• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Sequential Quantum Secret Sharing Using a Single Qudit?

    2018-06-11 12:21:02ChenMingBai白晨明ZhiHuiLi李志慧andYongMingLi李永明
    Communications in Theoretical Physics 2018年5期

    Chen-Ming Bai(白晨明),Zhi-Hui Li(李志慧),,? and Yong-Ming Li(李永明)

    1College of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710119,China

    2College of Computer Science,Shaanxi Normal University,Xi’an 710119,China

    1 Introduction

    Secret sharing, firstly introduced by Shamir[1]and Blakley,[2]is a cryptographic primitive which plays a significant role in the various secure multiparty computation tasks and management of keys.Secret sharing has extended to the quantum field.[3?9]Quantum secret sharing(QSS)is also a cryptographic protocol to distribute either a classical secret(string of bits)or a quantum secret(unknown quantum state)to a group of players P such that only authorized subsets of P can collaboratively recover the secret.The security of most classical cryptographic systems is based on the assumptions of computational complexity,which might be broken by the strong power of advanced algorithms,such as Shor algorithm.In addition,another main drawback of classical secret sharing schemes is that they are not perfectly secure from an eavesdropper attack.Compared to the classical one,QSS can enforce the security for cryptographic tasks due to the quantum no-cloning theorem and uncertainty properties of quantum mechanics.[10?11]In 1999,Hillery et al.[3]firstly introduced a protocol of QSS by using GHZ states.At the same year,Karlsson et al.[12]showed how a QSS protocol can be implemented using two-particle quantum entanglement and discussed how to detect eavesdropping or a dishonest participant.In 2004,Xiao et al.[13]generalized the QSS of Hillery et al. into arbitrary multipartite entangled state.From then on,various QSS schemes have been proposed.[14?23]Many scholars gave QSS schemes based on different principles,such as quantum error-correcting code[24]and local distinguishability of quantum states.[25?29]In these works,it has been shown that QSS is not only a mere theoretical concept,but also an experimental possibility.[30]

    With the development and application of quantum communication,it is a great idea to design a quantum protocol with a single state.Recently,Tavakoli et al.[31]proposed a model of(n,n)-threshold secret sharing with a single d-level quantum system(for any prime d).This model has huge advantages in scalability and can be realized with state-of-the-art technology.However,in this scheme,there are two deficiencies.Firstly,the successful probability of each round is dependent on d measurement bases,that is,the efficiency is 1/d.With the increase of d,the efficiency of this scheme will be very low.In order to improve this problem,Karimipour et al.[32]proposed a QSS with a random walk in a lattice of states for arbitrary d.With this random walk picture at hand,they can improve their scheme efficiency to reach 1/2.Although the efficiency has been improved,Lin et al.[33]found that their scheme was not secure for one dishonest who can recover the secret without the help of other participants.Secondly,Tavakoli’s scheme is just an(n,n)-threshold and not suitable for a general access structure.For the problem,Lu et al.[34]proposed a(t,n)-threshold QSS scheme based on a single d-level quantum system.In this scheme,they employed the classical Shamir’s(t,n)-threshold secret sharing.However,it cannot be applied to the general access structure.The general access structure of a secret sharing scheme is a family of all authorized sets.In general,access structures are considered to be monotone,i.e.,any superset of an authorized set must be authorized.Because each person has different weight in real life,the ability to recover the secret is different.Therefore,this general access structure is of practical significance and plays a major role in secret sharing schemes.

    In this paper,we propose a new QSS scheme,which can solve the above two problems.For the first problem,the distributor Alice in our scheme voluntarily chooses the measurement bases and sends them to all participants through quantum secure direct communication.[35]This operation can not only improve the efficiency of the protocol but also reduce the possibility of information leakage.Through this method,the efficiency of our scheme can reach 1.For the second problem,we treat each authorized set as a small threshold scheme.By cascading method,we apply our scheme to the general access structure,which makes it more practical.In particular,if the access structure contains only one authorized set,our scheme will be the same as Tavakoli’s.Therefore,our scheme is more extensive and meaningful.

    The structure of the paper is organized as follows.In Sec.2,we give some preliminaries.In Sec.3,we propose the quantum secret sharing scheme for a general access structure and show an example.Section 4 analyzes the security and compares our scheme with the existing scheme.Finally,the conclusion is given in Sec.5.

    2 Preliminaries

    In this section we briefly recall some basic concepts such as the access structure and mutually unbiased(orthonormal)bases.

    2.1 Access Structure

    Let P be a set of players,then the authorized set is a subset of P,which can reconstruct the original secret.The access structure Γ of a secret sharing scheme is a family of all authorized sets.In general,access structures are considered to be monotone increasing,i.e.,any superset of an authorized set must be authorized.For A,A′? P,if A ∈ Γ and A ? A′,then A′∈ Γ.The basis of Γ is the collection of all minimal authorized sets of P.We assume that every participant belongs to at least one minimal authorized set.

    2.2 Mutually Unbiased Bases and Unitary Operation

    Mutually unbiased bases(MUBs)are the important tool in many quantum information processing.As noted in Refs.[36–37],it is possible to find d+1 MUBs in d-dimensional quantum system only if d is(any power of prime numbers)an odd prime. At first,the computational basis is denoted by{|k?|k ∈ D},where D={0,...,d?1}.For consistency,we also restrict d to odd prime number in the whole article.

    Besides the computational basis,the explicit forms of the remaining d sets of MUBs are

    where ω =e2πi/d,j ∈ D labels the basis and l∈ D enumerates the vectors of the given basis.They are mutually unbiased because the overlap is

    In Ref.[31],the encoding operation consists of two unitary operators,Xdand Yd,which are depicted as follows:

    Using Eqs.(1)and(3),we can get

    For convenience,the operatoris written as Ux,y,

    3 The QSS Scheme on Access Structure

    In this section,we propose our scheme using a single qudit to realize a general access struture.Assume that the distributor Alice wants to share secret messages to a group P with n participants,and the general access structure is denoted by

    where Ai(i=1,2,...,r)is the minimal authorized set.

    By cascading method,we utilize our new scheme to implement the general access structure Γ,which every minimal authorized set Aican be realized by a small threshold scheme(see Fig.1).

    In order to facilitate the description of our scheme,suppose the minimal authorized set Aiis expressed as

    Step 1 Preparation:According to the authorized set Ai,the distributor Alice randomly chooses some numbers,and sendsto the participantthrough quantum secure direct communication.Note that ifappears in a different authorized set,Alice sends only one y(ν)i .

    For the authorized set Ai,Alice generates two random numbersD and prepares a stateD and only Alice knows li,ji).Then she performs the operationand obtains a new signal state

    Step 2 Distribution:Alice sends this stateto the fi rst participantin the authorized set Ai.After receiving the statehas not generated a private keythen he randomly chooses a numberOtherwise,the operation is skipped.Combined withsent by Alice,he performs the corresponding operationon this particle.sends the new statethe next participantin Ai.Thendoes the same operation asIn turn,the last participantin Aisends the new state to Alice until he follows the above method.

    Fig.1 (Color online)A flow chart for the access structure Γ={A1,A2,...,Ar},where Ai(i=1,2,...,r)is the minimal authorized set.Blue and red dots represent all participants,where red dots indicate that participants appear in different minimal authorized sets.Arrows denote the direction of particle transport.Every minimal authorized set Aican be realized by a threshold scheme.

    For authorized set Ai(i=1,2,...,r),the protocol works because after all the transformations the final state reads

    Step 3 Measurement:After Alice has received the signal state,she determines which basis to measure the particle according toThrough her calculation,if they satisfy the following condition

    then she chooses theto make a measurement on the last particle and records the measurement result ai.It implies that the private data of all participants in the authorized setsatisfy globally consistency condition

    Step 4 Detection:In order to check the security,for a randomly chosen(by Alice)subset of the rounds,all participantsin Aisend their values of their private datato her,and Alice checks condition(7).If Eq.(7)does not hold,she aborts the scheme and starts again with a new set of resources.

    Step 5 Reconstruction:If no eavesdropper is detected,according toand the measurement result ai,Alice can deduce that

    For different authorized sets,there may be different bis.Therefore,Alice depends on bito adjust the parameter αi.In order to restore the original secret,each participant in Aisends the private keyto the trusted designed combiner(TDC).Afterwards,Alice also sends the parameter αiassociated with the authorized set Aito the TDC.After the TDC has received all data,it performs an operator O,which is denoted by

    If Alice’s secret is more than one bit,Alice and all participants in the authorized set Aiexecute Steps 1–5 repeatedly.In order to save costs,the measurement basis information,can be reused.At the same time,Alice only needs to changeto ensure the security of every round.

    Example 1 In order to explain our scheme more clearly,we will give an example in the following.Suppose the access structure is denoted by Γ={P1P4P5,P2P3P5,P1P2}with five honest participants and Alice wants to share the secret message s=2∈F5.We give a distributive flow chart for the access structure(see Fig.2).

    Fig.2 (Color online)A distributive flow chart for the access structure Γ={P1P2,P2P3P5,P1P4P5},where Ux,y represents everyone operation,the red line represents the authorized set P1P2,the blue line represents the authorized set P2P3P5and the black line represents the authorized set P1P4P5.

    In accordance with the above steps all participants have their private keys.We assume that x1=0,x2=2,x3=3,x4=1,x5=3 respectively.

    For the authorized set A1={P1P4P5},Alice can calculate that x1+x4+x5=4.Then she can choose parameter α1=3 and send it to the TDC.In order to restore the secret,P1,P4and P5send their private keys to the TDC.At last,the TDC can output the secret s=2(see Fig.3).

    Fig.3 Reconstruction for the authorized set P1P4P5.

    For the authorized set A2={P2P3P5},Alice can choose parameter α2=4 and send it to the TDC.P2,P3and P5send their private keys to the TDC.Then,the TDC can calculate α2+x2+x3+x5=12 mod 5=2 and output the secret s=2.

    For the authorized set A3={P1P2},Alice can choose parameter α3=0.The TDC can calculate α3+x1+x2and output the secret.

    4 Analysis of Our Scheme

    4.1 Security Discussion

    In Ref.[31],Tavakoli et al.have given the security analysis of their scheme.However,we have improved their scheme and implemented a general access structure using cascading method.In order to check the security of our scheme,we analyse the attacks of our scheme,i.e.external attack and internal attack.

    External attack The first strategy for the eavesdropper Eve is the intercept-and-resend attack.For this attack,we consider two cases.

    (a)Eve may intercept the qudit,in the stateon the way fromin the authorized set Ai.

    (b)Eve may intercept the qudit sent by the distributor Alice and send a qudit of her own to the first participantin Aiin its stead.Eve collects her qudit once it is sent by the last participantin Ai.

    However,for two cases,she does not have any information about the measurement basis becausein our protocol are sent to participants through quantum secure direct communication without publication.In order to get the original secret,she can only choose one of d relevant bases to measure.Obviously,Eve can obtain the correct measurement result only when she happens to choose the true basis j′=j.Therefore,the successful probability is 1/d.The eavesdropping,to some extent depending on d,causes inconsistencies between the private data and condition(7).In addition,if Alice sends n-bit secret,the successful probability to obtain information is(1/d)n.Thus when the numbers of n get larger,the probability is(1/d)n≈0.Therefore,this intercept-and-resend attack does not work in our scheme.

    The second strategy for the eavesdropper Eve is the entangle-and-measure attack.Assuming that the eavesdropper Eve implements ancillary system to obtain the information.Suppose that Eve performs the unitary transform UEto entangle an auxiliary particle on the transmitted particle and then measures the auxiliary particle to steal secret information.Without loss of generality,we consider the basisin the following forms,

    where ω =e2πi/d;|E?is the initial state of Eve’s ancillary system;|εkm?(k,m=0,1,...,d?1)is the pure auxiliary state determined uniquely by the unitary transform UE,and

    In order to avoid introducing the error rate,Eve has to set:akm=0,where km and k,m ∈ {0,1,...,d?1}.Therefore,Eq.(10)and Eq.(11)can be simplified as follows:

    Similarly,Eve can obtain thatwhere g ∈ {0,1,...,d?1}and gl.Then for any l∈{0,1,...,d?1},we can get d equations.According to these d equations,we can compute that

    Therefore,no matter what the useful state is,Eve can only obtain the same information from ancillary particles.The similar discussion can be applied for the other quantum stateTherefore,the entangle-and-measure attack is unsuccessful.

    In Ref.[31],the authors considered that an alternative attack used by Eve is to send via the unitary gate of playerone more qudit or even a multiqudit pulse so that it can be somehow intercepted by her beyond the gate without intercepting the protocol qudit.For the eavesdropping,it is not suitable for our scheme and she cannot learn the actual unitary transformation,becausein our protocol are not announced.

    Internal attack In the following,we will primarily consider the participants conspiracy attack because it is always easier and more powerful than external attack and the participants can get more useful information than a fourth eavesdropper.In the worse case,only the distributor Alice and one more participant in each authorized set are honest.For example,we assume thatis honestand the rest t?1 are conspiring players.If they do not send their private keys to the TDC,they cannot recover any information because they do not know the TDC’s operator.If they send their private keys to the TDC,they can not restore the original information because the TDC does not start until it must receive all data.Even ifalso sends his key,they still can not obtain the secret due to the lack of Alice’s parameter αi.Because Alice’s parameter setting is dependent on the participant keys,if they send some fake keys,then the TDC will output “No”,that is,they cannot get the secret.

    4.2 Comparision

    In this section,we compare our protocol with Tavakoli’s scheme[31]in Table 1.

    In Tavakoli’s scheme,all participants randomly choose the measurement basis information y1,...,yn,that is,the distributor Alice does not know any information about the measurement basis.Before announcing them,she randomly chooses the basis MJ={|e(J)x?|x∈D}(J∈D)to measure her own particle.Therefore,the probability of a valid round is 1/d.In addition,after y1,...,ynare announced,the eavesdropper may learn x1,...,xnfrom the attack with one more qudit or even a multiqudit pulse through the unitary gate.Therefore,the announcement of these data increases the probability of information leakage.In our protocol,the distributor voluntarily chooses y1,...,ynwithout announcement,that is,she knows the measurement basis information.Therefore,the probability of a valid round is 1.

    In addition,Tavakoli et al. proposed an(n,n)-threshold scheme,i.e.,the(n,n)-threshold access structure.In our protocol,we give a quantum secret sharing scheme to realize a general access structure.If the access structure contains only one authorized set,then our scheme will become an(n,n)-threshold scheme.Therefore,our scheme is more extensive and meaningful.

    Table 1 Comparison of Tavakoli’s scheme[31]and our proposed one.

    5 Conclusion

    In this paper,we proposed a quantum secret sharing scheme with a single d-level quantum state to realize a general access structure.In the proposed protocol,we still applied the cyclic property of MUBs because these bases are important tools in quantum information processing.In addition,we also analysed the security of our scheme against primary quantum attacks and compared our protocol with Tavakoli’s scheme.For our scheme,the probability of each valid round is 1.When our access structure contains only one authorized set,our scheme will be the same as Tavakoli’s.

    However,since MUBs are still unknown,we only consider the odd primes.For even number or power of prime number,we do not give any discussion.In Refs.[36–27],many algebraic properties of power of prime numbers have been given,then we hope that more researchers will study these problems and propose more important schemes.

    Acknowledgements

    We want to express our gratitude to anonymous referees for their valuable and constructive comments.

    [1]A.Shamir,Commun.ACM 22(1979)612.

    [2]G.R.Blakley,in Proceedings of the National Computer Conference,(AFIPS,1979)(1979)pp.313–317.

    [3]M.Hillery,V.Buzek,and A.Berthiaume,Phys.Rev.A 59(1999)1829.

    [4]R.Cleve,D.Gottesman,and H.K.Lo,Phys.Rev.Lett.83(1999)648.

    [5]D.Gottesman,Phys.Rev.A 61(2000)042311.

    [6]F.G.Deng,H.Y.Zhou,and G.L.Long,J.Phys.A:Math.Gen.39(2006)14089.

    [7]A.M.Lance,T.Symul,W.P.Bowen,et al.,Phys.Rev.Lett.92(2004)177903.

    [8]F.G.Deng,X.H.Li,C.Y.Li,et al.,Phys.Rev.A 72(2005)044301.

    [9]G.Gordon and G.Rigolin,Phys.Rev.A 73(2006)062316.

    [10]W.K.Wootters and W.H.Zurek,Nature(London)299(1982)802.

    [11]D.Dieks,Phys.Lett.A 92(1982)271.

    [12]A.Karlsson,M.Koashi,and N.Imoto,Phys.Rev.A 59(1999)162.

    [13]L.Xiao,G.L.Long,F.G.Deng,and J.W.Pan,Phys.Rev.A 69(2004)052307.

    [14]H.Cao and W.P.Ma,IEEE Photonics J.9(2017)1.

    [15]C.M.Bai,Z.H.Li,T.T.Xu,and Y.M.Li,Int.J.Theor.Phys.55(2016)4972.

    [16]A.Maitra,S.J.De,G.Paul,and A.K.Pal,Phys.Rev.A 92(2015)022305.

    [17]L.H.Gong,H.C.Song,C.S.He,et al.,Physica Scripta 89(2014)035101.

    [18]P.Sarvepalli and R.Raussendorf,Phys.Rev.A 81(2010)052333.

    [19]L.Y.Hsu and C.M.Li,Phys.Rev.A 71(2005)022321.

    [20]C.M.Bai,Z.H.Li,M.M.Si,et al.,Eur.Phys.J.D 71(2017)255.

    [21]X.J.Wang,L.X.An,X.T.Yu,et al.,Phys.Lett.A 381(2017)3282.

    [22]Y.F.He and W.P.Ma,Int.J.Quantum Inf.14(2016)1650007.

    [23]K.J.Zhang,L.Zhang,T.T.Song,et al.,Science China Phys.Mech.&Astron.6(2016)1.

    [24]Z.Zhang,W.Liu,and C.Li,Chin.Phys.B 20(2011)050309.

    [25]R.Rahaman and M.G.Parker,Phys.Rev.A 91(2015)022330.

    [26]Y.H.Yang,F.Gao,X.Wu,et al.,Sci.Rep.5(2015)16967.

    [27]C.M.Bai,Z.H.Li,T.T.Xu,et al.,Quantum Inf.Process 16(2017)59.

    [28]J.Wang,L.Li,H.Peng,and Y.Yang,Phys.Rev.A 95(2017)022320.

    [29]J.T.Wang,G.Xu,X.B.Chen,et al.,Phys.Lett.A 381(2017)998.

    [30]H.Lu,Z.Zhang,L.K.Chen,et al.,Phys.Rev.Lett.117(2016)030501.

    [31]A.Tavakoli,I.Herbauts,M.Zukowski,and M.Bourennane,Phys.Rev.A 92(2015)030302(R).

    [32]V.Karimipour and M.Asoudeh,Phys.Rev.A 92(2015)030301(R).

    [33]S.Lin,G.D.Guo,Y.Z.Xu,et al.,Phys.Rev.A 93(2016)062343.

    [34]C.Lu,F.Miao,et al.,Quantum Inf.Process 17(2018)64.

    [35]C.Wang,F.Miao,Y.S.Li,et al.,Phys.Rev.A 71(2005)044305.

    [36]I.D.Ivonovic,J.Phys.A:Math.Gen.14(1981)3241.

    [37]W.K.Wootters and B.D.Fields,Ann.Phys.191(1989)363.

    午夜激情欧美在线| 欧美最新免费一区二区三区 | 国产亚洲精品av在线| 久久九九热精品免费| 俺也久久电影网| 在线观看午夜福利视频| 成年人黄色毛片网站| 热99re8久久精品国产| 乱码一卡2卡4卡精品| 欧美精品啪啪一区二区三区| 欧美一区二区精品小视频在线| 国产精品一及| 狠狠狠狠99中文字幕| 亚洲人与动物交配视频| 日韩大尺度精品在线看网址| 亚洲人成网站在线播放欧美日韩| 婷婷色综合大香蕉| 国产精品精品国产色婷婷| 简卡轻食公司| 午夜精品一区二区三区免费看| 免费无遮挡裸体视频| 最好的美女福利视频网| 欧美一区二区国产精品久久精品| 亚洲欧美日韩高清专用| 色综合欧美亚洲国产小说| 欧美日本视频| 国产精品久久久久久亚洲av鲁大| 国产一区二区激情短视频| 男人和女人高潮做爰伦理| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 日本 av在线| 男人舔女人下体高潮全视频| 成年版毛片免费区| 一个人看视频在线观看www免费| 成人高潮视频无遮挡免费网站| 日本成人三级电影网站| 精品一区二区三区人妻视频| 国产av在哪里看| 久久99热这里只有精品18| 91在线精品国自产拍蜜月| 狂野欧美白嫩少妇大欣赏| 国产精品野战在线观看| 日韩欧美 国产精品| 美女高潮喷水抽搐中文字幕| 美女cb高潮喷水在线观看| 中文字幕人妻熟人妻熟丝袜美| 免费无遮挡裸体视频| 国产不卡一卡二| 舔av片在线| 极品教师在线免费播放| 日韩av在线大香蕉| 啪啪无遮挡十八禁网站| 亚洲精品久久国产高清桃花| 亚洲狠狠婷婷综合久久图片| 精品免费久久久久久久清纯| 午夜免费激情av| 午夜激情欧美在线| 级片在线观看| 久久久久久久久中文| 精品人妻偷拍中文字幕| 久久久久久久午夜电影| 在线免费观看不下载黄p国产 | 精品国产亚洲在线| 国产精品,欧美在线| a在线观看视频网站| 中文在线观看免费www的网站| av福利片在线观看| 男女做爰动态图高潮gif福利片| 精品久久久久久久末码| 精品人妻一区二区三区麻豆 | 亚洲精品乱码久久久v下载方式| 亚洲国产精品合色在线| 国产不卡一卡二| 欧美成人a在线观看| 成人av一区二区三区在线看| 91麻豆精品激情在线观看国产| 日韩高清综合在线| 国产在线精品亚洲第一网站| 欧美三级亚洲精品| 国产高清视频在线观看网站| 一本一本综合久久| 免费人成在线观看视频色| 国产精品综合久久久久久久免费| 国产亚洲欧美在线一区二区| 少妇人妻精品综合一区二区 | 自拍偷自拍亚洲精品老妇| 在线免费观看的www视频| 一级黄色大片毛片| 亚洲一区高清亚洲精品| 三级毛片av免费| 亚洲最大成人手机在线| 999久久久精品免费观看国产| 免费看光身美女| 国产毛片a区久久久久| 日本黄大片高清| 国产乱人视频| 久久伊人香网站| 亚洲国产色片| 免费在线观看亚洲国产| 成熟少妇高潮喷水视频| 欧美3d第一页| 午夜久久久久精精品| 亚洲国产精品久久男人天堂| 免费一级毛片在线播放高清视频| 精品99又大又爽又粗少妇毛片 | 91麻豆精品激情在线观看国产| 九色成人免费人妻av| 性色av乱码一区二区三区2| 男人和女人高潮做爰伦理| 在线播放国产精品三级| 亚洲精品在线美女| 国产一区二区亚洲精品在线观看| 亚洲人成伊人成综合网2020| 日本熟妇午夜| 美女免费视频网站| 美女免费视频网站| 亚洲avbb在线观看| 国产又黄又爽又无遮挡在线| 国产av麻豆久久久久久久| 国产探花极品一区二区| 91久久精品电影网| 97人妻精品一区二区三区麻豆| 美女免费视频网站| 男女做爰动态图高潮gif福利片| 亚洲精品粉嫩美女一区| 最近中文字幕高清免费大全6 | 少妇高潮的动态图| 亚洲中文字幕日韩| 老熟妇仑乱视频hdxx| 日韩欧美精品v在线| 美女高潮喷水抽搐中文字幕| 日韩av在线大香蕉| 亚洲欧美激情综合另类| 亚洲人成网站高清观看| 亚洲欧美日韩东京热| 国产高清视频在线播放一区| 男人舔女人下体高潮全视频| 国产一区二区在线av高清观看| 久久午夜福利片| 国产精华一区二区三区| 国产日本99.免费观看| 最近最新中文字幕大全电影3| 中文字幕av在线有码专区| АⅤ资源中文在线天堂| 久久婷婷人人爽人人干人人爱| 波多野结衣高清无吗| 欧美最黄视频在线播放免费| 久久久久久久久中文| 日本熟妇午夜| 国产爱豆传媒在线观看| 日韩欧美一区二区三区在线观看| 一个人免费在线观看电影| 国产麻豆成人av免费视频| 国产综合懂色| 亚洲最大成人中文| 久久精品人妻少妇| 一级a爱片免费观看的视频| 亚洲综合色惰| 国产一区二区在线av高清观看| 变态另类成人亚洲欧美熟女| 嫩草影院入口| 亚洲精品影视一区二区三区av| 欧美色视频一区免费| 精品午夜福利视频在线观看一区| 天堂av国产一区二区熟女人妻| 亚洲专区国产一区二区| 精品国产三级普通话版| 精品久久久久久久末码| 精品久久久久久成人av| 麻豆久久精品国产亚洲av| 最近视频中文字幕2019在线8| 精品久久久久久成人av| 一进一出抽搐gif免费好疼| 日本免费a在线| 亚洲第一电影网av| 国产乱人视频| 国产探花极品一区二区| 美女高潮喷水抽搐中文字幕| 欧美丝袜亚洲另类 | 一级黄色大片毛片| a级毛片a级免费在线| 亚洲av电影不卡..在线观看| 国产极品精品免费视频能看的| 嫩草影院精品99| 国产v大片淫在线免费观看| 国产熟女xx| 午夜视频国产福利| 1024手机看黄色片| 十八禁人妻一区二区| 一进一出抽搐动态| 简卡轻食公司| 草草在线视频免费看| av欧美777| 国产av不卡久久| 日本 欧美在线| 一级av片app| 久久久久久久久中文| av在线蜜桃| 黄色女人牲交| 日韩有码中文字幕| 好看av亚洲va欧美ⅴa在| 他把我摸到了高潮在线观看| 日韩欧美精品免费久久 | 久久精品影院6| 哪里可以看免费的av片| 免费大片18禁| 欧美色欧美亚洲另类二区| 日日摸夜夜添夜夜添小说| 亚洲一区二区三区色噜噜| 美女黄网站色视频| 亚洲五月天丁香| 国产成人av教育| 日本一本二区三区精品| 亚洲最大成人中文| 久久国产乱子免费精品| 听说在线观看完整版免费高清| 一进一出抽搐动态| 久久久久国产精品人妻aⅴ院| 亚洲18禁久久av| 桃色一区二区三区在线观看| 熟女电影av网| 免费大片18禁| 高潮久久久久久久久久久不卡| 亚洲av成人不卡在线观看播放网| 嫩草影院精品99| 欧美成狂野欧美在线观看| 一级av片app| 中文在线观看免费www的网站| 欧美精品啪啪一区二区三区| 午夜福利在线在线| 国产成年人精品一区二区| 男人的好看免费观看在线视频| 亚洲国产日韩欧美精品在线观看| 在线免费观看的www视频| 男人狂女人下面高潮的视频| 每晚都被弄得嗷嗷叫到高潮| 亚洲国产精品成人综合色| 天堂av国产一区二区熟女人妻| 国产蜜桃级精品一区二区三区| x7x7x7水蜜桃| 动漫黄色视频在线观看| 久久久久久久精品吃奶| 18+在线观看网站| 丰满的人妻完整版| 首页视频小说图片口味搜索| 麻豆久久精品国产亚洲av| 色播亚洲综合网| 看黄色毛片网站| 国产精品,欧美在线| 一级av片app| 老熟妇仑乱视频hdxx| 亚洲精华国产精华精| 中文资源天堂在线| 国产国拍精品亚洲av在线观看| 午夜福利成人在线免费观看| 男人舔奶头视频| 日韩欧美精品免费久久 | 亚洲七黄色美女视频| av专区在线播放| 男女做爰动态图高潮gif福利片| 欧美色欧美亚洲另类二区| 动漫黄色视频在线观看| 一个人观看的视频www高清免费观看| 亚洲午夜理论影院| 国产精品一区二区三区四区久久| 国产精品久久电影中文字幕| 精品人妻1区二区| 亚洲成av人片免费观看| 国产精品国产高清国产av| 90打野战视频偷拍视频| 精品日产1卡2卡| 亚洲人成网站在线播放欧美日韩| 一区福利在线观看| 日韩av在线大香蕉| 亚洲精品乱码久久久v下载方式| 小说图片视频综合网站| 久久婷婷人人爽人人干人人爱| 一区二区三区免费毛片| 国产 一区 欧美 日韩| 久久精品91蜜桃| 亚洲内射少妇av| 狂野欧美白嫩少妇大欣赏| 午夜两性在线视频| 免费搜索国产男女视频| 欧美乱色亚洲激情| 久久久久久国产a免费观看| 真实男女啪啪啪动态图| 久久这里只有精品中国| 婷婷丁香在线五月| 亚洲乱码一区二区免费版| 精品一区二区三区视频在线| 九九在线视频观看精品| 欧美黑人巨大hd| 在线播放无遮挡| 国产高清视频在线观看网站| 亚洲天堂国产精品一区在线| 搡女人真爽免费视频火全软件 | 久久久久久久午夜电影| 国产色婷婷99| 亚洲激情在线av| 午夜福利成人在线免费观看| 国产真实伦视频高清在线观看 | 成人精品一区二区免费| 精品午夜福利在线看| 特大巨黑吊av在线直播| 亚洲精品一区av在线观看| 99在线视频只有这里精品首页| 小说图片视频综合网站| 夜夜爽天天搞| 亚洲最大成人中文| 一个人免费在线观看电影| 免费av观看视频| 亚洲熟妇熟女久久| 国产精品一区二区免费欧美| 黄色女人牲交| 国产成人啪精品午夜网站| 99国产极品粉嫩在线观看| 草草在线视频免费看| 免费搜索国产男女视频| 淫妇啪啪啪对白视频| 久久久久亚洲av毛片大全| 乱人视频在线观看| 如何舔出高潮| 亚洲人成网站在线播放欧美日韩| 日韩成人在线观看一区二区三区| 18美女黄网站色大片免费观看| 脱女人内裤的视频| 午夜视频国产福利| 精品不卡国产一区二区三区| 成年女人永久免费观看视频| 久久精品国产99精品国产亚洲性色| 一个人看的www免费观看视频| 美女高潮喷水抽搐中文字幕| 亚洲人成电影免费在线| 国内精品一区二区在线观看| 亚洲av美国av| xxxwww97欧美| 久久久久久久久久成人| 久久国产乱子免费精品| 午夜免费激情av| 99久久精品一区二区三区| 此物有八面人人有两片| 亚洲av一区综合| 国内久久婷婷六月综合欲色啪| 精品一区二区三区人妻视频| 欧美性猛交╳xxx乱大交人| 精品久久久久久成人av| 99久久久亚洲精品蜜臀av| 国产亚洲精品久久久com| 在线观看66精品国产| 性插视频无遮挡在线免费观看| 黄色一级大片看看| 欧美zozozo另类| 久久久久国产精品人妻aⅴ院| 搡老妇女老女人老熟妇| 老司机深夜福利视频在线观看| 亚洲av电影在线进入| 人人妻人人看人人澡| 欧美性猛交黑人性爽| 国产伦精品一区二区三区四那| 精品久久久久久久久av| 啦啦啦韩国在线观看视频| 波多野结衣高清作品| 国产 一区 欧美 日韩| 色吧在线观看| 国产高清三级在线| 一二三四社区在线视频社区8| 亚洲欧美日韩高清在线视频| 亚洲av成人av| 国产伦精品一区二区三区四那| 女生性感内裤真人,穿戴方法视频| 日日夜夜操网爽| 麻豆国产97在线/欧美| 美女被艹到高潮喷水动态| 国产av不卡久久| 99热精品在线国产| 成人特级av手机在线观看| 在线国产一区二区在线| 久久久精品欧美日韩精品| 中文资源天堂在线| 国产精品自产拍在线观看55亚洲| 午夜久久久久精精品| 成人毛片a级毛片在线播放| 亚洲性夜色夜夜综合| 高潮久久久久久久久久久不卡| avwww免费| 久久九九热精品免费| 日本熟妇午夜| 亚洲狠狠婷婷综合久久图片| 久久久精品大字幕| 草草在线视频免费看| 性插视频无遮挡在线免费观看| 一区二区三区四区激情视频 | 婷婷丁香在线五月| 午夜福利高清视频| 18禁裸乳无遮挡免费网站照片| 欧美乱色亚洲激情| 色哟哟·www| 国产高清三级在线| 国产免费一级a男人的天堂| 18禁在线播放成人免费| 亚洲人成网站在线播| 国内精品美女久久久久久| 国产伦人伦偷精品视频| 亚洲精品456在线播放app | av在线蜜桃| 女人十人毛片免费观看3o分钟| 麻豆一二三区av精品| 美女黄网站色视频| 国产精品伦人一区二区| 国产午夜福利久久久久久| 国产精品女同一区二区软件 | 免费观看精品视频网站| 午夜免费成人在线视频| 最近最新免费中文字幕在线| 国产成人啪精品午夜网站| 国产午夜精品久久久久久一区二区三区 | 成人性生交大片免费视频hd| 日韩精品中文字幕看吧| 国产高清有码在线观看视频| 亚洲va日本ⅴa欧美va伊人久久| 国产精品爽爽va在线观看网站| 成人欧美大片| 波多野结衣高清作品| 精品午夜福利视频在线观看一区| 国产极品精品免费视频能看的| 最近最新免费中文字幕在线| 亚洲欧美日韩东京热| 日本免费a在线| 国产伦一二天堂av在线观看| 丰满乱子伦码专区| 脱女人内裤的视频| 精品午夜福利在线看| 国产又黄又爽又无遮挡在线| 免费av毛片视频| 黄色丝袜av网址大全| 久久久久亚洲av毛片大全| 非洲黑人性xxxx精品又粗又长| 神马国产精品三级电影在线观看| 亚洲成人久久爱视频| 免费在线观看日本一区| 波多野结衣高清无吗| 美女cb高潮喷水在线观看| 日韩精品中文字幕看吧| 久久久久久大精品| 久久久精品大字幕| 国产私拍福利视频在线观看| 亚洲男人的天堂狠狠| 少妇人妻一区二区三区视频| 午夜精品在线福利| 一个人看的www免费观看视频| 国内毛片毛片毛片毛片毛片| 成人一区二区视频在线观看| 免费电影在线观看免费观看| 别揉我奶头 嗯啊视频| 搡老岳熟女国产| 亚洲真实伦在线观看| 午夜福利视频1000在线观看| 国产黄片美女视频| 亚洲国产精品成人综合色| 亚洲真实伦在线观看| 偷拍熟女少妇极品色| 色尼玛亚洲综合影院| 国产野战对白在线观看| 午夜福利视频1000在线观看| 免费看光身美女| 亚洲国产欧美人成| 日韩欧美国产在线观看| 亚洲成人精品中文字幕电影| 毛片女人毛片| 少妇熟女aⅴ在线视频| 俄罗斯特黄特色一大片| 天堂av国产一区二区熟女人妻| 免费高清视频大片| 午夜精品一区二区三区免费看| 亚洲 欧美 日韩 在线 免费| 一边摸一边抽搐一进一小说| 久久久色成人| а√天堂www在线а√下载| x7x7x7水蜜桃| 亚洲第一欧美日韩一区二区三区| 成年女人毛片免费观看观看9| 亚洲成av人片在线播放无| 亚洲七黄色美女视频| 色视频www国产| 国产白丝娇喘喷水9色精品| 亚洲av免费在线观看| 麻豆国产av国片精品| 99国产精品一区二区三区| 日韩欧美精品v在线| 日韩欧美精品免费久久 | 亚洲av电影不卡..在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 日韩成人在线观看一区二区三区| 日韩高清综合在线| 国产欧美日韩精品一区二区| 久久欧美精品欧美久久欧美| 天天躁日日操中文字幕| 国产伦精品一区二区三区四那| 欧美日本亚洲视频在线播放| 欧美zozozo另类| 精品国内亚洲2022精品成人| 少妇丰满av| 久99久视频精品免费| 亚洲色图av天堂| 国产一区二区激情短视频| 国产成人欧美在线观看| 1000部很黄的大片| 亚洲精品粉嫩美女一区| 日本黄色片子视频| 国产毛片a区久久久久| 亚洲自偷自拍三级| 免费av观看视频| av视频在线观看入口| 中文亚洲av片在线观看爽| 麻豆成人午夜福利视频| 婷婷色综合大香蕉| 亚洲av成人精品一区久久| 国产一区二区三区在线臀色熟女| 免费无遮挡裸体视频| 欧美色视频一区免费| 日本与韩国留学比较| 色综合欧美亚洲国产小说| 丰满人妻一区二区三区视频av| 久久久久久久久中文| 欧美成人性av电影在线观看| 999久久久精品免费观看国产| 99久久精品国产亚洲精品| 热99在线观看视频| 啦啦啦韩国在线观看视频| 日本免费a在线| 国产精品亚洲一级av第二区| 亚洲人成伊人成综合网2020| 国产免费av片在线观看野外av| 美女被艹到高潮喷水动态| 搡老妇女老女人老熟妇| 亚洲精品在线美女| 又爽又黄无遮挡网站| 精品乱码久久久久久99久播| 搞女人的毛片| 国产精品免费一区二区三区在线| 精品乱码久久久久久99久播| 久久久久九九精品影院| 丁香六月欧美| 免费在线观看影片大全网站| 90打野战视频偷拍视频| 校园春色视频在线观看| 国产高清视频在线播放一区| 中国美女看黄片| 91狼人影院| 88av欧美| 美女高潮的动态| 日本黄大片高清| 亚洲五月天丁香| 国产精品不卡视频一区二区 | 在线看三级毛片| 悠悠久久av| 国产亚洲精品久久久com| 国产精品一区二区三区四区免费观看 | 免费高清视频大片| 中文字幕人妻熟人妻熟丝袜美| 大型黄色视频在线免费观看| 女人十人毛片免费观看3o分钟| 国产午夜福利久久久久久| 97热精品久久久久久| 国产精品野战在线观看| 欧美潮喷喷水| 日韩中字成人| 日韩亚洲欧美综合| 中文资源天堂在线| 久久精品国产清高在天天线| 日本一二三区视频观看| 色5月婷婷丁香| 琪琪午夜伦伦电影理论片6080| 九色国产91popny在线| 99国产极品粉嫩在线观看| a在线观看视频网站| 伦理电影大哥的女人| 美女xxoo啪啪120秒动态图 | 小蜜桃在线观看免费完整版高清| 不卡一级毛片| 青草久久国产| 日韩精品中文字幕看吧| 九九热线精品视视频播放| 可以在线观看毛片的网站| 在线观看一区二区三区| 亚洲第一欧美日韩一区二区三区| 精华霜和精华液先用哪个| 国产成人欧美在线观看| 2021天堂中文幕一二区在线观| 国产中年淑女户外野战色| 国产高清视频在线播放一区| 男人的好看免费观看在线视频| 熟女电影av网| 日本一二三区视频观看| 亚洲欧美日韩东京热| 嫩草影院新地址| 激情在线观看视频在线高清| 天天躁日日操中文字幕| 国内精品美女久久久久久| 精品人妻熟女av久视频| 免费看a级黄色片| 成年女人毛片免费观看观看9| 精品久久久久久久久亚洲 | 欧美一区二区国产精品久久精品| 99热这里只有是精品50| 色吧在线观看| 国产色婷婷99| 国产一区二区亚洲精品在线观看| 中文字幕久久专区| 哪里可以看免费的av片| 脱女人内裤的视频| 欧美日韩中文字幕国产精品一区二区三区| 亚洲中文日韩欧美视频| 超碰av人人做人人爽久久|