component parameters[29-31].The proposed scheme can encrypt the message with flexible algorithms in the digital domain based on the DSP at the transceiver and no more hardware is required.

    The remainder of the paper is organized as follows.Section II presents the principle of the proposed polarcode-assisted quantum noise stream cipher scheme.Section III describes the experimental demonstration of the encrypted 16/64-QAM,16/256-QAM,16/1024-QAM,16/4096-QAM QNSC signals transmitted over 30-km SSMF.The performance is evaluated by measuring the BER curves and calculating the corresponding code rate.Section IV discusses the size of the key space and evaluates the security of the proposed system.Finally,Section V summarizes and concludes the paper.

    The main contributions are summarized as follows:

    ? A polar-code-assisted scheme is proposed to improve the code rate in the QNSC system,where the polar encoding is implemented prior to the QNSC-QAM mapping,and the FEC-caused redundant bits are utilized as the basis bits for QNSC encoding.Meanwhile,the interleavers are introduced to allocate the data and redundant bits of the polar code for the QNSC encoding.Compared to the conventional QNSC scheme,the extra redundancy of FEC is eliminated in the proposed scheme and the code rate of 16/4096-QAM QNSC signal is experimentally improved from 0.1 to 0.32 and the BER performance is improved by 0.5 dB.

    ? Meanwhile,a chaotic system is introduced to generate basis states.Here,three parameters are needed to yield chaotic sequences with infinite length,which greatly reduces the requirement for the transmission rate of the QKD system and improves the security of the system.

    ? The security of the system is evaluated based on the key space and the probability of successful detection to the QNSC signal at the illegal end.

    II.PRINCIPLE OF THE PROPOSED POLAR CODE-ASSISTED QNSC SCHEME

    In this section,the basic principles of quantum noise stream cipher,chaotic sequence and systematic polar code are first introduced,which underlies the analysis and design of the proposed polar code-assisted QNSC scheme.

    2.1 Quantum Noise Stream Cipher

    QNSC is a physical layer encryption technique with high security in optical fiber communication,where ASE noise from transmission links with erbium-doped fiber amplifiers (EDFAs) overwhelms quantum noise of transceiver [15-21].QNSC relies on the characteristic of higher-order modulation signals susceptible to noise.Hence,a lower-order QAM signal(plaintext)with spare constellation distribution is converted into a higher-order QAM signal(ciphertext)with dense constellation distribution.Without the key,it is challenging to recover the plaintext.

    In order to generate the encrypted higher-order QAM signal,amounts of redundant bits are required as the base to scramble the lower-order signal with the plaintext information.The addition of redundant basis bits converts the lower-order QAM signal to higherorder QAM signal.Meanwhile,with the increase of modulation order,the minimum Euclidean distance of constellation points in the constellation diagram decreases,and thus the constellation points are more likely to be overlapped during transmission.For the illegitimate receiver,it is challenging to restore the original transmitted information from the blurred constellation diagrams.Contrarily,for the legitimate receiver,the plaintext information hidden in the noise can be extracted with the keys even if the signal has been drowned in noise.

    Figure 1 illustrated the architecture of a conventional QNSC system.First,a PRBS is introduced to provide redundant key bits (denoted as BasisB),shared between the transmitter and the receiver.Generally,a linear feedback shift register with seed keys can be utilized to generate the PRBS.BasisBis denoted as basic states,which is used for data scrambling.If the transmitter with the plaintext dataX=(XI,XQ) is directly modulated into a lower-order QAM signal,it will be exposed to eavesdroppers.

    Figure 1.The architecture of a conventional QNSC system.

    Therefore,the plaintext dataXand the basisBare jointly coded to obtain the scrambled higher-order QAM signal with the ciphertext dataS=(SI,SQ)=(XIBI,XQBQ).Here,the redundant key bitsBare appended to the plaintext bitsX.Assuming that the dataXand basisBconsist ofmandnI/Q bits per symbol,respectively,then the generated encrypted dataSwill have (m+n) I/Q bits.After then,the ciphertext is mapped into a higher-order QAM signal for transmission.Finally,the signal is detected and decoded with the basisBof the shared key to yield the original plaintext information.

    Figure 2 shows the constellation diagram of a 16/64-QAM QNSC signal,where the 16-QAM signal carries the plaintext data and is encrypted into the 64-QAM signal.For the encrypted 64-QAM signals,each symbol consists of 3 I/Q bits respectively.The first two bits of I/Q bits are used for the 16-QAM signal of the plaintext data and the remained 1 bit from the basis state is used for scrambling the message.For example,the constellation point A=(I,Q)=(101,010) carries the actual plaintext information(10,01).Compared to the 16-QAM signal,the encrypted 64-QAM signal requires higher optical signal to noise ratio(OSNR)for desired BER performance.The eavesdroppers always need to capture the encrypted 64-QAM signal with higher OSNR for further decryption,which becomes more challenging for higher-order QAM signals,such as 1024-QAM and 4096-QAM signals.

    Figure 2.The constellation diagram of the 16/64-QAM QNSC signal.

    The decoding of QNSC signals only requires the correct bits,i.e.,leftmost bits of I/Q bits.In our previous work,an improved decoding method based on the priori basis states was used to improve system performance [20].According to the basis states shared between the transmitter and the receiver,the encrypted 64-QAM signal is composed of various 16-QAM constellation points.For example,the basis state of (1,0) determine the 16-QAM constellation points,shown by red dots in Figure 2.By calculating the Euclidean distance from the received symbol to the various 16-QAM constellation points determined by the basis states,we can yield the minimum Euclidean distance as the correct position of the symbol and decode it.For example,if a symbol has a minimum Euclidean distance to the point B=(111,110) with the basis states (1,0),it will be decoded as (11,11).The above method can improve the accuracy of the decoding of the QNSC signal.

    2.2 Chaotic Sequence

    In the conventional QNSC system,the basis states used to scramble the plaintext information is randomly generated and it is very challenging for key distribution systems to transmit amounts of keys,such as QKD with low transmission speed [22].In order to reduce the key length for transmission and add the decoding barriers of polar code for eavesdroppers,a chaotic sequence is applied as BasisBin this work.Chaotic sequences are random and more sensitive to initial values,where only three parameters are required to be shared between the transmitter(Alice)and the legitimate receiver (Bob) in Figure 1.For the issue to generate and transmit amounts of shared basis bits in the QNSC system with the encrypted higherorder QAM signals,the discrete chaotic system will be a good solution.In order to reduce the complexity of the key,an optimized logistic mapping model is applied[32],

    wherendenotes the number of iterations,{xn,n=1,2,...,N}is theN-iteration result of the initial valuex0,which ranges between-1 and 1,andμis the bifurcation parameter.

    Figure 3 illustrates the variation of chaotic sequence versus the bifurcation parameterμ.For 0<μ ≤0.8,there is a fixed output for eachμ.With the increase ofμvalue to 0.8<μ<1.4,the logistic map exhibits the phenomenon of periodic doubling.It can be clearly seen that the system enters the chaotic state completely with 1.4≤μ ≤2.The important feature of chaotic sequences is their extremely sensitivity to parameters.In order to demonstrate the high sensitivity of chaotic sequences to parameters,the parameters are set asn=1000,μ=1.9125,x0=0.61854654500112.For comparison,we slightly change the initial value tox,0=0.61854654500113,which has a subtle variation and the other parameters remain unchanged.

    Figure 3.Chaotic sequence vs. the bifurcation parameter.

    Figure 4a and 4b show the auto-correlation function forx0,and the cross-correlation function ofx0andx,0.The auto-correlation function defines the similar-ity of the signal between a given time and a lagged time by comparing the value at the timetto that at a successive timet+τ.Here,τis a time interval.A rapidly fluctuating signal has an autocorrelation function that decays quickly with respect toτ,as shown in Figure 4a.The cross-correlation function measures the similarity between a signal and the lagged copy of another signal with the time lagτ.If the crosscorrelation coefficient is close to zero,these signals are entirely different,as shown in Figure 4b.As shown in Figure 4a and 4b,whenτ0,the autocorrelation coefficient approaches zero,while the cross-correlation coefficient of two chaotic sequences with different initial values are close to zero,regardless of the value ofτ,which verifies that the generated chaotic sequence is highly random.

    Figure 4.(a) Auto-correlation of x0 (b) cross-correlation of x0 and x,0 (c)values of chaotic sequences with different initial values.

    Figure 4c shows the generated chaotic sequences with the above two initial values,where the iterations of the chaotic sequence have two completely different tracks.Thus,no one has access to the plaintext information except the legitimate recipient.Even if the information is intercepted by eavesdroppers without correct keys,the cracked message will be completely wrong.Therefore,the transmitter can generate a set of infinitely long chaotic sequences to encrypt plaintext messages by three parameters,n,μ,andx0.The application of chaotic sequences simplifies the key structure,and effectively resists selective plaintext attacks,making encrypted information more reliable.

    Finally,the generated chaotic sequences are processed by a trimmer in Eq.(2)with a suitable threshold.Generally,the threshold is set to zero.After the trimmer,the chaotic sequence is transformed to a binary sequence,which is used for redundant key bits in this work.

    2.3 Systematic Polar Code

    In the conventional QNSC system,many reductant basis bits are introduced to convert the lower-order QAM signal to the higher-order QAM signal by appending the basis bits to the plaintext information bits.Meanwhile,the FEC is required for a communication system to improve the transmission performance by sending redundant error correction code.It may be feasible to share these reductant bits between the QNSC and the FEC.

    Meanwhile,polar code as a popular FEC code can asymptotically achieve Shannon’s limit and have the characteristics of low complexity and error-floor free.The systematic polar code(SPC)is an improvement of the general polar code and has enhanced error correction performance[33].The complexity and flexibility of SPC are more suitable for improving the security of encrypted communication system and increasing the difficulty of decoding for eavesdroppers.

    First,the concept of channel polarization is introduced [34].If the binary symmetric channel is combined and split in a specific way,the split bit channel will be polarized.The channel capacity of a part of the bit channel will converge to 1.On the contrary,the channel capacity of another part of the bit channel will become small and converge to 0.The former is called as ‘good channel’,and the latter as ‘bad channel’.When the number of channels is increased to an infinity,the above channel polarization is more obvious.

    The polar code is based on channel polarization.Assuming thatWis a symmetric binary-input discrete memoryless channel andW:U →Ywill be calculated.W(y|u)represents transition probability.

    Figure 5a illustrates that two symbols are sent in a symmetric memoryless channel and the transition probability is written as.

    Figure 5.Two symbols transmission in (a) a symmetric memoryless channel(b)a combined channel.

    Figure 5b illustrates that two symbols are sent in a combine channel,where⊕denotes the XOR operation.When two channels are combined,the transition probability is written as[35].

    This is the basic unit of channel combination.In the recombined channelW2,the transmitted information{u0,u1}is defined asand similarly,the information with channel encodingcan be obtained.

    TheG2is the generation matrix.Similarly,W4can be obtained fromW2.Recursively,WNcan be formed by the combination of twoWN/2withNchannels.

    The arbitrary generation matrixGNcan be written as,

    whereF=G2=[1 0;1 1],BNis a bit-reversal permutation matrix.The symbol⊕is the Kronecker inner product.

    Meanwhile,the Bhattacharyya parameter is used to evaluate the quality of the information channel,defined as an integral function,

    whereσ2is the variance of the additive Gaussian white noise channel.W(y|0) andW(y|1) are the channel transition probability.The channel with largeZ(W)is used to load frozen bits.

    The systematic polar code is cascaded by two general polar codes and the encoding process consists of two parts.Figure 6 is the schematic diagram of the SPC encoding with the code lengthNof 8.Here,the frozen bits are marked in blue and the information bits are marked in black.Usually,all frozen bits are set to zero.In this work,in order to enhance the security,a part of generated chaotic sequence is used as the frozen bits.The transmitter and the receiver share the parameters of the chaotic sequence as the keys to determine values of frozen bits for decoding.

    Figure 6.Block diagram of SPC encoding with code length N of 8.

    For the decoding,the successive cancellation (SC)decoder is utilized [35].Fori ∈{1,2,...,N},the value of thei-th code is calculated according to the current received code and the priori-1 codes.If thei-th channel is assigned for frozen bits,the original frozen bits can be loaded directly.The decoding information at the receiver is denotes as,

    where{ui,i ∈AC}stands for frozen bits,which is shared between the transmitter and the receiver.On the other hand,{ui,i ∈A}stands for information bits,decoding based on the decision function.

    The log-likelihood ratio(LLR)ofis calculated to decode information.

    2.4 The QNSC with Polar Code

    In the conventional QNSC scheme,amounts of reductant basis bits are required.Meanwhile,the security of the QNSC system is enhanced by increasing the modulation order,which brings a higher redundancy.In order to efficiently reuse these reductant bits and increase the code rate,we will share the reductant bits between the QNSC and the FEC.Figure 7 shows the block diagram of the proposed QNSC with polar code.First,a chaotic sequence is generated.Second,a XOR operation is implemented between the plaintext information and the chaotic sequence.Then,the information of the above preliminary encryption is encoded by the systematic polar code.The encoded information is divided into the information bits and the redundant frozen bits.If the encoded signal is directly launched into the fiber,it is exposed for an eavesdropper to decipher the plaintext information.Thus,the QNSC technique is applied to enhance the security of the system.The QNSC requires the basis bits to scramble plaintext information.If the redundant bits generated in polar code are reused as the basis bits of the QNSC,it is not necessary to introduce new redundant bits.Hence,we use the interleaver to reshape the information and frozen bits by allocating the information bits at the leftmost bits of the QAM signals and the frozen bits at the rightmost bits of the QAM signal.As shown in Figure 7,after the SPC encoding with code length N,the bit allocation is implemented as required by the QNSC with the operation of the interleaver,where the orange indicates the information bits and the blue denotes the frozen bits.Finally,the bits are mapped into the QAM symbols and then the generated QAM signal is modulated into the optical signal and launched into the fiber.At the receiver,the reverse process of encryption is implemented to achieve the plaintext message.First,the received encrypted QNSC signal is demodulated to obtain the binary data information according to the basis states generated by the shared key.Then,the inverse interleaver is exploited to recover the position of the information bits and frozen bits of the QNSC signals composed of the obtained data information and basis states again and the polar code is decoded based on the known frozen bits.Finally,the XOR operation is implemented between the decoded ciphertext and the chaotic sequence,and then the plaintext information is obtained.By the joint coding of the polar code and the QNSC with the shared reductant bits,the code rate will be increased with the improved transmission performance.

    Figure 7.Block diagram of the proposed polar-code-assisted QNSC encryption scheme.

    III.EXPERIMENTS AND RESULTS

    The proposed polar-code-assisted QNSC scheme is demonstrated in a 30-km OFDM-PON transmission system and the experimental setup is shown in Figure 8.The signal is generated at the transmitter side by the offline digital signal processing (DSP).The generated signal is sent to an arbitrary waveform generator (AWG) with a sampling rate of 50 GSa/s for digital-to-analog(DA)conversion.Hermitian symmetry is applied to generate the real-valued time-domain OFDM signals.The electrical signal from the AWG is modulated by a Mach-Zehnder modulator(MZM)and a continuous wave (CW) laser at 1550.116 nm into an optical signal,which is transmitted over a 30-km SSMF.Before the signal enters the receiver,we use a variable optical attenuator (VOA) and an erbiumdoped fiber amplifier (EDFA) for noise-loading and the following VOA is used to adjust the signal power to ensure the linear response of the 10 GHz photodetector (PD).The optical signal is converted into an electrical signal by the PD.Finally,a real-time oscilloscope with a sampling rate of 50 GSa/s acquires the data for the processing of the offline DSP.Moreover,in the OFDM experiment,the number of total carriers is 512 and the number of data carriers is 128,located from the 129th to the 256th subcarriers.To reduce the effect of beat-frequency interference,the first 128 subcarriers are set as null carriers.On the other hand,the chaotic sequence is mainly generated by three main parametersn,μ,x0,with the values of 1200,1.9125,0.61854654500112.

    Figure 8.Experimental setup of the proposed polar-code-assisted QNSC scheme in a 30-km OFDM-PON transmission system.

    Figure 9 shows the constellation diagram of 16/256-QAM QNSC signal without and with decryption when the received optical power is-19 dBm.The 16-QAM signal is hidden in the constellation diagram of 256-QAM signals.For the noise-distorted signal,it is challenging for eavesdroppers to decipher plaintext messages,as shown in Figure 9a.

    Figure 9.Constellation diagram of 16/256-QAM QNSC signal(a)without decryption and(b)with decryption.

    The code rate can be obtained by,

    whereflooris the round down function,Nis the length of each group of polar codes,Kis the length of the plaintext information in each group of polar codes,nis the length of basis states for I or Q andmis the length of the data bits for I or Q.In the experiments,Nis set to 256.Here,the signals of various modulation format have different code rates.For example,for the 16/256-QAM QNSC signal,the transmitted 256-QAM signal has 4 I/Q bits respectively,and the plaintext message is loaded into the 16-QAM signal with 2 I/Q bits.A group of polar code can be divided into exactly 32 16/256-QAM symbols.Therefore,the plaintext information in each group of polar codes has 128 bits.Obviously,both plaintext and redundant information possess half of the bits,and the code rate is 50%.Similarly,for the 16/64-QAM signal,the code rate is about 66.6%.Different from the 16/256-QAM signal,4 bits of polar code are discarded to obtain 42 16/64-QAM symbols.Thus,η=66.6% can be obtained.Here,the redundant information generated in the polar code is used for QNSC scrambling and the length of the plaintext message is set to approximate 32,000 bits.

    Figure 10 illustrates the code rates of different QNSC signals in the QNSC system combined with traditional LDPC or polar code and the proposed polarcode-assisted QNSC scheme.The code rates of 16/64-QAM,16/256-QAM,16/1024-QAM and 16/4096-QAM in the traditional LDPC or polar code system are 0.44,0.25,0.15 and 0.1 because of the accumulated redundancy from the QNSC and the FEC.In comparison,in the proposed polar-code-assisted QNSC system,the code rates of 16/64-QAM,16/256-QAM,16/1024-QAM and 16/4096-QAM are respectively increased to 0.67,0.5,0.39 and 0.328.It is obvious that the code rates decrease more with the increase of the modulation order.Moreover,the security of QNSC scheme highly depends on the modulation order of encrypted signal,and thus large redundancy is induced,where the proposed scheme will be a good solution to the issue of large redundancy[16,18,19].

    Figure 10.Code rate of different signals with various encryption schemes.

    We experimentally measured the BER curves of 16/64-QAM,16/256-QAM,16/1024-QAM,16/4096-QAM QNSC signals at 12.5GBd for back-to-back(BTB)and 30-km SSMF transmission.The measured BERs in the cases of the BTB and the 30-km SSMF transmission are shown by solid and dashed curves in Figure 11,respectively.The penalties caused by the 30-km SSMF transmission is negligible because of the superior anti-dispersion property of 12.5GBd OFDM signal.In the conventional QNSC encryption scheme,the polar code has contributed slight improvement in the BER performance,as shown by pentagonand triangle-marked curves in Figure 11.Compared to the conventional QNSC scheme,the proposed method can achieve approximately 0.5-dB improvement in the error-free case,as shown by circle-marked curves in Figure 11.In the proposed scheme,all information bits are allocated in the leftmost by the interleaver and these information bits are modulated into lower-order QAM signal with the enhanced tolerance to the noise,which contributes to the improvement of BER performance.Therefore,the proposed scheme not only increases the code rate but also improves the BER performance.

    Figure 11.Measured post-BER curves of (a) 16/64-QAM, (b) 16/256-QAM, (c) 16/1024-QAM, (d) 16/4096-QAM QNSC signals vs. received optical power(dBm).

    IV.SECURITY ANALYSIS

    Generally,the exhaustive search attack is the most common attack method.Here,the eavesdroppers usually explore all possible keys in the key space until the correct key is found.Compared to the conventional QNSC encryption,the proposed encryption algorithm has an enhanced security due to the increased complexity of chaotic sequences and interleavers.

    The complexity of the chaotic sequence,mainly depends on the three initial valuesμ,n,x0.The precision of the key{μ,x0},{μ+Δμ,x0+Δx0}is used to quantify the security enhancement.As the discussion in the section 2.2,μandxdetermine the degree of chaos and the varying track of chaotic sequences,which has a significant influence on the BER performance,as shown by triangle-and circle-marked curves in Figure 12.As shown in Figure 12,a trivial variation of initial valuesμandxwith an order of magnitude deviation (10-16~ 10-15),leads to the decoding errors.Therefore,a large key space ofs1=1016×1015=1031can be achieved.On the other hand,the interleavers are involved in the proposed scheme.If the illegitimate receiver has no any information of correct interleaving order,it will be impossible to crack the ciphertext.Thus,the complexity of the interleaver also can enhance the security,which is related to the number of information bitsK.The interleaver mainly is exploited to rearrange the information bits and the key space is obtained bys2=2K.Here,s=s1s2represents the size of the key space for exhaustive computation.

    Figure 12.BER versus initial value error of chaotic sequence.

    Since the QNSC signal is transmitted in the classical channel,the noise distribution of the eavesdropper is consistent with that of Bob.Thus,we can estimate the demodulation performance of the eavesdropper by calculating the noise distribution of Bob [21].Figure 13 illustrates the noise distribution of the recovered 16/4096-QAM signal in the case of BTB when the received optical power is-24 dBm,i.e.,the lowest receiver power to guarantee the error-free condition.In order to ensure that the SNR of the eavesdropper is as large as possible,we choose the noise distribution in the case of BTB.First,the constellation amplitude is normalized with±1.Then,the noise variances of the 16/4096-QAM signal are calculated as follows,

    Figure 13.Noise distribution of recovered 16/4096-QAM signals with the received optical power of-24 dBm in the case of BTB.

    The normalized minimum separation between symbols and the number of masked signals of 16/4096-QAM can be expressed as[16,19],

    whereMis the I/Q modulation order of the encrypted 16/4096-QAM signal.Only one of the Γ symbols is correct,hence 1/Γ denotes the probability that the encrypted constellation point is kept at the original location,i.e.,‘success’ probability.When the received power is -24 dBm,the values of Γ are 1.4,6.3,27.1 and 111.6 for 16/64-QAM,16/256-QAM,16/1024-QAM and 16/4096-QAM respectively.Thus,it is straightforward to enhance the security of the system by increasing the modulation order.The security levelQcan evaluate the ability to resist brute force attacks[16,21],

    whereβ=κ/2n,κis the length of basis state sequence andnis the length of the I/Q basis state of each QAM symbol.In this work,the basis state sequence intercepted from the chaotic system is used to encrypt exactly all the plaintext information.The length of plaintext message is 32,000 bits andβis 8000.When the plaintext information is encrypted into 16/4096QAM symbols,Qis 111.68000.Therefore,the scheme is extremely robust against brute force attacks.

    V.CONCLUSION

    In general,FEC is indispensable in optical communication systems to improve the BER performance.However,when FEC is appended to the QNSC systems,large redundancy is induced.In this work,we propose a polar-code-assisted QNSC scheme,where information bits and the redundancy of polar code are distributed in high and low bits of the QNSC signals respectively by interleavers to reuse polar code redundancy instead of introducing extra redundancy.Compared to the conventional QNSC system with the FEC,the code rate of the proposed scheme is improved from 0.1 to 0.32 for 16/4096-QAM QNSC signals,and the scheme simultaneously yields a BER improvement of about 0.5-dB.Moreover,a chaotic system is introduced to generate basis states of QNSC signals,which not only reduces the requirement of QKD system rate,but also enhances the security of the system.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Natural Science Foundation of China Project under Grant 62075147 and the Suzhou Industry Technological Innovation Projects under Grant SYG202348.

    老熟女久久久| 两个人免费观看高清视频| 午夜免费观看性视频| 看十八女毛片水多多多| 波多野结衣一区麻豆| 午夜久久久在线观看| 好男人视频免费观看在线| 欧美日韩黄片免| 欧美变态另类bdsm刘玥| 大话2 男鬼变身卡| 菩萨蛮人人尽说江南好唐韦庄| 黄色怎么调成土黄色| 777久久人妻少妇嫩草av网站| 国产亚洲av片在线观看秒播厂| 久久久久精品人妻al黑| 亚洲熟女精品中文字幕| 一级毛片女人18水好多 | a级毛片在线看网站| 最新在线观看一区二区三区 | 国产午夜精品一二区理论片| 母亲3免费完整高清在线观看| 亚洲精品乱久久久久久| 99久久99久久久精品蜜桃| 免费在线观看影片大全网站 | 最新在线观看一区二区三区 | www.av在线官网国产| 久久精品亚洲av国产电影网| 亚洲欧美日韩高清在线视频 | 国产精品久久久久久精品电影小说| 男女午夜视频在线观看| 男女之事视频高清在线观看 | 中文字幕亚洲精品专区| 欧美日本中文国产一区发布| 国产熟女欧美一区二区| 99久久精品国产亚洲精品| 久久 成人 亚洲| 老汉色∧v一级毛片| 黄片小视频在线播放| 日韩av在线免费看完整版不卡| 久久久国产一区二区| 免费在线观看视频国产中文字幕亚洲 | 国产亚洲av高清不卡| 亚洲精品久久成人aⅴ小说| 亚洲欧美一区二区三区黑人| 国产成人一区二区三区免费视频网站 | av欧美777| 午夜福利视频在线观看免费| 日韩精品免费视频一区二区三区| 欧美精品高潮呻吟av久久| 在线观看免费视频网站a站| 国产av一区二区精品久久| kizo精华| 欧美人与善性xxx| 黄色视频不卡| 肉色欧美久久久久久久蜜桃| 亚洲av欧美aⅴ国产| 国产色视频综合| 亚洲av男天堂| 久久久久国产一级毛片高清牌| 在线观看国产h片| 一级毛片女人18水好多 | 成年人免费黄色播放视频| 中文字幕人妻丝袜制服| 亚洲人成电影免费在线| 精品卡一卡二卡四卡免费| 久久人人97超碰香蕉20202| 90打野战视频偷拍视频| 爱豆传媒免费全集在线观看| 曰老女人黄片| 久久av网站| 在线观看免费日韩欧美大片| 亚洲 欧美一区二区三区| 丝袜在线中文字幕| 成年人免费黄色播放视频| 精品熟女少妇八av免费久了| 一本综合久久免费| 午夜福利乱码中文字幕| 在线观看免费日韩欧美大片| 亚洲成人手机| 欧美av亚洲av综合av国产av| 日韩av在线免费看完整版不卡| 国产高清国产精品国产三级| 每晚都被弄得嗷嗷叫到高潮| 人人妻人人澡人人爽人人夜夜| 国产麻豆69| netflix在线观看网站| 女人高潮潮喷娇喘18禁视频| 国产女主播在线喷水免费视频网站| 成人国语在线视频| 国产一区二区 视频在线| 久久ye,这里只有精品| 久久人妻福利社区极品人妻图片 | 中文精品一卡2卡3卡4更新| 国产人伦9x9x在线观看| 亚洲国产欧美网| 欧美精品啪啪一区二区三区 | 午夜福利影视在线免费观看| 一二三四在线观看免费中文在| 悠悠久久av| 久久狼人影院| 老汉色av国产亚洲站长工具| 中文字幕人妻丝袜制服| 波多野结衣一区麻豆| 国精品久久久久久国模美| 女人被躁到高潮嗷嗷叫费观| 亚洲七黄色美女视频| 日韩av免费高清视频| 九色亚洲精品在线播放| 19禁男女啪啪无遮挡网站| 日本一区二区免费在线视频| 手机成人av网站| 另类亚洲欧美激情| 又大又黄又爽视频免费| 中文乱码字字幕精品一区二区三区| 国产精品香港三级国产av潘金莲 | 狠狠精品人妻久久久久久综合| www.999成人在线观看| 女人久久www免费人成看片| 又黄又粗又硬又大视频| 丁香六月欧美| 一级毛片女人18水好多 | 1024香蕉在线观看| 免费女性裸体啪啪无遮挡网站| 又大又爽又粗| av又黄又爽大尺度在线免费看| 黄色毛片三级朝国网站| 欧美国产精品va在线观看不卡| 侵犯人妻中文字幕一二三四区| 手机成人av网站| 午夜精品国产一区二区电影| 国产又爽黄色视频| 国产一区二区激情短视频 | 电影成人av| 亚洲国产av影院在线观看| 亚洲av电影在线观看一区二区三区| 热99国产精品久久久久久7| 久久久久久免费高清国产稀缺| 韩国精品一区二区三区| 亚洲,欧美,日韩| 亚洲欧美一区二区三区黑人| 99精品久久久久人妻精品| 日韩av免费高清视频| 激情五月婷婷亚洲| 一级毛片女人18水好多 | 久久精品aⅴ一区二区三区四区| 欧美老熟妇乱子伦牲交| 午夜福利,免费看| 十八禁网站网址无遮挡| 51午夜福利影视在线观看| 一区在线观看完整版| 一边亲一边摸免费视频| 亚洲 欧美一区二区三区| 一级黄片播放器| 亚洲精品一区蜜桃| 欧美老熟妇乱子伦牲交| 亚洲九九香蕉| 香蕉国产在线看| 日韩av免费高清视频| 亚洲中文日韩欧美视频| 亚洲精品中文字幕在线视频| 美女中出高潮动态图| 日韩熟女老妇一区二区性免费视频| 日韩一本色道免费dvd| 首页视频小说图片口味搜索 | 视频区欧美日本亚洲| 老鸭窝网址在线观看| 国产精品一区二区免费欧美 | 精品国产一区二区三区久久久樱花| 国产男人的电影天堂91| 女人被躁到高潮嗷嗷叫费观| 国产精品 国内视频| 啦啦啦中文免费视频观看日本| 无遮挡黄片免费观看| 久久久亚洲精品成人影院| 高潮久久久久久久久久久不卡| 黑人巨大精品欧美一区二区蜜桃| 亚洲精品自拍成人| 咕卡用的链子| 国产欧美日韩一区二区三 | 久久久久国产一级毛片高清牌| 99热全是精品| 中文字幕另类日韩欧美亚洲嫩草| 日本av手机在线免费观看| 女人高潮潮喷娇喘18禁视频| 香蕉国产在线看| 夜夜骑夜夜射夜夜干| 赤兔流量卡办理| 国产国语露脸激情在线看| 日本欧美国产在线视频| www.av在线官网国产| 色综合欧美亚洲国产小说| 国产精品一二三区在线看| 亚洲成色77777| 中文字幕色久视频| 女人被躁到高潮嗷嗷叫费观| 精品福利永久在线观看| 熟女少妇亚洲综合色aaa.| 777久久人妻少妇嫩草av网站| 午夜免费男女啪啪视频观看| 亚洲欧美一区二区三区黑人| 中文字幕高清在线视频| 18禁国产床啪视频网站| 又粗又硬又长又爽又黄的视频| 丝袜在线中文字幕| 亚洲激情五月婷婷啪啪| 欧美 亚洲 国产 日韩一| 欧美老熟妇乱子伦牲交| 性少妇av在线| 丝袜脚勾引网站| 日韩精品免费视频一区二区三区| 天天添夜夜摸| 又紧又爽又黄一区二区| 国产爽快片一区二区三区| 国产亚洲精品第一综合不卡| 亚洲中文字幕日韩| 亚洲国产成人一精品久久久| 国产亚洲欧美在线一区二区| 一区二区三区精品91| 久久国产精品人妻蜜桃| 一级黄片播放器| 久热这里只有精品99| 少妇裸体淫交视频免费看高清 | 国产男人的电影天堂91| 一本久久精品| 精品少妇一区二区三区视频日本电影| 国产91精品成人一区二区三区 | 日韩 欧美 亚洲 中文字幕| 中国美女看黄片| 亚洲成人手机| 日韩,欧美,国产一区二区三区| 日韩中文字幕视频在线看片| 男人舔女人的私密视频| 国产黄频视频在线观看| 一边摸一边抽搐一进一出视频| 日韩,欧美,国产一区二区三区| 一边亲一边摸免费视频| 亚洲av在线观看美女高潮| 婷婷色麻豆天堂久久| 国产在视频线精品| 女人久久www免费人成看片| 男女国产视频网站| av天堂在线播放| 亚洲精品久久久久久婷婷小说| 国产免费一区二区三区四区乱码| 九草在线视频观看| 男女国产视频网站| 精品一品国产午夜福利视频| 亚洲av男天堂| 亚洲午夜精品一区,二区,三区| 亚洲国产精品国产精品| 超碰成人久久| 婷婷成人精品国产| 亚洲国产精品999| 人人妻人人澡人人爽人人夜夜| 成年女人毛片免费观看观看9 | 久久久久视频综合| 国产精品一区二区精品视频观看| 国产精品久久久人人做人人爽| 免费人妻精品一区二区三区视频| 看免费av毛片| 乱人伦中国视频| 永久免费av网站大全| 久久ye,这里只有精品| 每晚都被弄得嗷嗷叫到高潮| 最近中文字幕2019免费版| 熟女少妇亚洲综合色aaa.| 午夜两性在线视频| 久久鲁丝午夜福利片| 亚洲免费av在线视频| 欧美精品啪啪一区二区三区 | 日韩伦理黄色片| 精品第一国产精品| 国产一区有黄有色的免费视频| 成人亚洲欧美一区二区av| 少妇的丰满在线观看| 美女福利国产在线| 日韩一卡2卡3卡4卡2021年| 成人影院久久| 日韩 亚洲 欧美在线| 午夜视频精品福利| av天堂久久9| 欧美日韩精品网址| 国产在线视频一区二区| 成人影院久久| 热99久久久久精品小说推荐| av网站在线播放免费| 精品人妻1区二区| 国产精品偷伦视频观看了| 欧美 亚洲 国产 日韩一| 久久久国产精品麻豆| 亚洲国产精品一区三区| 亚洲人成网站在线观看播放| 婷婷丁香在线五月| 免费黄频网站在线观看国产| 女人精品久久久久毛片| 在线亚洲精品国产二区图片欧美| 中文欧美无线码| 狂野欧美激情性bbbbbb| 交换朋友夫妻互换小说| 老司机亚洲免费影院| 精品国产一区二区三区久久久樱花| 亚洲色图综合在线观看| 国产欧美亚洲国产| 精品少妇久久久久久888优播| 国产主播在线观看一区二区 | 国产精品久久久久久精品古装| 天天操日日干夜夜撸| 欧美日韩国产mv在线观看视频| 99re6热这里在线精品视频| svipshipincom国产片| 国产又爽黄色视频| 亚洲国产欧美在线一区| 少妇精品久久久久久久| 日韩大片免费观看网站| 新久久久久国产一级毛片| 国产国语露脸激情在线看| 美女视频免费永久观看网站| 亚洲美女黄色视频免费看| 亚洲精品成人av观看孕妇| 欧美精品人与动牲交sv欧美| 水蜜桃什么品种好| 久久久久久久久久久久大奶| 亚洲午夜精品一区,二区,三区| 黄频高清免费视频| 色婷婷久久久亚洲欧美| 欧美在线一区亚洲| 一本久久精品| 黄片小视频在线播放| e午夜精品久久久久久久| 日韩大码丰满熟妇| 国产人伦9x9x在线观看| 国产一级毛片在线| 国产女主播在线喷水免费视频网站| 一边亲一边摸免费视频| 亚洲国产欧美日韩在线播放| 亚洲精品在线美女| 人妻一区二区av| 日韩一卡2卡3卡4卡2021年| 99热全是精品| 欧美在线一区亚洲| 日日夜夜操网爽| 午夜福利一区二区在线看| 久9热在线精品视频| 不卡av一区二区三区| 亚洲国产日韩一区二区| 国产激情久久老熟女| 飞空精品影院首页| 久久久亚洲精品成人影院| 一本综合久久免费| 精品一区二区三卡| 精品熟女少妇八av免费久了| 日韩 亚洲 欧美在线| 欧美日韩综合久久久久久| 高潮久久久久久久久久久不卡| 成年动漫av网址| 国产成人91sexporn| 国产精品免费视频内射| 亚洲欧美一区二区三区黑人| 少妇猛男粗大的猛烈进出视频| 国产日韩欧美亚洲二区| 久久九九热精品免费| 大片免费播放器 马上看| 国产精品国产av在线观看| 操美女的视频在线观看| 秋霞在线观看毛片| 国产亚洲欧美在线一区二区| 欧美少妇被猛烈插入视频| 99久久人妻综合| 一级,二级,三级黄色视频| 男男h啪啪无遮挡| 美女中出高潮动态图| 日本色播在线视频| 女人爽到高潮嗷嗷叫在线视频| 久热这里只有精品99| 亚洲天堂av无毛| 超碰成人久久| 精品少妇黑人巨大在线播放| 成年女人毛片免费观看观看9 | 不卡av一区二区三区| 国产在线免费精品| 久久国产亚洲av麻豆专区| 成人免费观看视频高清| 亚洲av片天天在线观看| 精品国产一区二区三区久久久樱花| 亚洲欧美一区二区三区久久| 欧美激情高清一区二区三区| 免费日韩欧美在线观看| 麻豆av在线久日| 国产精品免费视频内射| 国产色视频综合| 欧美成人精品欧美一级黄| 波多野结衣一区麻豆| 国产欧美日韩一区二区三区在线| 少妇人妻久久综合中文| av在线老鸭窝| 一级片'在线观看视频| 亚洲国产看品久久| 久久午夜综合久久蜜桃| 欧美黑人欧美精品刺激| 亚洲,一卡二卡三卡| 啦啦啦 在线观看视频| 亚洲精品av麻豆狂野| 人人妻人人澡人人爽人人夜夜| 在线观看国产h片| 日本欧美视频一区| 老鸭窝网址在线观看| 日韩av在线免费看完整版不卡| 精品第一国产精品| 国产xxxxx性猛交| 18禁黄网站禁片午夜丰满| 久热爱精品视频在线9| 亚洲九九香蕉| 久久 成人 亚洲| 亚洲国产精品999| 午夜激情久久久久久久| 久久人人97超碰香蕉20202| 国产成人影院久久av| 亚洲自偷自拍图片 自拍| 十八禁网站网址无遮挡| 一级片'在线观看视频| 亚洲国产精品国产精品| 日本午夜av视频| 亚洲成人免费电影在线观看 | 亚洲欧美日韩高清在线视频 | 在现免费观看毛片| 夫妻性生交免费视频一级片| xxxhd国产人妻xxx| 国产av一区二区精品久久| 日韩大片免费观看网站| 狠狠精品人妻久久久久久综合| 成年人黄色毛片网站| 一边摸一边抽搐一进一出视频| 亚洲成色77777| 我的亚洲天堂| 午夜免费男女啪啪视频观看| 如日韩欧美国产精品一区二区三区| 一区在线观看完整版| 最近手机中文字幕大全| 波多野结衣av一区二区av| 国产一区二区三区av在线| 欧美乱码精品一区二区三区| 99re6热这里在线精品视频| av天堂久久9| 国产精品麻豆人妻色哟哟久久| 麻豆国产av国片精品| av有码第一页| 久久这里只有精品19| 国产亚洲av高清不卡| 波野结衣二区三区在线| 久久久久精品国产欧美久久久 | 亚洲中文日韩欧美视频| 90打野战视频偷拍视频| 午夜福利视频精品| 看十八女毛片水多多多| 亚洲精品日本国产第一区| 婷婷色麻豆天堂久久| 飞空精品影院首页| 国产成人免费观看mmmm| av视频免费观看在线观看| 校园人妻丝袜中文字幕| 精品久久久久久久毛片微露脸 | 啦啦啦啦在线视频资源| 日本vs欧美在线观看视频| 亚洲国产看品久久| 50天的宝宝边吃奶边哭怎么回事| 岛国毛片在线播放| 国产精品久久久久成人av| 亚洲激情五月婷婷啪啪| 国产成人欧美| 女人精品久久久久毛片| 久久毛片免费看一区二区三区| 色视频在线一区二区三区| 老司机影院毛片| 亚洲午夜精品一区,二区,三区| 一区二区三区精品91| 日韩制服丝袜自拍偷拍| 午夜久久久在线观看| 在线精品无人区一区二区三| 一本综合久久免费| 18在线观看网站| 欧美日韩亚洲高清精品| xxx大片免费视频| 久久久欧美国产精品| 亚洲,一卡二卡三卡| 国产伦人伦偷精品视频| 国产亚洲一区二区精品| 国产麻豆69| 久久亚洲精品不卡| 久久99热这里只频精品6学生| 亚洲精品美女久久久久99蜜臀 | 国产精品一区二区在线观看99| 只有这里有精品99| 精品久久蜜臀av无| 在线观看免费视频网站a站| 欧美另类一区| 久久天堂一区二区三区四区| 亚洲国产中文字幕在线视频| 日韩电影二区| 国产成人啪精品午夜网站| 超碰成人久久| 大香蕉久久网| 亚洲 欧美一区二区三区| 波野结衣二区三区在线| 老司机深夜福利视频在线观看 | 欧美精品一区二区大全| a级毛片黄视频| cao死你这个sao货| 九色亚洲精品在线播放| 丝袜人妻中文字幕| 亚洲欧美日韩另类电影网站| 日韩av不卡免费在线播放| 日韩 亚洲 欧美在线| 亚洲精品自拍成人| 在线观看www视频免费| 久久精品亚洲av国产电影网| 丝袜在线中文字幕| 国产一区二区在线观看av| 男人舔女人的私密视频| 又大又黄又爽视频免费| 人人妻,人人澡人人爽秒播 | 99久久99久久久精品蜜桃| 黑丝袜美女国产一区| 99九九在线精品视频| 黑丝袜美女国产一区| 国语对白做爰xxxⅹ性视频网站| 中文字幕人妻丝袜制服| 久久精品亚洲熟妇少妇任你| 国产免费福利视频在线观看| 亚洲一区中文字幕在线| 日韩一本色道免费dvd| 欧美成人午夜精品| 一区二区三区精品91| 亚洲精品中文字幕在线视频| 亚洲人成电影免费在线| 黑人巨大精品欧美一区二区蜜桃| 精品久久久久久电影网| 免费黄频网站在线观看国产| 自拍欧美九色日韩亚洲蝌蚪91| 久久亚洲精品不卡| av天堂久久9| 老汉色av国产亚洲站长工具| 国产1区2区3区精品| 人体艺术视频欧美日本| 亚洲自偷自拍图片 自拍| 天天操日日干夜夜撸| 欧美乱码精品一区二区三区| 三上悠亚av全集在线观看| 女警被强在线播放| 精品人妻一区二区三区麻豆| 18禁裸乳无遮挡动漫免费视频| av欧美777| 国产日韩一区二区三区精品不卡| 岛国毛片在线播放| 国产成人a∨麻豆精品| 国产男女超爽视频在线观看| 亚洲欧美清纯卡通| 交换朋友夫妻互换小说| 欧美成人午夜精品| 国产成人一区二区三区免费视频网站 | 亚洲成人免费电影在线观看 | 极品少妇高潮喷水抽搐| 亚洲精品国产一区二区精华液| 国产淫语在线视频| 国产一区二区 视频在线| 久久久国产精品麻豆| 夜夜骑夜夜射夜夜干| 婷婷色麻豆天堂久久| 久久久久久久国产电影| e午夜精品久久久久久久| 亚洲精品久久成人aⅴ小说| 黄色怎么调成土黄色| 老司机影院毛片| a 毛片基地| 午夜av观看不卡| 97在线人人人人妻| 日韩av免费高清视频| 久久亚洲国产成人精品v| 日日爽夜夜爽网站| 欧美xxⅹ黑人| 国产日韩欧美视频二区| 又大又黄又爽视频免费| 国产又爽黄色视频| 精品第一国产精品| 大香蕉久久网| 夜夜骑夜夜射夜夜干| 久久久亚洲精品成人影院| 亚洲国产欧美日韩在线播放| 国产97色在线日韩免费| 久久狼人影院| 精品第一国产精品| 成年人免费黄色播放视频| 好男人视频免费观看在线| 肉色欧美久久久久久久蜜桃| 亚洲精品日本国产第一区| 久久天躁狠狠躁夜夜2o2o | 婷婷色麻豆天堂久久| 亚洲国产欧美日韩在线播放| 精品国产一区二区久久| 巨乳人妻的诱惑在线观看| 欧美国产精品一级二级三级| 久久久久精品人妻al黑| 一区二区三区乱码不卡18| 欧美精品人与动牲交sv欧美| 国产无遮挡羞羞视频在线观看| bbb黄色大片| 少妇精品久久久久久久| 亚洲欧洲精品一区二区精品久久久| 日本黄色日本黄色录像| 9191精品国产免费久久| 大型av网站在线播放| 亚洲av综合色区一区| 七月丁香在线播放| 免费看不卡的av| 精品高清国产在线一区| 99国产精品一区二区蜜桃av |