• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*

    2021-07-30 07:35:10JingWenZhang張靜文XiuBoChen陳秀波GangXu徐剛andYiXianYang楊義先
    Chinese Physics B 2021年7期
    關(guān)鍵詞:徐剛

    Jing-Wen Zhang(張靜文) Xiu-Bo Chen(陳秀波) Gang Xu(徐剛) and Yi-Xian Yang(楊義先)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,

    Beijing University of Posts and Telecommunications,Beijing 100876,China

    2School of Information Science and Technology,North China University of Technology,Beijing 100144,China

    Keywords: quantum homomorphic encryption,universal quantum circuit,non-maximally entangled state,security

    1. Introduction

    With the rapid development of the network, it makes information transmission fast and provides a large quantity of information on the Internet. Therefore, the privacy protection of sensitive information is particularly important. When some clients who do not have the computational power cannot calculate their own confidential information,the information needs to be encrypted and sent to a server with rich resources and powerful functions to operate. Homomorphic encryption provides an effective way to process and calculate encrypted data without revealing the contents of the privacy information. Reviewing the classical homomorphic encryption (HE), the idea was first presented by Rivestet al.[1]in 1978. It was widely studied and applied,and can only achieve the additively HE schemes. Until a breakthrough was made in 2009,Gentry[2]found and conducted an in-depth study of the fully homomorphic encryption (FHE) scheme based on nonstandard computational assumptions, thereby giving the multiplicatively HE scheme. Subsequently, many optimization and improvement schemes for FHE have been proposed.[3-7]With the development of classical homomorphic encryption,many achievements have been made and a large amount of related researches have also been sparked, such as delegating computation,[8-11]functional encryption,[12,13]and obfuscation.[14]

    At the same time,this research has drawn attention in the field of quantum information.Quantum homomorphic encryption is that the client delegates quantum computation on the encrypted data to the server,that is,the server performs quantum computation on the ciphertext,and the result is consistent with a valid ciphertext after performing this computation on the original plaintext. In other words, the server implements quantum computation without decrypting, and the client decrypts the computation results to obtain the quantum computation on the original data. In 2012,Rohdeet al.[15]described a limited quantum homomorphic encryption scheme with the boson scattering model and quantum walks to complete the restricted quantum computation.The concept of quantum homomorphic encryption (QHE) and quantum fully homomorphic encryption (QFHE) was proposed by Liang[16]in 2013. In Liang’s scheme,the symmetric QHE scheme was constructed.Then,inspired by the tripartite blind quantum computation,[17]Liang proposed a QHE scheme through the use of universal quantum circuit.[18]It permits universal quantum computation on encrypted quantum state without decryption. Nevertheless, in 2014, Yuet al.[19]found that there is a limitation on the QHE scheme with information-theoretically-secure, that is, deterministic QHE with perfect information theoretic security will certainly lead to exponential overhead. This had led to more in-depth discussions among researchers on QFHE schemes that enable to complete universal quantum computation. In the same year, an effective method was proposed by Fisheret al.[20]By using single photons and linear optics,it is experimentally proved that arbitrary quantum computation can be adequately implemented through a set of quantum gates with few extra resources. Based on the modification of the above work, Broadbent and Jeffery (BJ15) completed the limited number of non-Clifford gates evaluation by presenting two instructive and secure QHE schemes.[21]The formal definitions of QHE and QFHE were given,and the definition of quantum indistinguishability under chosen plaintext attack was also given. In 2016, Duleket al.[22]extended the non-Clifford gate circuit in BJ15 to arbitrary polynomial-sized quantum circuits. A novel compact QFHE scheme was given that could effectively correct the errors in the T-gate evaluation of encrypted quantum data. Based on the research results of Duleket al.,[22]Alagicet al.[23]constructed a QFHE scheme with verification to generate a classical computation log, so that the user can verify the homomorphic quantum computation on the ciphertext. It put forward a new direction for future research,that is,more QFHE schemes with certain properties could be found.

    In 2016, Tanet al.[24]presented a private-key QHE scheme by using the thoughts of group theory. The scheme supported a broad range of quantum computation tasks and limited the information that attackers can access to ensure information theoretic security. After exhaustive research,Ouyang and Tanet al.[25]designed a QHE from quantum codes that allows for the evaluation of a finite number of non-Clifford gates included in the quantum circuits and has entropy security which is independent of the adversary’s computational power. Moreover, this scheme demonstrated that the model of entropy security is stronger than the security model in BJ15. In 2018, Mahadev[26]constructed the first leveled FHE scheme with classical keys for quantum circuits using quantum capable scheme. It makes blind delegate quantum computations possible to the trusted quantum server, while a malicious server cannot get any information from this process.In addition to the above schemes, there are many results related to QHE schemes.[27-31]

    The evaluation of the non-Clifford gates will be subject to errors, leading to the failure of the expected computation results in the QHE scheme. As a result,it is an essential and difficult problem to correct the errors of non-Clifford gate evaluation. The schemes in Refs. [21-25] are all leveled QHE schemes,in which the BJ15 framework utilizes the maximum entangled state to process the correction required for the evaluation of the non-Clifford gates until the decryption phase. In other words, the problem of implementing the QHE scheme via the maximum entangled channel has been studied. As a quantum auxiliary resource,different classes of states are considered to be able to complete the correction of non-Clifford gate evaluation errors in the QHE scheme. Since in the realistic environment, a quantum system is open and usually interacts with the surrounding environment, causing the maximal entangled quantum channel tends to degenerate into the non-maximally entangled quantum channel. Also,it may happen that the source does not produce perfect maximally entangled states rather non-maximally entangled pairs. It has become clear that the non-maximally entangled state is not only relatively well prepared, but also shows evident advantages to implement quantum communication protocols in a specific physical system. For example,three-qubit non-maximally entangled state are used as a resource to attain optimal controlled quantum teleportation fidelity,which essentially lowers the requirements of quantum channels.[32]And,for an amplitude damping channel, it was shown that optimal entanglement negativity is obtained only by a non-maximally entangled state.[33]Hence, it is important to investigate the QHE scheme by utilizing the non-maximally entangled state. The pre-shared non-maximally entangled states are used as auxiliary resources to correctly and safely complete the two-party QHE scheme,while lowering the requirements of the quantum channel. This work is of great importance to the experimental realization of the QHE scheme under inevitable noisy effects.

    In this paper, we initially introduce non-maximally entangled states as auxiliary resources to correct the erroneousP-gate occurring in the non-Clifford gate evaluation.The arbitrary quantum computation can be performed on the encrypted data and the privacy of data is maintained. Then,unlike other schemes explicated from the perspective of algorithm,we give the process of two-party probabilistic quantum homomorphic encryption scheme from the viewpoint of application. Finally,this scheme has a good performance in terms of security.

    The structure of this paper is organized as follows. In Section 2, some preliminary knowledge including quantum computation, quantum one-time pad and quantum homomorphic encryption are introduced. We present our QHE scheme in Section 3. The main idea and the specific process of the scheme are introduced in detail. In Section 4, the security of the scheme is analyzed and discussed.Our work and prospects for future research are summarized in Section 5.

    2. Preliminaries

    In this section, we provide a detailed introduction to the preliminaries,which helps us to have better understandings of our work. At the same time, the basic definition and related properties of QHE are given. Through these preliminaries, it will be smoother to describe our scheme.

    2.1. Quantum computation

    A quantum composite system consists of two or more different physical systems. In many cases of quantum mechanics,it is necessary to work with multiparticle states. The quantum state in the composite system can be expressed as the tensor product form of the quantum states in two subsystems,such as|φA〉|φB〉. If there are two single qubits that cannot be written as tensor product form,i.e.,|φ〉/=|a〉|b〉, then|φ〉is known as entangled state. Quantum entanglement is a property of composite systems which has a significant role in quantum computation.[34]It is also one of the main properties used in this paper. Quantum entanglement can be generated under control in different quantum systems, which reflects nonclassical strong correlation and non-locality in two or more quantum systems. In the processing of quantum information,entangled quantum states are often used as quantum channels.The family of two-qubit entangled states is referred to as Bell states in bipartite system,which can be transformed into each other through local operations and classical communication(LOCC). They are also called EPR states, and the forms are as follows:

    Another fundamental assumption of quantum mechanics suggests that the evolution of a closed quantum system can be characterized by the unitary operator.Common unitary singlequbit operators include Pauli operators and Hadamard gate,where the Pauli operators are denoted byσ0,σx,σy,andσz.[35]Their forms and circuit diagram representations are given in the following expressions:

    In addition to the quantum logic gates described above,phase shift gate and controlled-NOT gate are also common,

    The entire Clifford group circuit can be generated from these gates,but non-Clifford gate,such asT-gate,needs to be added to simulate universal quantum circuit,

    In a classic computer, the circuit consists of logic gates and wires, where the logic gates are responsible for the processing of the information and the wires are used for the transmission of the information. Quantum circuits consist of quantum gates operated on qubits. Each wire in a quantum circuit may not correspond to a physical connection,but to a physical particle transformation in a period of time or a physical particle moving from one location to another in space. A quantum circuit(QC)withn-qubit input andm-qubit output,from left to right represents the transfer process of quantum states in time or space.

    2.2. Quantum one-time pad

    In classical cryptography, the security of encryption and decryption usually depends on the assumption of computational intractability, while in quantum cryptography, the security of quantum cryptography depends on the information theoretic security of quantum mechanical properties. In the context of quantum data, the encryption process of information can be depicted as follows by using the quantum one-time pad(QOTP).

    Alice has a set ofKoperations{Uk}, in which each element is an unitary matrix of 2n×2nand the occurrence probability of each element is 1/22n,acting on the quantum information ofnqubits. A new encryption key is generated each time the qubit is encrypted. The encrypted quantum information would become a completely mixed state, so it is meaningless for Eve to get a complete quantum state,which guarantees the security of quantum information. For the input quantum stateρcarrying information, applying a random Pauli operator to the information state will get the cipher stateσ, which is the completely mixed state,[36]where (a,b) are the key to the pad. Pauli operatorsXandZare chosen uniformly at random to encrypt the quantum information.

    2.3. Quantum homomorphic encryption

    This subsection introduces some definitions of quantum homomorphic encryption,homomorphism,compactness,quantum fully homomorphic encryption. For a deeper understanding of these definitions,refer to Ref.[21].

    Definition 1(quantum homomorphic encryption) Here we introduce the QHE for asymmetric-key,which includes the following four algorithms:

    (i)Key GenerationQHE.KeyGen(1κ)→(pk,sk,ρevk),whereκ ∈Nis the security parameter,pkis the classical public key for encrypting quantum information,skis the classical private key for decrypting,ρevkis the quantum evaluation key for evaluating circuits on the encrypted quantum information.

    (ii)EncryptionQHE.Encpk(ρ)→σ. For the input quantum plaintextρ, it is encrypted into the quantum ciphertextσusing the public keypk.

    (iii)EvaluationQHE.EvalQCρevk(σ)→σ′,whereQCrepresents any quantum evaluation circuit that acts on the encrypted ciphertextσand outputs a ciphertext quantum stateσ′. The evaluation keyρevkis consumed during the process.This ciphertext is identical to the result of the evaluation circuit acting on the plaintext and then encrypting.

    (iv)DecryptionQHE.Decsk(σ′)→ρ′. For the ciphertextσ′, it is decrypted with the private keyskto obtainρ′as the calculation result of the evaluation algorithm acting on the original plaintextρ.

    Definition 2(homomorphism) For any quantum circuitQCand the input quantum plaintextρ, a QHE scheme satisfies homomorphism if there exists a negligible functionηsuch that

    whereΦQCis the quantum channel that is induced by the quantum circuitQC.

    Definition 3(compactness) A QHE scheme is compact if the complexity of the decryption algorithm does not depend on the size of the evaluation circuit. That is, for any quantum circuitQCand ciphertextσ,QHE.Decis applied toQHE.EvalQC(σ). There exists a polynomialp(κ) such that the complexity of this computational process is at mostp(κ).

    Definition 4(quantum fully homomorphic encryption)If the QHE scheme satisfies both homomorphism and compactness for all quantum circuits on some universal gate sets,it is a quantum full homomorphic encryption scheme.

    3. Our scheme

    In this section, based on the model of BJ15, we propose a novel probabilistic quantum homomorphic encryption(PQHE)scheme for universal quantum circuit.Before describing our PQHE scheme,the main idea is given by utilizing the non-maximally entangled state to complete the evaluation of non-Clifford gates. It will be helpful to the proposal of our scheme.

    3.1. Main idea

    Without decrypting the encrypted data, quantum homomorphic encryption gives a feasible way to perform arbitrary computational evaluations. In the construction of QHE scheme, at least one non-Clifford gate should be added to achieve universality for quantum circuits. However, it is always the focus and barrier of the research to deal with the errors in the evaluation of non-Clifford gates.T-gate,i.e.,“8/π”gate,is the first non-Clifford gate to be known. When the homomorphic evaluation ofT-gate is performed on the quantum state encrypted by QOTP, the output will contain an unexpectedPerror,In order to obtain the quantum state expected by the evaluator,the error must be corrected. The user decrypts the corrected quantum state to acquire the result of performingT-gate calculation on the initial plaintext.

    However, the maximum entangled state is considered to be extremely difficult to prepare in a specific physical system. During the preparation of the maximum entangled state,it must be affected by some factors, such as physical equipment,noise and decoherence. Therefore,our scheme extends the BJ15 scheme under the wise usage of the pre-shared nonmaximally entangled states as auxiliary resources to probabilistically correct the erroneousP-gate. Although the probability of success in correcting errors is decreased,it is meaningful from the perspective of experimentally implementing the QHE scheme. The universal quantum circuit with a finite number of non-Clifford gates can be applied on the encrypted quantum state in the evaluation stage.

    The major idea of our scheme is that when performing theT-gate evaluation,the state|Φ〉is introduced which is the non-maximally entangled state given by

    wheremandnare complex numbers and satisfy the normalization condition|m|2+|n|2=1. Then, the CNOT operation is applied on the non-maximally entangled state with the evaluation circuit. The auxiliary particle is introduced by the part of the circuit’s output. After the definedUoperation,the measurement is made. When the final measurement result is|0〉,theP-gate error is successfully corrected. Otherwise, error correction fails. This process is minutely illustrated in Fig.1.

    Fig.1. The homomorphic evaluation of our scheme for T-gate.

    As shown in Fig.1,the quantum state is|φ〉=α|0〉+β|1〉which will be encrypted by using QOTP,that is,the initial state is encrypted byXaZb,whereaandbare random classical bits(a,b ∈{0,1}). The state will be|φ0〉=XaZb|φ〉and the following four cases are obtained:

    When the firstT-gate appears in the evaluation circuit,theTgate will be applied to the ciphertext,|φ1〉=TXaZb|φ〉. And the encrypted state(5)will become

    Table 1. Measurement results of the target qubit and the second particle of the non-maximally entangled state.

    After the above operation is completed, the measurement will be made in the basis{|0〉,|1〉}. The measurement results of the target qubit and the second particle of the non-maximally entangled state will be two classical bits that recorded asrandyrespectively. In Table 1,the values of the measurement results are displayed substantially which all hold up to an irrelevant global phase.

    Through the above series of operations,the coefficient of the state will contain the uncertain valuesmandn. In order to attain the desired result ofT-gate acting on the encrypted state, it will be required to introduce an auxiliary particle|0〉and perform the defined unitary operation that denoted asU,where

    The final state Eq.(11)is measured. If the measurement result is|0〉, theP-gate error is successfully corrected. The desired result of the firstT-gate acting on the encrypted state is obtained,which isTXaZb|φ〉=α|0〉+eiπ/4β|1〉(a=0,b=0)in the example. This result is also consistent with

    3.2. Our PQHE scheme

    In this section, we will specifically present our PQHE scheme. From the perspective of application, there is a clear division of the computations between the client and the server,as well as the determined access rights to the keys and data.Our scheme is a novel two-party PQHE scheme which allows for arbitrary quantum computation within a large class of quantum circuits. Here,the quantum circuit contains Clifford group gates and a finite number of non-Clifford group gates(i.e.,T-gates). In this scheme,firstly,the client randomly generates an encryption key that will be only used once through the key generation algorithm. The private data is encrypted by using QOTP to guarantee the information theoretic security.The encrypted data and the predetermined evaluation circuit are transmitted to the server. Secondly, the server evaluates the received encrypted data according to the sequence of gate operations in the evaluation circuit without decryption. And the evaluated data is returned to the client. Finally, the client generates the decryption key by utilizing the key update rules according to the order of the evaluation circuit and the private key it holds. The evaluated data will be decrypted to get the expected result of the evaluation operation on the original private data. Figure 2 depicts it explicitly.

    Fig.2. Evaluation of our PQHE scheme for T-gate.

    The following process will describe our two-party PQHE scheme by step.

    Step 1PQHE.KeyGen →ek= (a,b), wherea,b ∈{0,1}. The quantum state to be encrypted is|φ〉=α|0〉+β|1〉. The client performs a key generation algorithm to generate a random encryption keyekthat is only used once. The quantum circuitQCEvalintended to be performed on the data will be confirmed corresponding to the sequence of gate operations from the setΓ={X,Z,H,P,CNOT}and theT-gates.It will be used to implement universal quantum circuit evaluation on encrypted data.

    Step 2By using the keyek, the encrypted private data takes the form of

    Assume that the evaluation circuitQCEvalcontainsNquantum gatesGi(i= 1,...,N). WhenGi ∈Γ, the client will transmit the encrypted dataXaZb|φ〉and evaluation circuitQCEvalto the server through the channel. When aT-gate is included in the evaluation circuit, in addition to the abovementioned data and circuit, the client needs to pre-share a non-maximally entangled state with the server and its form is|Φ〉=m|00〉+n|11〉(|m|2+|n|2=1).

    Step 3The server with computational power performs the corresponding operations on the encrypted dataXaZb|φ〉in the order of the evaluation circuitQCEval,and it cannot know the specific content of the data. When the evaluation circuit consists of quantum gatesGi(i=1,...,N),the evaluated data is of the form

    With regard toQCEvalcontaining theT-gate, the operations plotted in the previous section are performed by the server,including the CNOT operations, the definedUoperations and measurements. The operation on the non-maximally entangled state|Φ〉=m|00〉+n|11〉will be delayed to the decryption phase and carried out by the client. At last,the evaluated data is returned to the client.

    Step 4In the final stage, the encryption keyekwill be updated as the decryption key by the client,where the decryption key is denoted asdk=(a′,b′). When the quantum gatesGi ∈Γ(Γ={X,Z,H,P,CNOT}) acting on the encrypted data,the key update rules are listed as follows:

    d) WhenGi=CNOT, sinceCNOTis a two-qubit gate,both the control qubit and the target qubit require keys, that isek=(a,b,c,d)anddk=(a′,b′,c′,d′). Meanwhile,the encrypted state should be(XaZb ?XcZd)|φ〉. The corresponding key update rule is

    In the end, the evaluated data is decrypted using the decryption key to obtain the quantum circuitQCEvalthat performed on the original private data. It is a series of operations and computations that determined by the client in Step 1 in order to get the operated plaintext in private,since

    As introduced in the above scheme, we have made the novel two-party PQHE scheme come true. In the process of evaluating theT-gates,it can be seen from the expression(3)that whena=0, there is no error that needs to be corrected.In the case wherea=1,the evaluator has to correct the error.However, as we will see, the evaluator does not have access to the value ofaas theX-encryption key. The solution provided in our scheme is that the client and the server share the non-maximally entangled state in advance. The conditionalPcorrection needs to be delayed until decryption. The price we have to pay is that the value of the measurement result required to update the key can only be measured as part of the decryption algorithm. The proposal of the above scheme can not only correct the errors in the evaluation of theT-gates,but also ensure the correctness of the QHE scheme. At the same time,the security of the key can be guaranteed,which will not be obtained by the evaluator. Next,we will conduct a detailed security analysis of the proposed PQHE scheme.

    4. Security analysis

    In this section,we now analyze the security of our PQHE scheme in two ways,namely data and key.

    Initially,for the original privacy data,only the client has access to them. Before transmitting this quantum information to the server, the client will use the QOTP technology to encrypt the privacy data|φ〉. The QOTP is an asymmetric quantum encryption method,which generates a pair of random keyek=(a,b)(a,b ∈{0,1})that is used only once.Therefore,the encrypted information becomes a totally mixed state, namely(1/2n)I.The expression(1)proves it clear. Even if an attacker may intercept the encrypted information and receive the complete quantum stateXaZb|φ〉during the transmission,the specific information still cannot be obtained.He has no idea about the value of the key, and the randomness of the key makes it irregular. The key is changed every time the information is encrypted. It will minimize the risk of information leakage, so the perfect security of privacy data is ensured.

    Finally, the encryption keyekis a pair of classical bits(a,b) randomly generated by the client to carry out the key generation algorithm.Each pair of keys will be used only once in the encryption stage,making it impossible for the server to deduce the content of the key by studying regular pattern over time.At the same time,the decryption keydkis renewed from the secure encryption key by the key update rules. It is only consumed by the client. The key update rules are securely owned and applied by the client itself. The encryption keys and decryption keys will not be transmitted over the channel,so the server or other attackers will not be able to get any information about the keys. To conclude, it is obvious that the encryption and decryption keys have a perfect security.

    In summary, through the above analysis, our PQHE scheme has good security performance on privacy data,evaluated data,encryption keys and decryption keys.

    5. Conclusions

    Quantum homomorphic encryption has affirmative advantages in protecting the privacy data,which can perform arbitrary quantum computation during the evaluation. And in the processing of encrypted quantum state,the privacy data is kept secret for the server. The focal point of computation is to correct errors in the evaluation of non-Clifford gate. When applied to a real communication scenario,under the influence of the noise in the outside environment,the maximum entangled state encountered obstacles in the preparation process. Hence,a novel two-party PQHE scheme is proposed. Our scheme shows that the non-maximally entangled state can be used as auxiliary resource to assist in the evaluation of universal quantum circuit. It ensures the security of private data and effectively implements the PQHE scheme. In a broader context,our work opens up a new possible way for the realization of QHE. Compared with the previous scheme, the technical requirements were relaxed in the preparation of quantum entangled states in our scheme. It lowers the requirements for quantum channel, so that our PQHE scheme is more likely to be implemented under the existing experimental conditions.

    Firstly,the non-maximally entangled state was introduced when evaluatingT-gates to complete the correction of thePerrors in the evaluation stage. From an experimental viewpoint,we chose non-maximally entangled state to alleviate the stress on the quantum resources required in the scheme. And it indicated that the evaluation of the non-Clifford gates could be effectively implemented. Secondly,we constructed the specific two-party PQHE scheme described step by step through the explicit illustration. The homomorphic computation of universal quantum circuit on encrypted information was applied.The computations and operations were clarified that both the client and the server need to perform,and the access rights to the keys and data were determined respectively in the PQHE scheme.Finally,the scheme guaranteed the security of privacy data,evaluated data,encryption keys and decryption keys. In conclusion,our PQHE scheme attracts wide attention and may be an achievable QHE scheme, which is of practical importance for the realization of more sophisticated secure quantum computation and multiparty quantum communication.

    We hope that the proposed scheme provides inspiration in speeding up the practical proceeding of QHE scheme and establishing the theoretical basis of information security in the context of quantum communication. Our results make contribution to the application of the theory of QHE in secure quantum computation, but the problem that remains open is the construction of the QFHE scheme. Therefore,it is one of our following researches to study how to combine the QHE scheme with other quantum and classical cryptography protocols to construct a QFHE scheme that has a more efficient performance.

    猜你喜歡
    徐剛
    殺人者徐剛(短篇小說)
    飛天(2025年1期)2025-01-28 00:00:00
    徐剛書法作品選登
    共青城市蘇家垱鄉(xiāng):共繪美麗鄉(xiāng)村新畫卷
    Low-overhead fault-tolerant error correction scheme based on quantum stabilizer codes
    Quantum multicast communication over the butterfly network
    一瞬即永恒
    冬夜
    冬夜
    愿他永遠(yuǎn)是少年
    南方文壇(2016年1期)2016-03-23 13:44:43
    冬夜
    小小說月刊(2016年2期)2016-02-16 12:28:37
    免费日韩欧美在线观看| 一本大道久久a久久精品| 亚洲精品视频女| 美女中出高潮动态图| 丰满少妇做爰视频| 如日韩欧美国产精品一区二区三区| 久久精品熟女亚洲av麻豆精品| 国产乱来视频区| 美女国产高潮福利片在线看| 久久久久久伊人网av| 90打野战视频偷拍视频| 精品人妻在线不人妻| 777久久人妻少妇嫩草av网站| 亚洲一区二区三区欧美精品| 天天躁狠狠躁夜夜躁狠狠躁| 国产亚洲欧美精品永久| 亚洲av国产av综合av卡| 国产欧美亚洲国产| 十八禁高潮呻吟视频| 午夜老司机福利剧场| 一本—道久久a久久精品蜜桃钙片| 亚洲激情五月婷婷啪啪| 欧美最新免费一区二区三区| 亚洲美女搞黄在线观看| a级片在线免费高清观看视频| 中文字幕亚洲精品专区| a 毛片基地| 久久青草综合色| 亚洲国产欧美在线一区| 18在线观看网站| 国产一区二区激情短视频 | 男女免费视频国产| 晚上一个人看的免费电影| 亚洲国产欧美在线一区| 大香蕉久久网| 涩涩av久久男人的天堂| 五月天丁香电影| 久久ye,这里只有精品| 欧美人与性动交α欧美精品济南到 | 一本色道久久久久久精品综合| 国产成人精品久久二区二区91 | 女人精品久久久久毛片| 免费观看av网站的网址| 国产又爽黄色视频| 亚洲一区中文字幕在线| 美国免费a级毛片| 亚洲 欧美一区二区三区| www.熟女人妻精品国产| 久久av网站| 国产野战对白在线观看| 日本91视频免费播放| 在线免费观看不下载黄p国产| 亚洲国产欧美在线一区| 美女大奶头黄色视频| 免费在线观看完整版高清| 午夜福利乱码中文字幕| 一个人免费看片子| 国产 精品1| 中文字幕色久视频| 国产熟女午夜一区二区三区| av网站免费在线观看视频| 国产成人精品在线电影| 午夜福利一区二区在线看| 国产成人精品一,二区| 新久久久久国产一级毛片| 久久久精品区二区三区| 一区二区三区乱码不卡18| 一级毛片电影观看| 女人精品久久久久毛片| 桃花免费在线播放| 精品人妻熟女毛片av久久网站| 久久精品国产a三级三级三级| www日本在线高清视频| 成人漫画全彩无遮挡| 一本—道久久a久久精品蜜桃钙片| 亚洲美女黄色视频免费看| 寂寞人妻少妇视频99o| 亚洲中文av在线| 99国产精品免费福利视频| 欧美亚洲日本最大视频资源| 国产综合精华液| 一本—道久久a久久精品蜜桃钙片| 两个人免费观看高清视频| 午夜老司机福利剧场| 亚洲精品乱久久久久久| 青草久久国产| 免费观看在线日韩| 国产伦理片在线播放av一区| 亚洲国产精品国产精品| 少妇 在线观看| 国产免费一区二区三区四区乱码| 国产精品一区二区在线不卡| 一级毛片 在线播放| 菩萨蛮人人尽说江南好唐韦庄| 日韩伦理黄色片| 欧美日韩精品成人综合77777| 国产白丝娇喘喷水9色精品| 亚洲三级黄色毛片| 黄网站色视频无遮挡免费观看| 久久久久国产精品人妻一区二区| 久久精品夜色国产| 2021少妇久久久久久久久久久| 亚洲国产精品一区三区| 伦理电影免费视频| 激情五月婷婷亚洲| 欧美 日韩 精品 国产| 熟女少妇亚洲综合色aaa.| 欧美精品一区二区免费开放| 寂寞人妻少妇视频99o| 日本-黄色视频高清免费观看| 老司机影院毛片| kizo精华| 亚洲国产看品久久| 国产一区有黄有色的免费视频| 美女视频免费永久观看网站| 日韩中文字幕欧美一区二区 | 久久久a久久爽久久v久久| 亚洲少妇的诱惑av| 午夜影院在线不卡| 女人久久www免费人成看片| 亚洲精品一二三| 久久精品国产a三级三级三级| 久久久久久久大尺度免费视频| 国产精品国产三级国产专区5o| 久久久久久久国产电影| 久久久久网色| av卡一久久| 中国国产av一级| 国产精品免费大片| 在线观看三级黄色| 一本色道久久久久久精品综合| 人人妻人人澡人人看| 久久久亚洲精品成人影院| 丝袜美腿诱惑在线| 亚洲人成77777在线视频| 欧美人与善性xxx| 丝袜喷水一区| 亚洲国产最新在线播放| 国产精品成人在线| 巨乳人妻的诱惑在线观看| 黄色毛片三级朝国网站| 亚洲精品视频女| 午夜福利一区二区在线看| 国产老妇伦熟女老妇高清| 亚洲内射少妇av| 亚洲精品aⅴ在线观看| 丁香六月天网| 大片免费播放器 马上看| 亚洲美女视频黄频| 久久久国产精品麻豆| 熟女av电影| 高清视频免费观看一区二区| 深夜精品福利| www.av在线官网国产| 日韩熟女老妇一区二区性免费视频| 岛国毛片在线播放| 久久亚洲国产成人精品v| 欧美黄色片欧美黄色片| 亚洲中文av在线| 大陆偷拍与自拍| 国产免费现黄频在线看| 亚洲精品美女久久av网站| kizo精华| 国产一区二区三区综合在线观看| 波野结衣二区三区在线| 成年美女黄网站色视频大全免费| 精品国产乱码久久久久久男人| 满18在线观看网站| 亚洲人成电影观看| 如日韩欧美国产精品一区二区三区| 国产一区二区三区av在线| 精品一区二区三区四区五区乱码 | 叶爱在线成人免费视频播放| 久久鲁丝午夜福利片| 十八禁网站网址无遮挡| 一级毛片黄色毛片免费观看视频| 亚洲第一区二区三区不卡| 最近中文字幕2019免费版| 国产高清不卡午夜福利| 90打野战视频偷拍视频| 亚洲经典国产精华液单| 亚洲av电影在线进入| 国产av码专区亚洲av| 亚洲国产精品一区二区三区在线| 国产女主播在线喷水免费视频网站| 精品人妻偷拍中文字幕| 你懂的网址亚洲精品在线观看| 高清黄色对白视频在线免费看| 国产免费福利视频在线观看| 精品国产露脸久久av麻豆| 成人亚洲欧美一区二区av| 久久久国产精品麻豆| av有码第一页| 色94色欧美一区二区| 老司机影院毛片| 国产有黄有色有爽视频| 大香蕉久久成人网| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | tube8黄色片| 久久久久久久亚洲中文字幕| 18禁国产床啪视频网站| 午夜福利在线免费观看网站| 黄色配什么色好看| 黄色一级大片看看| 久久久久精品人妻al黑| 人体艺术视频欧美日本| 日韩人妻精品一区2区三区| 一区在线观看完整版| 日日撸夜夜添| 女人精品久久久久毛片| av一本久久久久| 色播在线永久视频| 国产片特级美女逼逼视频| 日韩 亚洲 欧美在线| 美女国产高潮福利片在线看| 日韩免费高清中文字幕av| 丝袜脚勾引网站| 国产精品蜜桃在线观看| 国产精品蜜桃在线观看| 999久久久国产精品视频| 老女人水多毛片| 欧美97在线视频| 国产精品不卡视频一区二区| 黄片小视频在线播放| 久久国产精品大桥未久av| 午夜日本视频在线| 波多野结衣一区麻豆| 最黄视频免费看| 极品人妻少妇av视频| 日日撸夜夜添| 在线观看国产h片| 丝袜脚勾引网站| a级毛片黄视频| 啦啦啦啦在线视频资源| 晚上一个人看的免费电影| 老女人水多毛片| 久久亚洲国产成人精品v| 90打野战视频偷拍视频| 人成视频在线观看免费观看| 午夜av观看不卡| 看非洲黑人一级黄片| 男女边摸边吃奶| 人人妻人人澡人人看| 成人国语在线视频| 久久影院123| 国产精品 欧美亚洲| 日本av手机在线免费观看| 久久午夜福利片| 亚洲一区中文字幕在线| 久久精品久久久久久久性| 精品99又大又爽又粗少妇毛片| av在线老鸭窝| 亚洲精华国产精华液的使用体验| 欧美日本中文国产一区发布| 亚洲成人av在线免费| 久久99一区二区三区| 只有这里有精品99| 亚洲美女视频黄频| 一边亲一边摸免费视频| 两个人看的免费小视频| 亚洲婷婷狠狠爱综合网| 国产精品久久久久久精品电影小说| 另类精品久久| 两个人免费观看高清视频| 日本免费在线观看一区| 精品人妻偷拍中文字幕| 一级毛片 在线播放| 午夜免费鲁丝| 国产 精品1| 中文字幕制服av| 久久国产精品男人的天堂亚洲| 精品人妻在线不人妻| av有码第一页| freevideosex欧美| 免费不卡的大黄色大毛片视频在线观看| 在线观看美女被高潮喷水网站| 免费在线观看视频国产中文字幕亚洲 | 中文字幕人妻丝袜一区二区 | 赤兔流量卡办理| 国产成人精品在线电影| 午夜日本视频在线| 国产精品亚洲av一区麻豆 | 中文字幕色久视频| 91在线精品国自产拍蜜月| 男人爽女人下面视频在线观看| 黑人巨大精品欧美一区二区蜜桃| 80岁老熟妇乱子伦牲交| 成人免费观看视频高清| 亚洲人成电影观看| 国产精品三级大全| av不卡在线播放| 一边摸一边做爽爽视频免费| 亚洲精品中文字幕在线视频| 久久精品aⅴ一区二区三区四区 | 精品国产露脸久久av麻豆| 中文字幕人妻丝袜制服| 欧美精品人与动牲交sv欧美| 欧美bdsm另类| av在线老鸭窝| 久久精品国产亚洲av涩爱| 母亲3免费完整高清在线观看 | 亚洲av电影在线观看一区二区三区| 中文字幕精品免费在线观看视频| 女的被弄到高潮叫床怎么办| 两个人免费观看高清视频| 丝袜美腿诱惑在线| 街头女战士在线观看网站| 伦理电影免费视频| 夜夜骑夜夜射夜夜干| 亚洲成人一二三区av| 日韩精品免费视频一区二区三区| 国产一区二区激情短视频 | 成人亚洲精品一区在线观看| 国产黄色免费在线视频| 七月丁香在线播放| 啦啦啦中文免费视频观看日本| 建设人人有责人人尽责人人享有的| 十八禁高潮呻吟视频| a级片在线免费高清观看视频| 亚洲精品aⅴ在线观看| 国产一区亚洲一区在线观看| 国产1区2区3区精品| 男人爽女人下面视频在线观看| 国产乱人偷精品视频| 女人久久www免费人成看片| 日本色播在线视频| 中文字幕最新亚洲高清| 国产精品免费视频内射| 国产精品麻豆人妻色哟哟久久| 在线天堂中文资源库| 欧美日韩成人在线一区二区| 午夜久久久在线观看| 男人爽女人下面视频在线观看| tube8黄色片| 熟女电影av网| 欧美日韩成人在线一区二区| 在线观看三级黄色| 午夜日韩欧美国产| 在线亚洲精品国产二区图片欧美| 不卡视频在线观看欧美| 国产精品一国产av| 久久青草综合色| 国产精品久久久久久精品电影小说| 三上悠亚av全集在线观看| 亚洲成av片中文字幕在线观看 | 老鸭窝网址在线观看| 亚洲伊人久久精品综合| 国产日韩一区二区三区精品不卡| 一边摸一边做爽爽视频免费| 欧美av亚洲av综合av国产av | 国产精品二区激情视频| 日韩av不卡免费在线播放| 搡女人真爽免费视频火全软件| 久久99热这里只频精品6学生| 国产精品久久久久久精品电影小说| 精品国产一区二区三区四区第35| 久久99一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | www.熟女人妻精品国产| 丰满迷人的少妇在线观看| 亚洲欧美清纯卡通| 国产片特级美女逼逼视频| 午夜福利视频在线观看免费| 国产高清不卡午夜福利| 精品一区二区免费观看| 性色avwww在线观看| 中文字幕制服av| 色94色欧美一区二区| 日本wwww免费看| 看免费av毛片| 丰满饥渴人妻一区二区三| h视频一区二区三区| 国产福利在线免费观看视频| 可以免费在线观看a视频的电影网站 | 波野结衣二区三区在线| 日韩中字成人| 最近中文字幕高清免费大全6| 性色av一级| 宅男免费午夜| 1024视频免费在线观看| 国产男女内射视频| 亚洲国产色片| 两个人免费观看高清视频| 成年人免费黄色播放视频| 亚洲欧洲国产日韩| 一本大道久久a久久精品| 天天影视国产精品| freevideosex欧美| 中国三级夫妇交换| 热re99久久国产66热| 久久久久久人人人人人| kizo精华| 中文字幕人妻熟女乱码| 精品少妇内射三级| 亚洲精品一区蜜桃| 国产成人精品福利久久| 另类精品久久| 国产成人精品久久二区二区91 | 精品少妇黑人巨大在线播放| 两性夫妻黄色片| 中文字幕av电影在线播放| 欧美成人午夜免费资源| 人人妻人人澡人人爽人人夜夜| 波多野结衣一区麻豆| 中文字幕最新亚洲高清| 国产无遮挡羞羞视频在线观看| 亚洲国产毛片av蜜桃av| 最近最新中文字幕大全免费视频 | 国产亚洲av片在线观看秒播厂| 夫妻性生交免费视频一级片| 中文字幕人妻熟女乱码| 日本av手机在线免费观看| 精品99又大又爽又粗少妇毛片| 亚洲av电影在线进入| 大码成人一级视频| 国产精品99久久99久久久不卡 | 国产一级毛片在线| 国产探花极品一区二区| 最新中文字幕久久久久| 性色avwww在线观看| 美女中出高潮动态图| 2022亚洲国产成人精品| 亚洲精品久久午夜乱码| 18禁观看日本| 国产熟女欧美一区二区| 一边亲一边摸免费视频| 国产精品免费视频内射| 成人免费观看视频高清| 国产亚洲最大av| 亚洲三级黄色毛片| 日本av免费视频播放| 午夜91福利影院| 久久国产精品男人的天堂亚洲| 国产免费福利视频在线观看| 久久久国产一区二区| 久久精品夜色国产| kizo精华| 99香蕉大伊视频| 亚洲婷婷狠狠爱综合网| 少妇精品久久久久久久| 欧美精品人与动牲交sv欧美| 国产高清国产精品国产三级| 999精品在线视频| 免费高清在线观看日韩| 午夜影院在线不卡| 久久精品熟女亚洲av麻豆精品| 成人国产麻豆网| 啦啦啦啦在线视频资源| 国产精品一区二区在线观看99| 亚洲国产精品一区三区| 黄网站色视频无遮挡免费观看| 九草在线视频观看| av片东京热男人的天堂| 亚洲精品在线美女| 国产熟女欧美一区二区| 成人18禁高潮啪啪吃奶动态图| www.自偷自拍.com| 欧美精品人与动牲交sv欧美| 成人18禁高潮啪啪吃奶动态图| 九九爱精品视频在线观看| 亚洲一码二码三码区别大吗| 国产综合精华液| 精品亚洲成a人片在线观看| 国产女主播在线喷水免费视频网站| av天堂久久9| 极品少妇高潮喷水抽搐| 五月伊人婷婷丁香| 久久国内精品自在自线图片| 成人午夜精彩视频在线观看| 日韩精品有码人妻一区| 下体分泌物呈黄色| 久久久国产精品麻豆| 夫妻午夜视频| 丝瓜视频免费看黄片| 亚洲av中文av极速乱| 亚洲国产欧美网| 80岁老熟妇乱子伦牲交| 亚洲美女视频黄频| 国产日韩欧美视频二区| 久久久久久久久久久免费av| 欧美少妇被猛烈插入视频| 晚上一个人看的免费电影| 一级毛片黄色毛片免费观看视频| 男女高潮啪啪啪动态图| 九九爱精品视频在线观看| 高清黄色对白视频在线免费看| 精品少妇久久久久久888优播| 国产xxxxx性猛交| 婷婷色综合大香蕉| 亚洲国产色片| 久久久久国产网址| 午夜激情久久久久久久| 18禁动态无遮挡网站| av网站免费在线观看视频| 日日爽夜夜爽网站| 日韩电影二区| 精品国产乱码久久久久久小说| 亚洲国产精品成人久久小说| 国产白丝娇喘喷水9色精品| 国产亚洲最大av| 久久久国产欧美日韩av| 国产精品成人在线| 亚洲成人手机| 热99久久久久精品小说推荐| 亚洲伊人久久精品综合| 久久久精品区二区三区| 黄频高清免费视频| 国产1区2区3区精品| 国产精品不卡视频一区二区| 大片电影免费在线观看免费| 纯流量卡能插随身wifi吗| 黄频高清免费视频| 啦啦啦中文免费视频观看日本| 一区福利在线观看| 亚洲国产av影院在线观看| 少妇 在线观看| 99精国产麻豆久久婷婷| 国产一区二区 视频在线| 在线观看一区二区三区激情| av福利片在线| 最近的中文字幕免费完整| 熟女电影av网| 啦啦啦在线免费观看视频4| 国产成人午夜福利电影在线观看| 一本色道久久久久久精品综合| 黄色 视频免费看| 超色免费av| 国产老妇伦熟女老妇高清| 免费高清在线观看日韩| 校园人妻丝袜中文字幕| 另类亚洲欧美激情| 亚洲国产欧美在线一区| 三上悠亚av全集在线观看| 欧美精品国产亚洲| 天天躁夜夜躁狠狠躁躁| 2022亚洲国产成人精品| 欧美 亚洲 国产 日韩一| 人人妻人人爽人人添夜夜欢视频| 国产男人的电影天堂91| 亚洲美女搞黄在线观看| 国产精品国产三级专区第一集| 超碰成人久久| 亚洲经典国产精华液单| 黄片播放在线免费| 天天影视国产精品| 亚洲欧美成人综合另类久久久| 建设人人有责人人尽责人人享有的| 亚洲国产日韩一区二区| 日韩制服骚丝袜av| 午夜精品国产一区二区电影| 亚洲精品,欧美精品| 亚洲欧美中文字幕日韩二区| 丝袜美腿诱惑在线| 9191精品国产免费久久| 精品酒店卫生间| 国产综合精华液| 国产精品不卡视频一区二区| 国产精品三级大全| 国产成人精品一,二区| 国产精品秋霞免费鲁丝片| 欧美亚洲日本最大视频资源| 视频在线观看一区二区三区| 国产成人aa在线观看| 肉色欧美久久久久久久蜜桃| 丝袜美足系列| 看十八女毛片水多多多| 免费观看性生交大片5| 亚洲男人天堂网一区| 国产高清国产精品国产三级| 久热这里只有精品99| 大片电影免费在线观看免费| 在线观看人妻少妇| 一级毛片 在线播放| 亚洲国产精品国产精品| 亚洲欧美成人综合另类久久久| 欧美 日韩 精品 国产| 成人黄色视频免费在线看| 久久精品夜色国产| 亚洲一区二区三区欧美精品| 色婷婷久久久亚洲欧美| 一级毛片黄色毛片免费观看视频| 男男h啪啪无遮挡| 岛国毛片在线播放| 亚洲精品av麻豆狂野| 国产免费现黄频在线看| 一区二区三区乱码不卡18| 国产成人精品无人区| 一二三四在线观看免费中文在| 91国产中文字幕| 九九爱精品视频在线观看| 国产精品亚洲av一区麻豆 | 日本欧美国产在线视频| 久久人妻熟女aⅴ| 免费日韩欧美在线观看| 免费女性裸体啪啪无遮挡网站| 日韩免费高清中文字幕av| 一级毛片黄色毛片免费观看视频| 欧美日韩国产mv在线观看视频| 五月开心婷婷网| 久久热在线av| 欧美黄色片欧美黄色片| 青青草视频在线视频观看| 免费在线观看完整版高清| 在线观看国产h片| 国产伦理片在线播放av一区| 久久ye,这里只有精品| 欧美老熟妇乱子伦牲交| 黄色怎么调成土黄色| 黄色一级大片看看| 在线观看免费高清a一片| 美女高潮到喷水免费观看| 日日摸夜夜添夜夜爱| 久久久国产精品麻豆| 99九九在线精品视频| 精品国产露脸久久av麻豆|