• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution

    2019-11-06 00:44:18YiBoZhao趙義博WanLiZhang張萬里DongWang王東XiaoTianSong宋蕭天LiangJiangZhou周良將andChiBiaoDing丁赤飚
    Chinese Physics B 2019年10期
    關鍵詞:王東

    Yi-Bo Zhao(趙義博), Wan-Li Zhang(張萬里), Dong Wang(王東), Xiao-Tian Song(宋蕭天),Liang-Jiang Zhou(周良將),3,?, and Chi-Biao Ding(丁赤飚),3

    1National Key Laboratory of Microwave Imaging Technology,Beijing 100190,China

    2Institute of Electronics,Chinese Academy of Sciences,Beijing 100190,China

    3University of Chinese Academy of Sciences,Beijing 100049,China

    Keywords:quantum secure imaging(QSI),quantum key distribution(QKD),digital micro-mirror device(DMD),quantum bit error rate(QBER)

    1.Introduction

    How to enhance the anti-jamming ability of radar is an urgent problem to be solved in the traditional radar countermeasures technology.[1,2]In the last two decades,with the intensive research and development of the techniques of quantum communication,[3–5]quantum imaging,[6–22]and quantum radar,[23,24]a series of results have been obtained,which provide a solution for improving the anti-jamming ability of radar.

    In 1995,quantum imaging was first observed,[6]also known as ghost imaging(GI).Entangled photon pairs produced by spontaneous parametric down-conversion were used,while one of the photons passing through the object was collected by a photon counter or a bucket detector with no spatial resolution(called the signal beam or object beam),its twin photon was detected by a multipixel detector[e.g.,a chargecoupled device(CCD)camera]without ever passing through the object(called the reference beam).Nevertheless,by correlating the intensities measured by the bucket detector with the intensities of each pixel in the multipixel detector,an image of the object was reconstructed.[6]In a long time,entanglement swapping was considered as the necessary condition for GI.[25]However,from 2002 GI was implemented by classical light sources,[9–18]especially the groups of Wang,[12]Wu,[13]and Han[14,15]accomplished a large numbers of GI experiments based on pseudo-thermal or real thermal light sources,which proved that entanglement is not the one and only way to achieve GI.After then,computational ghost imaging(CGI)was proposed[19]and verified by experiments,[20,21]which could be deployed with only one optical beam and one detector with no spatial resolution by replacing the reference beam with a controllable and pre-modulated light source.[22]The greatly simplified imaging system reduces the number of preset patterns and the imaging computational complexity,and then raises the imaging efficiency.[22]Based on the above,CGI and quantum secure imaging(QSI)could be applied to radar imaging faultlessly.Reference[8]introduced an anti-jamming quantum radar imaging(QRI)that utilized the BB84 protocol quantum key distribution(QKD)based on polarization encoding,which could verify the authenticity of imaging information by detecting the consistency of photon polarization states between the sender and the receiver. Up to now,the BB84 protocol is the most mature and widely used quantum key distribution protocol and its theoretical security has been fully proved.[26,27]Therefore,intercept-resend attacks are exposed immediately and the authenticity of the imaging information can be guaranteed through combining the CGI and QKD on radar technology.In addition,the quantum imaging technology has many advantages of higher resolution,higher contrast,higher signal-to-noise ratio(SNR),and less influence of atmospheric turbulence[7]compared with the traditional imaging.QSI will has great application value in the fields of aerial detection,military reconnaissance,and battlefield imaging in the future.

    Inspired by Ref.[8],we present a QSI scheme combining the phase-encoding BB84 QKD and CGI technology.Unlike the original scheme,our scheme adopt phase-encoding QKD,in which the relative phase is rather stable against disturbance.Moreover,owing to the fact that perfect single-photon source is still unavailable,a pulsed laser source with Poisson distribution is used in the QKD system.By combing the decoy-state method,we can estimate the contribution of the multi-photon part to obtain the lower bound of QBER under the interceptresend jamming attack,which is tighter than the origin one.In our experiment,a digital micro-mirror device(DMD)with quick response speed is used to preset the specific spatial distribution of the light intensity,and a single-photon detector(SPD)with quick response speed is used to measure the total light intensity,eventually the image of the object is retrieved through calculating the intensity distribution and the total intensity of light.Comparing with the traditional ghost imaging(TGI),QSI has been greatly improved in the data sampling rate and reduced in the imaging algorithm complexity and shortened the imaging time.More importantly,the quantum bit error rate(QBER)and the secure key rate of QKD are obtained in the experiment to see through the intercept-resend jamming attacks and ensure the authenticity of the imaging information.

    2.Theory and method

    The QSI system contains the imaging system and the QKD system,as shown in Fig.1,which mainly includes a QKD sender(Alice),a QKD receiver(Bob),and the spatial light path of CGI in more details.In our scheme,Alice sends out strongly attenuated coherent states with key bits information,which is encoded into the relative phase of a pair of coherent states shifted in time that are generated by an asymmetric interferometer.These photons pass through the beam expanding lens,the obtained speckle is then modulated into a specific spatial distribution of intensity with a DMD.The pulse with certain intensity distribution illuminates the object,and is coupled into the receiver,performs the decoding and detecting procedure.Finally we can reconstruct the image of the object with the detected counts.It should be stressed that in the QKD procedure,the key bits information is encoded into the relative phase between the two time-bin mode of signal pulses,which is rather stable during the display time of one frame of the DMD,since the modulation of DMD just changes the global phase of the whole two-time-bin pulses rather than the relative phase between them. Therefore,the pulses passing through the imaging optical path and arrive at Bob without changing the coding information,and can be further correctly decoded by Bob.Compared with the conventional CGI system,the major difference is that the light source and detector are replaced by a QKD sender and receiver in our QSI scheme,with which the security of imaging can be promoted.As it is necessary to measure the photon counts and QBER during the display time of every pattern loaded in the DMD,the trigger signals of the laser,the DMD,and the SPDs should be synchronized.The image of the object is reconstructed through calculating the pre-modulated intensity distribution of the DMD and the measured total intensity of the SPDs,while the QBER is monitored to estimate whether the imaging process is safe and real.

    Fig.1. Schematic of the quantum secure imaging system. Polarized single-photon from Alice passes through the beam expanding lens,is modulated into specific spatial intensity distribution by the DMD,then transmits through the object,finally is coupled into Bob and detected by SPDs.The image of the object is reconstructed and the QBER is monitored to estimate whether the imaging process is safe and real. The angle of reflection from the DMD is exaggerated in the figure for clarity but is about 24?in reality.

    2.1.Quantum key distribution system

    Quantum key distribution technology is one of the most mature and commonly used communication methods in quantum communication,as well as the BB84 protocol in QKD protocol,whose theoretical security has been fully proved.[26,27]So,we adopt the scheme based on the phase encoding BB84 protocol of QKD.[3,4]Our QKD system is shown in Fig.2.It is composed of two parts of Alice and Bob.Alice uses a pulsed laser to produce coherent pulses.An intensity modulator is used to produce signal and decoy pulses of differing intensities.The vacuum pulse is produced by omitting trigger signal to the laser.An unbalanced Mach–Zehnder interferometer(UMZI)with a phase modulator(PM)in the long arm plays the role of encoder,while there is an identical UMZI in Bob.[3]SPDs are deployed by Bob to detect the interferometric outcomes from the interferometer.Moreover,an electronic variable optical attenuator(EVOA)is used to attenuate the intensity of the laser pulses to the single-photon level before sending out from the sender.[26]In the experiment,the intensities of the signal and decoy pulses are set asμand ν to perform the weak+vacuum decoy-state BB84 QKD protocol.[28]

    Fig.2.Schematic of the phase encoding and weak+vacuum decoy-state BB84 protocol QKD.IM:intensity modulator;BS:beam splitter;PM:phase modulator;EVOA:electronic variable optical attenuator;SPD:single-photon detector.The signal and decoy pulses are produced by IM.Two identical UMZIs in Alice and Bob play roles of encoder.An EVOA is used to attenuate the intensity of the laser pulses to the singlephoton level.

    According to the phase encoding BB84 protocol,the relative phase on Alice is selected randomly from four values 0,π/2,π,and 3π/2,where 0,π are in the Z basis,and π/2,π/2 are in the X basis.Bob measures the incoming quantum states from Alice also in Z or X basis randomly.Whenever Alice and Bob use the same basis,the two SPDs will get correct results with a small QBER.However,when they use different bases,the two SPDs will get an uncertain result together.Alice then reveals only whether or not the state in which she encoded that qubit is compatible with the basis announced by Bob.If the state is compatible,they keep the bit;if not,they disregard it.In this way,fifty percent of the bit string is discarded.This shorter key obtained after basis reconciliation is called the sifted key.

    2.2.Intercept-resend eavesdropping strategy

    In the practical QKD system,Alice uses the weak coherent source(WCS)together with the decoy-state method to substitute the unavailable single-photon source. The photon number of each pulse follows the Poisson distribution. The probability of finding an n-photon state in a pulse is given bywhereμis the mean photon number.With the phases randomization,the states sent by Alice are described by

    In the case of quantum secure imaging or quantum radar,the potential attacker usually adopts the intercept-resend strategy to forge the target.Since the QKD system is applied to enhance its security,here we just consider the intercept-resend quantum eavesdropping strategy that was proposed by Curty et al.[29]Eve’s attack strategy can be decomposed into three steps. In the first step,Eve obtains the total photon number n of each pulse sent by Alice via a quantum non-demolition(QND)measurement without introducing any errors. Then she performs a filter operation on the statewith the intention to make them distinguishable with some finite probability.Finally,in the third step,Eve measures each filtered state with the so-called square-root measurement(SRM).This measurement gives her the minimum value of the error probability when distinguishing symmetric states.After deciding which state was used by Alice,Eve needs to prepare a new signal in the state identified and gives it to Bob. The error rate introduced by Eve with this eavesdropping strategy for a signal state containing n photons is given by

    The analysis for the case of n=2 is similar.The coefficients cj(2)of the signal statesare of the formsandrespectively.The partial error rate e2is given by

    In order to give the lower bound of total error rate of the signal state at the present of intercept-resend attack,we adopt the model of decoy-state method to estimate the yield of photon pulses.[28]In the weak+vacuum decoy-state method,Alice randomly prepares the signal,decoy,and vacuum state with intensities ofμ,ν,and 0,respectively.For 0<ν<μ≤1,the following inequalities hold for all n ≥3:

    The overall gains of the signal and decoy state are given by

    where Ynis the yield of an n-photon state,i.e.,the conditional probability of a detection event at Bob’s side given that Alice sends out an i-photon state.

    By using the inequalities(6)and Eq.(8),the joint contribution of one-photon and two-photon components can be deduced as follows:

    where Y0is the background rate,which includes the detector dark count and other background contributions such as the stray light from timing pulses.

    The total error rate of the decoy state when Eve performs the intercept-resend attack is given by

    where eiis the error rate of the i-photon state,and the error rate of the background e0=1/2.Thus we can obtain the lower bound of the decoy state total error rate

    Therefore,one can monitor the error rate of the decoy state,when the error rate of our QSI system is greater thanit implies the existence of Eve and the images obtained from a signal cannot be considered secure.In addition,whether our QKD system obtains secure keys can also be a criterion of secure imaging.

    2.3.Computational quantum imaging system

    CGI is an improvement from TGI.A spatial light modulator(SLM)or a CCD is used to preset the specific spatial distribution of the light intensity.Disregarding the reference beam,so just a single-pixel detector is needed.[20]In this imaging scheme,take the DMD to be a part of Alice. According to the security requirement of the decoy state BB84 protocol,the intensity of the laser pulses has to be lowered to the singlephoton level at the exit of the DMD by an EVOA.

    As in our scheme,a DMD is used to preset intensity patterns of speckles,and single-photon detectors are employed to measure the counts corresponding to each pattern. Suppose N is the number of intensity patterns modulated by the DMD,one can obtain the total count Bi(1 ≤i ≤N)during the display time of the i-th pattern,whose intensity distribution is denoted by Ii(x,y)(1 ≤i ≤N).Then the image of the object can be obtained by summing the calculated intensities Iiwith the appropriate weights Bi[20]

    where

    is the mean value of Bi,and Bimeets the following formula:

    where T(x,y)is the transmission function of the object.

    3.Experiment and results

    The QSI system is set up as shown in Fig.3.In the QKD system,the pulsed laser is working at a frequency of 40 MHz and a central wavelength of 1550.12 nm.The SPD is working at Geiger mode and has a detection efficiency of 10%for photons.The intensities of the signal,decoy,and vacuum state are set toμ=0.68,ν=0.18,and 0 with the probabilities of 13/16,2/16,and 1/16,respectively.In the quantum imaging part,the array of the DMD micro-mirrors(G4100 from TI,the control board is made by x-digit)is 1024×768,and the size of every micro-mirror(one pixel)is 13.68μm×13.68μm.Since each micro-mirror is so small that the laser energy reflected from it is extremely low,a new array of 24×24 pixels is reselected and controlled with the same state in any case.The size of the new block is approximately 328.32μm×328.32μm when ignoring the gaps between the micro-mirrors.We choose only the square areas wherever covered by the light spot and the intensity is adequate enough.So,the DMD is divided into 20×20=400 blocks,Figure 4 shows the simplest binary pattern loaded into the DMD that only one block is in the“on”state and the others are in the“off”state. In all the binary patterns,each block appears just only once,which is similar to spot scanning. In this way,only 400 binary patterns are needed,which can reduce the complexity of the imaging algorithm and greatly save the imaging time.

    After completing the connection of experimental devices as shown in Fig.3,set up the frames number N=400 and frame frequency f=200 Hz.Run the DMD in the fully open mode,and make the QKD work normally through scanning,and set up every parameter within QKD before placing the object.Then,put the“+”type object into this system,and load 400 random binary patterns into the DMD.Run the whole system synchronously.The signal photon counts and QBER are measured during the display time of each pattern frame.The corresponding results of the QKD procedure are shown in Table 1,which are obtained by following the standard decoystate BB84 QKD protocol.According to Eq.(11),the reconstructed image of the object is shown in Fig.5.The SNR is 23 dB,where SNR is defined asis the average of the signal intensity,and σnis the variance of the background intensity. The difference between the average intensities of the bright and dark regions of the images is regarded as the signal,and the variation of dark background is considered as the noise.[22,30]The lower bound of the error rate is calculated to be 14.51%according to Eq.(10),and a secure key rate of 571.0 bps is achieved during the imaging period.

    As can be seen from Table 1 and Fig.5,the image information of the object can be obtained by using the QSI scheme,and the average QBER is 3.99%,which is below the lower bound and proves that the imaging process is safe and real.Once the jammer of object tries to carry out the interceptresend strategy,it is bound to lead to the over threshold increase of QBER under the premise of presence of photon counts. In general,we think that the jammer of object has carried on the intercept-resend strategy and the imaging is no longer safe and real when the average of QBER is higher than 14.51%.Therefore,our QSI system can be used as quantum secure radar against jammers.

    Fig.3.Experimental setup of the QSI system.The red arrows indicate the path of light roughly.

    Fig.4.The simplest binary pattern loaded into the DMD that only one block is in the on state and the others are in the off state.

    Table 1.Experimental results of QKD procedure.

    Fig.5.Results of numerical simulation and QSI experiment of a“+”type object.(a)The result of numerical simulation of imaging the object according to Eq.(11).(b)The result of using the measured signal intensity distribution for imaging the object directly.(c)The result of calculating the measured signal intensity and the presetting intensity distribution for imaging the object according to Eq.(11),which is better than(b).

    At the same time,we can see that the image resolution is not high.The main reason is the serious diffraction effect of the DMD.As we know,the DMD is composed of many micro mirrors,which is similar to a two-dimensional diffraction grating.It has a strong diffraction effect on monochromatic light,and becomes stronger with the increase of the wavelength,[31]which can hardly even be used for imaging in the mid-infrared band. Therefore,even if all the micro mirrors of the DMD keep in the off state,the detector will still measure much energy due to the diffraction effect,which will greatly reduce the SNR and the imaging quality. As a result,neither the new block of the binary patterns can be too small,otherwise the diffraction noise will drown out the signal energy which makes the SNR relatively low.Nor the new block can be too large,otherwise the imaging resolution will be dissatisfactory.Therefore,it is necessary to find a balanced block in the experiment that makes the imaging quality best.In our experiment,the block with size of 328.32μm×328.32μm is relatively appropriate.In addition,we can minimize the diffraction effect by the following three methods. Firstly,we can change the distribution of the diffraction spots and energy by adjusting the incident angle of light on the DMD to minimize the diffraction effect.Secondly,we can increase the distance between the DMD and the detector to reduce the diffraction effect,because the diffraction spots are distributed at some certain angles.The farther away the distance,the larger deviation of the diffraction spots,and the less stray light coupled into the detector.Finally,we can design the wavelength of the light to match the DMD to reduce the diffraction effect,but all the devices need to be matched to this wavelength,such as the DMD,the laser,and the detector of QKD,which is a troublesome and complex thing.In the future works,we will focus on the research how to reduce the diffraction effect of DMD to make the imaging quality optimal.

    4.Conclusion

    We propose a QSI scheme based on the phase encoding and weak+vacuum decoy-state BB84 protocol QKD that can resist the intercept-resend strategy of the jammers. The authenticity and safety of the imaging process are ensured by the theoretical unconditional security of QKD,and the QBER and the secure key rate analytical functions of QKD are used to estimate whether the jammer of object carries out the interceptresend attacks.In our experiment,we obtain a secure key rate of 571.0 bps and a secure average QBER of 3.99%,which is below the lower bound of 14.51%. In the imaging system,we synthetically use the CGI scheme,SPDs and DMD both with faster response speed that greatly improve the imaging efficiency.This scheme is suitable for both objects with transmission or reflection. Furthermore,the system uses a WCS with invisible wavelength of 1550 nm,which can realize weak-light imaging and be immune to the stray light or air turbulence.Thus,it will become a better choice for quantum secure radar against jammers.But at the same time,it is undeniable that the more obvious diffraction effect of the DMD on the longer wavelength light will reduce the imaging SNR and quality.We believe that the diffraction effect can be minimized and the imaging quality can be improved by continuously adjusting the incident angle of light on the DMD,increasing the distance between the DMD and the detector,or designing the wavelength of the light to match the DMD.

    Acknowledgment

    We acknowledge Xiaoming Lu,Di Jiang,and Bin Chen for fruitful discussions and software support.

    猜你喜歡
    王東
    段玉裁《說文解字注》校訂《古今韻會舉要》探略
    天中學刊(2022年4期)2022-09-29 07:21:22
    我是老宋
    安徽文學(2022年7期)2022-07-14 09:51:33
    迷彩色在通信基站天線美化中的應用探析
    瘋狂暗示
    愛你(2020年7期)2020-11-18 12:36:13
    瘋狂暗示
    暗示
    故事會(2019年23期)2019-12-05 05:37:17
    體 檢
    山東文學(2019年9期)2019-11-14 01:16:16
    天降富爸,“貧窮貴公子”三兄弟相殘
    跳樓男
    文藝論壇(2016年1期)2016-11-21 20:19:14
    跳樓男
    久久99热6这里只有精品| 啦啦啦韩国在线观看视频| 深夜a级毛片| 熟女人妻精品中文字幕| 国产午夜精品久久久久久一区二区三区| 国产精品久久久久久av不卡| 成人漫画全彩无遮挡| 成年版毛片免费区| 哪里可以看免费的av片| 一卡2卡三卡四卡精品乱码亚洲| 少妇猛男粗大的猛烈进出视频 | 国产日韩欧美在线精品| 天天躁日日操中文字幕| 精品久久国产蜜桃| 亚洲成人中文字幕在线播放| 亚洲成av人片在线播放无| 免费观看的影片在线观看| 神马国产精品三级电影在线观看| 黄色欧美视频在线观看| 国产黄a三级三级三级人| 国产欧美日韩精品一区二区| 噜噜噜噜噜久久久久久91| 亚洲欧美日韩无卡精品| 变态另类成人亚洲欧美熟女| 国产69精品久久久久777片| 欧美在线一区亚洲| 久久精品人妻少妇| 中国美白少妇内射xxxbb| 日韩欧美三级三区| 久久精品夜夜夜夜夜久久蜜豆| 亚洲图色成人| 午夜福利在线观看吧| 我要看日韩黄色一级片| 插阴视频在线观看视频| 免费观看的影片在线观看| 亚洲一级一片aⅴ在线观看| 国产成人freesex在线| 国产v大片淫在线免费观看| 69av精品久久久久久| 国产男人的电影天堂91| 在线观看免费视频日本深夜| 亚洲三级黄色毛片| 国产 一区 欧美 日韩| 床上黄色一级片| 一个人看的www免费观看视频| 三级毛片av免费| 日日干狠狠操夜夜爽| 国产 一区精品| 国产精品电影一区二区三区| 99riav亚洲国产免费| 亚洲精品成人久久久久久| 欧美高清成人免费视频www| 欧美色欧美亚洲另类二区| 我要看日韩黄色一级片| 国产精品久久久久久亚洲av鲁大| 日本熟妇午夜| 久久久久久久久久久丰满| 性插视频无遮挡在线免费观看| 我的女老师完整版在线观看| 天堂中文最新版在线下载 | 久久久欧美国产精品| 能在线免费观看的黄片| 国产一区二区三区在线臀色熟女| 国产一区二区三区av在线 | 日韩强制内射视频| 亚洲欧美日韩无卡精品| 欧美激情国产日韩精品一区| 日本在线视频免费播放| av女优亚洲男人天堂| 免费电影在线观看免费观看| 国产极品精品免费视频能看的| 国产真实伦视频高清在线观看| 简卡轻食公司| 国产伦精品一区二区三区视频9| 不卡一级毛片| 91狼人影院| 国产成人午夜福利电影在线观看| 真实男女啪啪啪动态图| 欧美高清性xxxxhd video| 国产中年淑女户外野战色| 亚洲aⅴ乱码一区二区在线播放| 国产蜜桃级精品一区二区三区| 欧美日韩综合久久久久久| 91在线精品国自产拍蜜月| 久久精品国产亚洲av涩爱 | 国产精品福利在线免费观看| 中文字幕av在线有码专区| 国产成年人精品一区二区| 边亲边吃奶的免费视频| 一级av片app| 亚洲精品国产av成人精品| 亚洲欧美日韩高清专用| 男女视频在线观看网站免费| 国产男人的电影天堂91| 亚洲中文字幕日韩| 可以在线观看毛片的网站| 男女那种视频在线观看| 国产亚洲av嫩草精品影院| 99热只有精品国产| 久久久久久久久大av| 十八禁国产超污无遮挡网站| 性插视频无遮挡在线免费观看| 日本免费a在线| 长腿黑丝高跟| 国产蜜桃级精品一区二区三区| 国产三级中文精品| 欧美日韩一区二区视频在线观看视频在线 | 亚洲人成网站高清观看| 国产久久久一区二区三区| 色播亚洲综合网| 长腿黑丝高跟| 久久久成人免费电影| 日本免费一区二区三区高清不卡| 夫妻性生交免费视频一级片| 欧美zozozo另类| 免费大片18禁| 青青草视频在线视频观看| 青春草亚洲视频在线观看| 国产一区二区亚洲精品在线观看| 免费电影在线观看免费观看| 久久久久久久久大av| 一区福利在线观看| 波多野结衣高清无吗| 夫妻性生交免费视频一级片| 大香蕉久久网| 日本成人三级电影网站| 三级男女做爰猛烈吃奶摸视频| 久久久久久久久久久免费av| 久久久久久久久久成人| 尾随美女入室| 亚洲精华国产精华液的使用体验 | 色噜噜av男人的天堂激情| www日本黄色视频网| 哪个播放器可以免费观看大片| 国产 一区精品| 欧美日韩精品成人综合77777| 最新中文字幕久久久久| 亚洲真实伦在线观看| 此物有八面人人有两片| 男女下面进入的视频免费午夜| 久久精品国产亚洲av香蕉五月| 99热网站在线观看| 久久精品国产清高在天天线| 九九久久精品国产亚洲av麻豆| 久久99蜜桃精品久久| av免费观看日本| 国内揄拍国产精品人妻在线| 搡女人真爽免费视频火全软件| 久久精品国产亚洲av香蕉五月| 深夜精品福利| 国产一区二区激情短视频| 在线免费观看不下载黄p国产| 精品久久国产蜜桃| 久久久精品欧美日韩精品| 欧美激情在线99| 99久久无色码亚洲精品果冻| 精品久久久久久久末码| 好男人视频免费观看在线| 18禁在线无遮挡免费观看视频| 成人无遮挡网站| 久久久久网色| 欧美xxxx性猛交bbbb| 国产亚洲欧美98| 亚洲欧美精品综合久久99| 别揉我奶头 嗯啊视频| 久久久a久久爽久久v久久| 国产乱人偷精品视频| 99久久人妻综合| 十八禁国产超污无遮挡网站| 成人美女网站在线观看视频| kizo精华| 欧美不卡视频在线免费观看| 欧美最新免费一区二区三区| 精品不卡国产一区二区三区| 国产极品精品免费视频能看的| 日韩欧美精品v在线| 变态另类丝袜制服| 有码 亚洲区| 亚洲18禁久久av| 搡女人真爽免费视频火全软件| 久久久午夜欧美精品| 国产熟女欧美一区二区| 亚洲久久久久久中文字幕| 精品人妻熟女av久视频| 男插女下体视频免费在线播放| 国产精品日韩av在线免费观看| 亚洲av男天堂| 国产一区二区在线av高清观看| 嫩草影院新地址| 99久久精品国产国产毛片| 青春草国产在线视频 | 男女那种视频在线观看| 国产av麻豆久久久久久久| 亚洲,欧美,日韩| 欧美一区二区精品小视频在线| 国产探花极品一区二区| 欧美高清成人免费视频www| 免费人成在线观看视频色| 校园春色视频在线观看| 成年免费大片在线观看| 国产精品一区www在线观看| av在线播放精品| 99九九线精品视频在线观看视频| АⅤ资源中文在线天堂| 婷婷六月久久综合丁香| 一区福利在线观看| 久久欧美精品欧美久久欧美| 国产精品久久久久久久电影| 在线a可以看的网站| 国产精品一区二区在线观看99 | 国内精品一区二区在线观看| 亚洲av中文字字幕乱码综合| 精品久久久噜噜| 国产色爽女视频免费观看| 免费黄网站久久成人精品| 久久精品国产亚洲网站| 亚洲最大成人手机在线| 少妇猛男粗大的猛烈进出视频 | 亚洲成人精品中文字幕电影| av在线观看视频网站免费| 国内精品美女久久久久久| 成年女人看的毛片在线观看| 在线a可以看的网站| 九九在线视频观看精品| 女同久久另类99精品国产91| 搞女人的毛片| 一个人看的www免费观看视频| 亚洲无线观看免费| 中文字幕av在线有码专区| 国产精品电影一区二区三区| 亚洲美女搞黄在线观看| 国产精品久久久久久av不卡| 国产av不卡久久| 国产三级在线视频| 麻豆成人av视频| 真实男女啪啪啪动态图| 久久久国产成人免费| 男人和女人高潮做爰伦理| 狠狠狠狠99中文字幕| 99九九线精品视频在线观看视频| 亚洲内射少妇av| 亚洲18禁久久av| 嫩草影院新地址| 在线观看美女被高潮喷水网站| 综合色av麻豆| 亚洲va在线va天堂va国产| 国产亚洲欧美98| 高清毛片免费看| 中文字幕av在线有码专区| 亚洲第一区二区三区不卡| 亚洲欧美精品专区久久| 亚洲一级一片aⅴ在线观看| 乱人视频在线观看| 国产精品久久久久久精品电影小说 | 黄色视频,在线免费观看| videossex国产| 久久99热6这里只有精品| 欧美极品一区二区三区四区| 久久久久久久久中文| 在线观看免费视频日本深夜| 精品人妻视频免费看| 变态另类丝袜制服| 成人无遮挡网站| 欧美色欧美亚洲另类二区| 国产成人精品一,二区 | 一边摸一边抽搐一进一小说| 一本久久精品| 久久精品国产99精品国产亚洲性色| 国产欧美日韩精品一区二区| 国产午夜福利久久久久久| 日韩精品有码人妻一区| 长腿黑丝高跟| 1024手机看黄色片| 精品人妻一区二区三区麻豆| 日韩国内少妇激情av| 亚洲乱码一区二区免费版| 美女xxoo啪啪120秒动态图| 在现免费观看毛片| 精品久久久久久久久久免费视频| 欧美最新免费一区二区三区| 中文欧美无线码| 成人特级av手机在线观看| 久久久色成人| 啦啦啦韩国在线观看视频| 我的老师免费观看完整版| 我的女老师完整版在线观看| 日韩高清综合在线| 欧美极品一区二区三区四区| 中文资源天堂在线| 亚洲乱码一区二区免费版| 在线观看美女被高潮喷水网站| 干丝袜人妻中文字幕| 亚洲性久久影院| 国产精品福利在线免费观看| 亚洲av第一区精品v没综合| 热99re8久久精品国产| 中文字幕免费在线视频6| 婷婷亚洲欧美| 哪个播放器可以免费观看大片| 国产高清有码在线观看视频| 亚洲国产精品久久男人天堂| 大香蕉久久网| 男人舔女人下体高潮全视频| 国产精品久久久久久av不卡| 日韩欧美国产在线观看| 成人特级黄色片久久久久久久| 国产av不卡久久| 可以在线观看的亚洲视频| 亚洲成av人片在线播放无| 又粗又爽又猛毛片免费看| 色综合站精品国产| 久99久视频精品免费| 国产av麻豆久久久久久久| 国产女主播在线喷水免费视频网站 | 久久精品综合一区二区三区| 亚洲国产色片| 久久这里有精品视频免费| ponron亚洲| 国国产精品蜜臀av免费| 青春草国产在线视频 | 精品人妻偷拍中文字幕| 深夜a级毛片| 亚洲成人精品中文字幕电影| 麻豆久久精品国产亚洲av| 国产综合懂色| 免费搜索国产男女视频| 亚洲综合色惰| 在线天堂最新版资源| 99国产极品粉嫩在线观看| 一夜夜www| 亚洲一区高清亚洲精品| 特级一级黄色大片| 亚洲国产精品成人久久小说 | 国产一区二区三区av在线 | 免费av观看视频| 2022亚洲国产成人精品| 亚洲av第一区精品v没综合| 国产精品久久久久久久久免| 欧美不卡视频在线免费观看| 美女黄网站色视频| 中文字幕精品亚洲无线码一区| 一个人看视频在线观看www免费| 男女做爰动态图高潮gif福利片| 毛片女人毛片| 美女被艹到高潮喷水动态| 日产精品乱码卡一卡2卡三| 一区二区三区四区激情视频 | 久久人人精品亚洲av| 男插女下体视频免费在线播放| 国产精品野战在线观看| 成人三级黄色视频| 99久久无色码亚洲精品果冻| 亚洲国产精品国产精品| 人妻夜夜爽99麻豆av| 国产精品精品国产色婷婷| 亚洲av二区三区四区| 黄片wwwwww| 国内精品宾馆在线| 99热精品在线国产| 91午夜精品亚洲一区二区三区| 日韩成人av中文字幕在线观看| 直男gayav资源| 悠悠久久av| 乱人视频在线观看| 99热这里只有精品一区| 日本成人三级电影网站| 久久久久久伊人网av| 18禁裸乳无遮挡免费网站照片| 亚洲欧美成人精品一区二区| 久久精品国产自在天天线| 99久久精品国产国产毛片| 国产亚洲精品av在线| 亚洲美女视频黄频| 国产亚洲av嫩草精品影院| 人人妻人人看人人澡| 亚洲成人中文字幕在线播放| 欧美成人a在线观看| av在线老鸭窝| 久久久午夜欧美精品| 一个人观看的视频www高清免费观看| 国产大屁股一区二区在线视频| 欧美又色又爽又黄视频| 丝袜美腿在线中文| 真实男女啪啪啪动态图| 男人舔奶头视频| 亚洲最大成人av| 校园春色视频在线观看| 不卡一级毛片| 免费观看人在逋| av在线老鸭窝| 国产极品天堂在线| 免费人成视频x8x8入口观看| 中出人妻视频一区二区| 少妇熟女aⅴ在线视频| 爱豆传媒免费全集在线观看| 少妇熟女欧美另类| 夫妻性生交免费视频一级片| 国产精品三级大全| 蜜桃亚洲精品一区二区三区| 精品熟女少妇av免费看| 嫩草影院精品99| 99久久人妻综合| 久久精品人妻少妇| 岛国在线免费视频观看| 中文字幕人妻熟人妻熟丝袜美| 午夜福利高清视频| 少妇裸体淫交视频免费看高清| 人妻久久中文字幕网| 亚洲成人久久性| 久久综合国产亚洲精品| 色尼玛亚洲综合影院| 边亲边吃奶的免费视频| 一级毛片久久久久久久久女| 国产精品蜜桃在线观看 | 18禁黄网站禁片免费观看直播| 久久久色成人| 中国美白少妇内射xxxbb| 深夜a级毛片| 精品一区二区三区视频在线| 国产白丝娇喘喷水9色精品| 狂野欧美激情性xxxx在线观看| 国产色爽女视频免费观看| 99久久精品热视频| 中文字幕制服av| 亚洲乱码一区二区免费版| 日韩亚洲欧美综合| 少妇熟女aⅴ在线视频| 国产国拍精品亚洲av在线观看| 亚洲精品456在线播放app| 日本成人三级电影网站| 日韩强制内射视频| 直男gayav资源| 日本与韩国留学比较| 日韩欧美精品免费久久| 日韩欧美在线乱码| 久久99蜜桃精品久久| 天天躁日日操中文字幕| 人人妻人人看人人澡| 国产成人91sexporn| 亚洲成a人片在线一区二区| 亚洲经典国产精华液单| 久久久精品欧美日韩精品| 级片在线观看| 国产一区二区在线av高清观看| 亚洲成人精品中文字幕电影| 99久国产av精品国产电影| 亚洲欧美成人精品一区二区| 国产成年人精品一区二区| 国产精品伦人一区二区| 欧美精品一区二区大全| 99久久无色码亚洲精品果冻| 日韩成人伦理影院| 丰满人妻一区二区三区视频av| 女人被狂操c到高潮| 久久精品91蜜桃| 女人十人毛片免费观看3o分钟| 麻豆一二三区av精品| 我的女老师完整版在线观看| 亚洲av电影不卡..在线观看| 久久欧美精品欧美久久欧美| 欧美成人a在线观看| 久久久久久久久久成人| 一边亲一边摸免费视频| 一本精品99久久精品77| 2021天堂中文幕一二区在线观| 成人无遮挡网站| 熟妇人妻久久中文字幕3abv| 国产精品一及| 一级av片app| 国产乱人视频| 成人无遮挡网站| 不卡视频在线观看欧美| 成年女人永久免费观看视频| 国产综合懂色| 村上凉子中文字幕在线| 好男人在线观看高清免费视频| 三级男女做爰猛烈吃奶摸视频| 免费大片18禁| 国产激情偷乱视频一区二区| 亚洲综合色惰| 中出人妻视频一区二区| 欧美又色又爽又黄视频| 国产真实乱freesex| 亚洲中文字幕日韩| 亚洲国产精品成人综合色| 亚洲av中文字字幕乱码综合| 色综合亚洲欧美另类图片| 美女高潮的动态| 日本-黄色视频高清免费观看| 国产高清视频在线观看网站| 特大巨黑吊av在线直播| 两个人的视频大全免费| 亚洲婷婷狠狠爱综合网| 国产激情偷乱视频一区二区| 2022亚洲国产成人精品| 亚洲va在线va天堂va国产| 久久久久免费精品人妻一区二区| 最好的美女福利视频网| 久久久久网色| 国产精品久久久久久久电影| 少妇猛男粗大的猛烈进出视频 | 人人妻人人看人人澡| 色综合站精品国产| 男女那种视频在线观看| 菩萨蛮人人尽说江南好唐韦庄 | 亚洲国产精品成人综合色| 欧美+日韩+精品| 我要看日韩黄色一级片| 国产伦精品一区二区三区四那| 久久久久久久久久黄片| 精品人妻一区二区三区麻豆| 少妇被粗大猛烈的视频| 久久久国产成人精品二区| 久久久午夜欧美精品| 国产美女午夜福利| 亚洲成人久久性| 好男人在线观看高清免费视频| 亚洲国产高清在线一区二区三| 成人午夜高清在线视频| 国产伦一二天堂av在线观看| 青春草亚洲视频在线观看| 国产成人a区在线观看| 国产精品一及| av黄色大香蕉| 国产蜜桃级精品一区二区三区| 晚上一个人看的免费电影| 97人妻精品一区二区三区麻豆| 啦啦啦啦在线视频资源| 欧美日韩在线观看h| 亚洲人与动物交配视频| 中文字幕av成人在线电影| 国产麻豆成人av免费视频| 中文字幕av成人在线电影| 国产美女午夜福利| 91午夜精品亚洲一区二区三区| 99热6这里只有精品| 国产高清不卡午夜福利| 噜噜噜噜噜久久久久久91| 国产色爽女视频免费观看| 日韩制服骚丝袜av| 亚洲国产精品久久男人天堂| www日本黄色视频网| 亚洲av电影不卡..在线观看| 久久国产乱子免费精品| 成人鲁丝片一二三区免费| 精品人妻视频免费看| 91精品国产九色| 日本色播在线视频| 中文字幕制服av| 91av网一区二区| 国产91av在线免费观看| 一区福利在线观看| 亚洲精品乱码久久久v下载方式| 亚洲真实伦在线观看| 美女 人体艺术 gogo| 99国产极品粉嫩在线观看| 亚洲成a人片在线一区二区| 亚洲精品亚洲一区二区| 国产亚洲欧美98| 精华霜和精华液先用哪个| 一级毛片我不卡| 丝袜喷水一区| 久久久成人免费电影| 中文字幕免费在线视频6| 草草在线视频免费看| 成年免费大片在线观看| 日韩欧美精品v在线| 麻豆精品久久久久久蜜桃| 国产真实伦视频高清在线观看| 狂野欧美白嫩少妇大欣赏| 国产三级中文精品| 热99re8久久精品国产| 2022亚洲国产成人精品| a级毛色黄片| 神马国产精品三级电影在线观看| 一级黄片播放器| 黄片无遮挡物在线观看| 嘟嘟电影网在线观看| 成人三级黄色视频| 亚洲精品456在线播放app| 18禁黄网站禁片免费观看直播| 蜜桃亚洲精品一区二区三区| 男人舔女人下体高潮全视频| 亚洲第一电影网av| 日韩欧美三级三区| 一级毛片aaaaaa免费看小| 变态另类丝袜制服| 麻豆一二三区av精品| 中文字幕熟女人妻在线| 麻豆成人av视频| 91在线精品国自产拍蜜月| 大香蕉久久网| 毛片一级片免费看久久久久| 插逼视频在线观看| 能在线免费观看的黄片| 国产精品久久久久久亚洲av鲁大| 能在线免费看毛片的网站| 精品一区二区三区人妻视频| 精品人妻熟女av久视频| 日韩精品青青久久久久久| 久久精品久久久久久久性| 村上凉子中文字幕在线| 精品日产1卡2卡| 五月伊人婷婷丁香| 亚洲av不卡在线观看| 菩萨蛮人人尽说江南好唐韦庄 | 日本av手机在线免费观看| 免费看光身美女| 亚洲五月天丁香| 久久精品91蜜桃| 51国产日韩欧美| 深夜a级毛片| 别揉我奶头 嗯啊视频| 丰满人妻一区二区三区视频av| 99久久精品一区二区三区|