• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient semi-quantum secret sharing protocol using single particles

    2023-09-05 08:47:30DingXing邢丁YifeiWang王藝霏ZhaoDou竇釗JianLi李劍XiuboChen陳秀波andLixiangLi李麗香
    Chinese Physics B 2023年7期
    關(guān)鍵詞:李劍

    Ding Xing(邢丁), Yifei Wang(王藝霏), Zhao Dou(竇釗),?, Jian Li(李劍),Xiubo Chen(陳秀波), and Lixiang Li(李麗香)

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China

    2Information Security Center,School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China

    Keywords: semi-quantum secret sharing,efficiency,single particles,specific secret,particle reordering

    1.Introduction

    Secret sharing (SS)[1]is a widely used and efficient privacy protection protocol.It allows a dealer to share a secret among many agents,but only if they cooperate can the agents recover the dealer’s secret or they obtain nothing alone.[2–4]However, classical secret sharing (CSS) is unable to address the problem of eavesdropping if it is not combined with other technologies such as encryption,and the introduction of quantum algorithms brings a huge potential threat to classical encryption algorithms.[5,6]Fortunately, quantum cryptography can solve these security problems.By determining whether an eavesdropper has attempted to gain information about the secret, quantum secret sharing (QSS) can provide for secure secret transmission.

    In 1999,Hilleryet al.[7]proposed the first QSS protocol based on the three-particle entangled GHZ states, attracting extensive attention.Since then,many researchers have studied the field of quantum secret sharing, and kinds of QSS protocols have been put forward.[8–15]However, those QSS protocols require all participants (both the dealer and the agents)to possess full quantum capabilities (e.g., quantum measurement,quantum states preparation,and so on)while in general quantum resources are valuable and quantum operations are not easy to implement.

    In 2007,Boyeret al.[16]first presented the notion of semiquantum by presenting a protocol where one participant(Bob)is classical.In the definition of semi-quantum, two kinds of participants,quantum participant and classical participant are proposed.The quantum participant has full quantum capabilities and can perform all quantum operations while a classical participant can only perform the following operations when he accesses a segment of quantum channel: (a) generating qubits in the fixed computational basis(Zbasis){|0〉,|1〉};(b)measuring qubits in the fixedZbasis{|0〉,|1〉};(c)reflecting qubits without disturbance;(d)reordering qubits(via different delay lines).Since semi-quantum cryptography protocol only requires one participant to have the full quantum capability,it simplifies the execution difficulty of the protocols and has been widely applied to various quantum cryptography fields,such as semi-quantum key distribution,[17–19]semi-quantum secure direct communication,[20–22]semi-quantum private comparison[23–25]and semi-quantum secret sharing.[26–32]

    In 2010,Liet al.[26]proposed the first semi-quantum secret sharing (SQSS) protocol using the maximally entangled GHZ states.Two years later, Wanget al.[27]considered an SQSS protocol using the two-particle entangled states.In 2013, Liet al.[28]utilized easier two-particle product states to implement an SQSS protocol.After that, Xieet al.[29]designed a new SQSS protocol with GHZ-like states,which can share a specific bit string compared with the previous protocols.In 2018,Liet al.[30]proposed an SQSS protocol where classical participants can realize secret sharing without making any measurements and quantum Alice does not need quantum registers, which improves the relative efficiency.In the same year,Yeet al.[31]proposed two circular SQSS protocols using single particles where the second one releases the classical parties from the measurement capability.A more practical and flexible SQSS protocol based on the Bell states was proposed by Tianet al.[32]in 2021, which can share specific secrets with classical parties.However, inefficiency is still a major problem of SQSS protocols.

    In this paper,an SQSS protocol based on single particles is presented.An encoding method is used to make quantum Alice has the right to decide the shared secret message.After this, we use particle reordering to maximally utilize particles while ensuring security, so that there is no particle discarded or wasted in our protocol, improving the efficiency to nearly 100%.The resources used in the proposed protocol are simple single particles and are prepared only by the quantum party,reducing the difficulty of the resource preparation.Besides,the particles in our protocol are transmitted in a circular way,which makes the role of the agents equal, so this protocol is easy to be extended to multi-party secret sharing.And then,we analyze the security of the protocol to prove that our protocol is secure and can resist common attacks,such as interceptresend attack and measure-resend attack.

    The remaining parts of the paper are organized as follows.In Section 2, a novel SQSS protocol is described in detail.Next, the security analysis is in Section 3 while the comparison of the SQSS protocol with previous protocols is analyzed in Section 4.In Section 5,a conclusion is given.

    2.The proposed SQSS protocol

    In this section,we first present an encoding method.Secondly,we propose a three-party SQSS protocol based on single particles.Then,such SQSS protocol is generalized to the multiparty case.After that,we use an example to show the process of the protocol in detail.

    2.1.Encoding method

    To encode any integer as a bit string with equal numbers of 0 and 1, we try to present an encoding method, which can be applied in the protocol proposed thereafter.

    Inspired by this, based on the location where the first 1 appears, a 2N-bit string can be divided intoN+1 groups.If the first 1 appears in thei-th position, the remainingN ?1 1 can only appear in the later 2N ?iposition,so this group hascombinations.Then every group can be further divided into sub-groups based on the location where the next 1 appears and so on.Once theN-th 1 is located,all 1 are well positioned and the remaining positions will be filled with 0.According to this idea, we can propose an encoding method which is suitable for any numberN.

    An integerxwithin the range ofcan be expressed asx=C?b1?b2?···?bN,where

    1≤i ≤N,ai ∈N+.Theaiis a parameter to build parameterbiand indicates encoding positions.ThePiis an intermediate value

    If eachbi /= 0, the positions from the first 1 to theNth 1 will be 2N ?a1,2N ?a2,...,2N ?aN, or they will be 2N ?a1,2N ?a2,...,2N ?ak?1,N+k,N+k+1,...,2N,(k=min{i|bi=0}).

    Table 1.Encoding method and encoded results for N=3.

    2.2.Three-party SQSS protocol

    Suppose Alice has quantum capabilities while the others two participants Bob and Charlie are classical.Alice wants to share a secret with Bob and Charlie securely.The proposed three-party SQSS protocol is composed of the following steps.

    Step 1Alice decides the content of the shared secret at will and encodes the secret into a bit string with equal numbers of 0 and 1 by using the encoding method in Subsection 2.1.Suppose the length of this bit string is 2a.

    Step 2Alice first randomly selects one basis fromZbasis{|0〉,|1〉}andXbasis{|+〉,|?〉}.Using the particles|0〉and|+〉to stand for the classical bit and particles|1〉and|?〉to stand for the classical bit 1, based on the encoded string,Alice prepares all 2asingle particles from the selected one basis.After that, Alice reorders these particles.Note that the rearrangement order of particles is only known to Alice.

    Step 3Alice preparesmdecoy photons,each of which is randomly in one of the four states{|0〉,|1〉,|+〉,|?〉},inserts decoy photons to the reordered particles in random positions,and sends them to Bob.

    Step 4After confirming that Bob has received the particles, Alice publishes the insertion positions of a fraction of decoy photons.Before she publishes the states of these decoy photons,Bob must measure those photons inZbasis.For those photons in|0〉or|1〉,Bob checks the error rate,and for those in|+〉 or|?〉, Bob checks whether the measurements are evenly distributed.He aborts the protocol if the error or deviation rate exceeds a preset threshold.After the check,he disturbs the order of the remaining particles.Only Bob himself knows the rearrangement order of them.Finally,Bob sends all particles to Charlie.

    Step 5After Charlie announces the receipt of all particles from Bob, Alice publishes the insertion positions of another fraction of decoy photons.Then Bob publishes the transposition order of those photons,so Charlie can accurately measure those decoy photons inZbasis.She checks the measurements just like Bob based on the states published by Alice.After that,she does not need to do anything else but reorder the remaining particles secretly and send them back to Alice.

    Step 6After receiving particles from Charlie,Alice publishes the original positions of the rest of decoy photons.Bob and Charlie publish in turn their transposition order of these photons so Alice could get the final positions of the decoy photons in the existing particle sequence.Alice performs measurements in the corresponding basis of the decoy photons at these positions.By comparing the measurement results to the originally prepared photon states,Alice can calculate an error rate.If the error rate exceeds a preset threshold,they will abort this communication and restart the protocol.Otherwise, they continue to the next step.

    Step 7Alice measures all the remaining particles with the basis selected in step 2 and publishes the measurement results, that is, the encoded string that has been reordered by Alice,Bob,and Charlie.After that,Alice announces her rearrangement order.Only Bob and Charlie have cooperated,can they recover the original encoded string by sharing their own rearrangement order.Finally, they can get Alice’s secret by decoding the encoded string.

    2.3.Multi-party SQSS protocol

    The three-party SQSS protocol is easily generalized to multi-party SQSS protocol.

    Steps 1–5 are roughly the same as our three-party SQSS protocol,but at the end of step 5,Charlie sends the particles to the next classical participant,David,instead of Alice.

    Step 6After David announces the receipt of all particles,Alice publishes the insertion positions of a fraction of decoy photons and previous classical participants publish their transposition order of those decoy photons.Subsequently, David measures decoy photons and checks the measurements just like the Bob in step 4 based on the states published by Alice.After the check, he disturbs the order of remaining particles and sends the particles to the next classical participant.The remaining participants also operate as above, except that the last participant Zach sends the particles back to Alice.

    Step 7After receiving particles from Zach, Alice could get the final positions of the decoy photons with the help of all classical participants.The same as in step 6 in Subsection 2.2,Alice can make the corresponding measurements and calculate an error rate to detect eavesdropping.

    Step 8Alice publishes her rearrangement order and the measurement results of all the remaining particles measured in the basis selected in step 2.Classical participants can recover the encoded string only by cooperating.Finally, they can decode the encoded string to get Alice’s secret.

    The proposed multi-party SQSS protocol is implemented as above.

    2.4.Example

    Now,an example of our proposed SQSS protocol will be given in this part.

    3.Security analysi s

    In general, in the QSS protocol, internal attackers are more powerful than external eavesdroppers because they know more information about the secret.Therefore, we will focus on the security of the proposed SQSS protocol for dishonest internal participants below.

    3.1.Intercept-resend attack

    If Bob is a dishonest internal attacker, to obtain Alice’s shared secret, Bob can try to launch an intercept-resend attack as follows: he uses Alice’s particles as usual to perform the step 4.Then, he prepares a string of fake single particles and sends it to Charlie.After Charlie finishes his operation,Bob intercepts the particles that Charlie sends to Alice.By measuring this string of particles,Bob tries to obtain Charlie’s rearrangement order of the particles.

    However, Bob cannot determine the transposition order for particles in the same state|0〉 or|1〉.For example, if the sequence{|0〉,|1〉,|1〉,|0〉}is reordered to{|0〉,|1〉,|0〉,|1〉},the|1〉 on the second position may be unchanged or may be reordered to the fourth position.Consequently, Bob can not get exactly how Charlie disturbs the particles.Even if Bob can get Charlie’s rearrangement order,since he does not know the positions and states of decoy photons when he sends the fake particle sequence,his attack will introduce errors when Alice and Charlie detect eavesdropping.

    Therefore, Bob can obtain almost no information by launching intercept-resend attack without being detected.As a result,the intercept-resend attack fails.

    3.2.Measure-resend attack

    Without loss of generality, supposing Bob is a dishonest internal attacker, to obtain Alice’s shared secret, he can take two strategies below to perform measure-resend attack.

    (i)Bob intercepts the string of particles transmitted from Alice and measures all particles using the same basis (ZorXbasis).Based on the measurements, Bob generates a new quantum sequence with the same measurement results and resends it to Charlie.If Bob’s attack is not detected, Bob has a 1/2 chance of choosing the right basis Alice selects and obtaining access to the secrets Alice wants to share.However, his attack will introduce errors and be detected before he obtains any useful information.Suppose Charlie checksμdecoy photons inZbasis and Alice measuresηdecoy photons.If Bob chooses to measure all particles inZbasis, the probability that Bob will not be detected is (1/2)η/2, and if Bob chooses to measure all particles inXbasis,the probability that Bob will not be detected is (1/2)(η/2)+μ.Therefore,the average probability that the attack will not be detected is 1?(1/2)(η/2)+1×,and whenηis large enough,Bob’s attack cannot be successfully implemented.

    (ii) Bob intercepts the particles sent to Alice and measures all particles using the same basis (ZorXbasis).As the rearrangement order of the particles is only known by the operator himself,Bob cannot accurately obtain Alice’s shared secret without the help of Charlie, and this operation will be detected by eavesdropping detection.

    Stated thus, the proposed protocol is secure against measure-resend attack.

    3.3.Entanglement-measure attack

    Suppose a malicious internal attacker Bob attempts to steal the secret shared by Alice through the entangle-measure attack.As this protocol only uses decoy photons to detect eavesdropping, we only consider the effect on decoy photons for entangle-measure attacks.The entangle-measure attack from Bob can be described as follows: the unitary operationsUFattacking particles as they go from Bob to Charlie and the unitary operationsURattacking particles as they go back from Charlie to Alice, whereUFandURshare a common probe space with the state|ε〉.

    Theorem 1For the entangle-measure attack(UF,UR)performed by Bob inducing no error in eavesdropping detection,the final state of Bob’s probe should be independent of Alice’s measurement result.As a result, Bob gets no information on Alice’s shared secret.

    ProofAfter Bob has performedUF, the following relations should be established:

    where|ε00〉,|ε01〉,|ε10〉and|ε11〉represent the un-normalized states of Bob’s probe.

    For particles of any order, Bob needs the final state of the first register to be the same as the original state to pass the eavesdropping detection,soURmust satisfy the following conditions:

    From the equations above,it should hold that

    After inserting Eq.(11)into Eqs.(7)–(10),we have

    According to Eq.(12),if Bob is not detectable in the security check,he can not distinguish his final probe states.As a result,Bob gets no information on Alice’s shared secret QED.

    3.4.Trojan horse attack

    Here,Bob plans to use Trojan horse attack.After finishing his normal operation, he attaches the invisible photons or the spy photons to his particles and transmits all of them to Charlie for Trojan horse attack.[33]By analyzing spy photons in this string of particles sent to Alice by Charlie,Bob tries to obtain Charlie’s order of the particles.Nevertheless,by applying a photon number splitter(PNS)and a wavelength filter device(WF),the malicious operations can be easily resisted.[34]Hence, the presented protocol is secure against Trojan horse attack.

    3.5.Collusion attack

    In collusion attack, some participants can collude together to get the shadow of the share of other participants.

    In our protocol, to facilitate the description, we denote the classical participants of the(n+1)-party protocol asP1,P2,...,Pn.Suppose participantsPj?1andPj+1try to perform the protocol dishonestly to get thePj’s rearrangement order.Since particle reordering is an independent operation and the rearrangement order is known only toPjhimself,two dishonest participants can attack no more than the previous dishonest Bob did alone,they can not get this order by colluding together to perform attacks.

    Moreover,even(n?1)dishonest participants collude together, they do not know the positions and states of decoy photons beforePjreceives particles,which means they are unable to escapePj’s eavesdropping detection by publishing fake transposition order of decoy photons.As a consequence,their collusion attack will introduce errors and the protocol will be aborted,so Alice’s secrets will not be leaked.

    Therefore,our protocol is secure against collusion attack.

    4.Comparison

    We analyze and compare the performance of the proposed protocol with existing SQSS protocols.Our protocol makes progress in the following three aspects: simplifying the quantum resources,improving the protocol efficiency,and transmitting specific secrets.In Table 2, we make a more detailed comparison with the typical SQSS protocols in Refs.[26,28,31,32].

    As shown in Table 2,our protocol is based on single particles rather than entangled states or product states,reducing the difficulty of resource preparation.Moreover, we can see that the qubit efficiency of the proposed protocol is higher than all of the compared protocols, because it can approach 100% asNincreases (the decoy photons are ignored).Lastly, in most previous protocols,the shared secret is not specific,whereas in our protocol Alice can decide which secret message to share.

    Table 2.Comparisons of the SQSS protocols.

    Through the above comparison,the proposed protocol is more efficient and practical than existing ones.

    5.Conclusion

    We have presented a more efficient and practical SQSS protocol.The efficiency of protocol could approach 100%as the length of message increases.Our protocol is based on single particles,reducing the difficulty of resource preparation.In addition,the shared secret message can be determined by Alice herself which cannot be realized by some previous protocols.Finally,we analyze the security of the proposed protocol and fully prove that our protocol can resist common attacks.High efficiency is a big advantage of our protocol,and we will explore how to improve the efficiency of protocols in other semi-quantum cryptography fields in future work.

    Acknowledgments

    Project supported by the National Key Research and Development Program of China(Grant No.2020YFB1805405),the 111 Project(Grant No.B21049),the National Natural Science Foundation of China (Grant No.62272051), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014),and the Fundamental Research Funds for the Central Universities of China (Grant Nos.2019XD-A02 and 2020RC38).

    猜你喜歡
    李劍
    Variational quantum semi-supervised classifier based on label propagation
    The coupled deep neural networks for coupling of the Stokes and Darcy–Forchheimer problems
    兩塊寶石
    Probabilistic quantum teleportation of shared quantum secret
    Efficient quantum private comparison protocol utilizing single photons and rotational encryption
    Constructing the three-qudit unextendible product bases with strong nonlocality
    Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle
    Quantum partial least squares regression algorithm for multiple correlation problem
    Improving the purity of heralded single-photon sources through spontaneous parametric down-conversion process*
    Phase-sensitive Landau–Zener–St¨uckelberg interference in superconducting quantum circuit?
    久久久久国产精品人妻aⅴ院| 中文资源天堂在线| 人妻久久中文字幕网| 欧美成人免费av一区二区三区| 色尼玛亚洲综合影院| 亚洲第一电影网av| 久久久久久久久大av| 搡老岳熟女国产| 午夜福利在线在线| 中文字幕av成人在线电影| 小说图片视频综合网站| 免费在线观看影片大全网站| 国产一区二区三区视频了| 成人av一区二区三区在线看| 久久精品91蜜桃| 在线十欧美十亚洲十日本专区| 免费一级毛片在线播放高清视频| 人人妻人人看人人澡| 色综合婷婷激情| 观看免费一级毛片| 国产综合懂色| xxxwww97欧美| 男人和女人高潮做爰伦理| 色视频www国产| 亚洲av电影不卡..在线观看| 亚洲国产精品久久男人天堂| www国产在线视频色| 精品一区二区三区视频在线 | bbb黄色大片| 成人性生交大片免费视频hd| 午夜老司机福利剧场| av片东京热男人的天堂| 精品日产1卡2卡| svipshipincom国产片| 国产色婷婷99| 欧美乱码精品一区二区三区| 夜夜看夜夜爽夜夜摸| 18禁黄网站禁片免费观看直播| 俄罗斯特黄特色一大片| 国产单亲对白刺激| 日韩欧美在线乱码| 国产男靠女视频免费网站| 国产黄a三级三级三级人| 十八禁人妻一区二区| 亚洲国产中文字幕在线视频| 激情在线观看视频在线高清| 欧美一区二区精品小视频在线| 嫁个100分男人电影在线观看| 亚洲无线在线观看| 宅男免费午夜| 国产真实伦视频高清在线观看 | 免费在线观看日本一区| 全区人妻精品视频| 国内少妇人妻偷人精品xxx网站| 一a级毛片在线观看| 国产一区二区激情短视频| 亚洲av成人av| 香蕉丝袜av| 亚洲国产精品999在线| 国产av麻豆久久久久久久| 精品久久久久久成人av| 国产又黄又爽又无遮挡在线| 非洲黑人性xxxx精品又粗又长| 欧美色欧美亚洲另类二区| 99精品久久久久人妻精品| 亚洲人成电影免费在线| 最近最新中文字幕大全免费视频| 叶爱在线成人免费视频播放| 女生性感内裤真人,穿戴方法视频| 国产免费av片在线观看野外av| 亚洲 国产 在线| 欧美区成人在线视频| 成人一区二区视频在线观看| 国产激情偷乱视频一区二区| 99热这里只有精品一区| svipshipincom国产片| 夜夜夜夜夜久久久久| 桃红色精品国产亚洲av| 18禁在线播放成人免费| 99国产综合亚洲精品| 日韩欧美一区二区三区在线观看| av欧美777| 在线免费观看的www视频| 日本五十路高清| 亚洲精品亚洲一区二区| 久久精品国产亚洲av香蕉五月| 亚洲真实伦在线观看| 亚洲中文字幕日韩| 亚洲一区二区三区不卡视频| 一个人看视频在线观看www免费 | 99热只有精品国产| 国产国拍精品亚洲av在线观看 | 丝袜美腿在线中文| 亚洲 国产 在线| 日本黄大片高清| 国产精品亚洲一级av第二区| 国产精品乱码一区二三区的特点| 国产成人a区在线观看| 国产单亲对白刺激| 桃红色精品国产亚洲av| 成人无遮挡网站| 日本免费a在线| tocl精华| 亚洲最大成人手机在线| 欧美日韩福利视频一区二区| 最近在线观看免费完整版| 免费在线观看亚洲国产| 99久久成人亚洲精品观看| 熟妇人妻久久中文字幕3abv| 国产一级毛片七仙女欲春2| 美女免费视频网站| 色播亚洲综合网| 成人18禁在线播放| 中文字幕av成人在线电影| 国产精品精品国产色婷婷| 欧美黄色淫秽网站| 欧美激情久久久久久爽电影| 丰满人妻一区二区三区视频av | 网址你懂的国产日韩在线| 国产欧美日韩一区二区三| 午夜福利视频1000在线观看| 一级毛片女人18水好多| 日韩欧美国产一区二区入口| 欧美在线一区亚洲| 日日夜夜操网爽| 波多野结衣高清无吗| 一个人免费在线观看电影| 色av中文字幕| 动漫黄色视频在线观看| 女生性感内裤真人,穿戴方法视频| 亚洲欧美激情综合另类| 在线观看免费视频日本深夜| 久久久久久国产a免费观看| 欧美黄色淫秽网站| 国产精品99久久99久久久不卡| 国产91精品成人一区二区三区| 久久午夜亚洲精品久久| 小蜜桃在线观看免费完整版高清| 在线观看一区二区三区| 午夜精品在线福利| 欧美精品啪啪一区二区三区| 黄片小视频在线播放| 日韩有码中文字幕| 网址你懂的国产日韩在线| 中文字幕人妻丝袜一区二区| 一级黄片播放器| 老司机深夜福利视频在线观看| avwww免费| 性色avwww在线观看| 99热精品在线国产| 久久精品国产自在天天线| 亚洲五月婷婷丁香| 日韩国内少妇激情av| 香蕉av资源在线| 麻豆成人午夜福利视频| 91九色精品人成在线观看| 久久精品夜夜夜夜夜久久蜜豆| 俺也久久电影网| 午夜视频国产福利| 在线观看av片永久免费下载| 我的老师免费观看完整版| 亚洲一区高清亚洲精品| 亚洲国产中文字幕在线视频| 男人的好看免费观看在线视频| 黄色片一级片一级黄色片| 成人亚洲精品av一区二区| 日日夜夜操网爽| 午夜福利在线观看免费完整高清在 | 欧美zozozo另类| 尤物成人国产欧美一区二区三区| 亚洲精品在线观看二区| 欧美在线一区亚洲| 国产亚洲精品综合一区在线观看| 久久精品国产清高在天天线| 免费看日本二区| 夜夜看夜夜爽夜夜摸| 久久久精品欧美日韩精品| 校园春色视频在线观看| 中文字幕av成人在线电影| 成人午夜高清在线视频| 国产av麻豆久久久久久久| 国产一区在线观看成人免费| 欧美日韩一级在线毛片| 久久国产精品影院| 女生性感内裤真人,穿戴方法视频| 亚洲第一欧美日韩一区二区三区| 在线观看免费视频日本深夜| 51午夜福利影视在线观看| 九色国产91popny在线| 大型黄色视频在线免费观看| 日本a在线网址| 亚洲在线观看片| 国产成人系列免费观看| 青草久久国产| 国产精品一区二区三区四区免费观看 | 亚洲精品456在线播放app | 免费无遮挡裸体视频| 国产黄a三级三级三级人| 精品日产1卡2卡| 亚洲成人久久性| 性色av乱码一区二区三区2| 99热这里只有是精品50| 色噜噜av男人的天堂激情| 日韩亚洲欧美综合| 成人高潮视频无遮挡免费网站| 亚洲av美国av| 99久久综合精品五月天人人| 91字幕亚洲| 最近最新免费中文字幕在线| 一个人看视频在线观看www免费 | 内射极品少妇av片p| 18禁国产床啪视频网站| 特大巨黑吊av在线直播| 动漫黄色视频在线观看| 欧美成人a在线观看| 美女被艹到高潮喷水动态| 3wmmmm亚洲av在线观看| 操出白浆在线播放| 在线观看66精品国产| 宅男免费午夜| 成年免费大片在线观看| 大型黄色视频在线免费观看| 久久九九热精品免费| 欧美日本视频| 九九久久精品国产亚洲av麻豆| 亚洲人与动物交配视频| 不卡一级毛片| 欧美在线一区亚洲| 又黄又粗又硬又大视频| 天堂动漫精品| 国产综合懂色| 精品国产三级普通话版| 国产v大片淫在线免费观看| 在线天堂最新版资源| 极品教师在线免费播放| 啦啦啦韩国在线观看视频| 日韩欧美精品v在线| 99在线视频只有这里精品首页| 亚洲国产精品合色在线| 乱人视频在线观看| 成人精品一区二区免费| 国产精品久久久人人做人人爽| av片东京热男人的天堂| 中文字幕av成人在线电影| 在线观看午夜福利视频| 亚洲无线观看免费| 久久久国产精品麻豆| 国产 一区 欧美 日韩| 精品人妻1区二区| 欧美乱妇无乱码| 成人高潮视频无遮挡免费网站| 国产一区二区亚洲精品在线观看| 国产高清videossex| 亚洲成人精品中文字幕电影| 99在线视频只有这里精品首页| 亚洲av二区三区四区| 一个人免费在线观看的高清视频| 国产色婷婷99| 在线免费观看的www视频| 老司机福利观看| 波多野结衣高清无吗| 国产亚洲av嫩草精品影院| 老司机深夜福利视频在线观看| 亚洲内射少妇av| 国产久久久一区二区三区| av天堂在线播放| 亚洲最大成人手机在线| 亚洲专区国产一区二区| 99国产精品一区二区蜜桃av| netflix在线观看网站| 88av欧美| 男女那种视频在线观看| 免费电影在线观看免费观看| 高清在线国产一区| 日本 av在线| 中文字幕精品亚洲无线码一区| 在线观看免费视频日本深夜| 国产精品久久视频播放| 在线十欧美十亚洲十日本专区| 午夜福利免费观看在线| 麻豆一二三区av精品| 国产精品一及| 亚洲国产中文字幕在线视频| 久久精品国产自在天天线| 老司机午夜十八禁免费视频| 此物有八面人人有两片| 热99re8久久精品国产| 国产精品久久久久久久电影 | 免费在线观看影片大全网站| tocl精华| 色哟哟哟哟哟哟| 最近最新免费中文字幕在线| 国语自产精品视频在线第100页| 嫩草影院精品99| 精品久久久久久久久久免费视频| 国产欧美日韩一区二区三| 老司机福利观看| 男女午夜视频在线观看| 一级黄片播放器| 成人av一区二区三区在线看| 久9热在线精品视频| 一级黄色大片毛片| 母亲3免费完整高清在线观看| 欧美绝顶高潮抽搐喷水| 国产精品女同一区二区软件 | 中文字幕人妻熟人妻熟丝袜美 | 精品久久久久久久久久免费视频| 99久久精品热视频| 高清在线国产一区| 他把我摸到了高潮在线观看| 亚洲avbb在线观看| 一区福利在线观看| 法律面前人人平等表现在哪些方面| 午夜影院日韩av| 51国产日韩欧美| 999久久久精品免费观看国产| 久久精品91无色码中文字幕| 国语自产精品视频在线第100页| 91在线精品国自产拍蜜月 | 十八禁人妻一区二区| 免费无遮挡裸体视频| 91在线精品国自产拍蜜月 | 黄片大片在线免费观看| 夜夜看夜夜爽夜夜摸| 色精品久久人妻99蜜桃| 免费av不卡在线播放| а√天堂www在线а√下载| 成人永久免费在线观看视频| 叶爱在线成人免费视频播放| 无限看片的www在线观看| 乱人视频在线观看| 免费av观看视频| 国产三级黄色录像| 人人妻人人看人人澡| 国产亚洲欧美在线一区二区| 久久久精品大字幕| 欧美黑人欧美精品刺激| 欧美大码av| 欧美午夜高清在线| 国产精品一区二区免费欧美| 精品乱码久久久久久99久播| 国产成人av激情在线播放| 亚洲,欧美精品.| 天堂影院成人在线观看| 国产私拍福利视频在线观看| 蜜桃亚洲精品一区二区三区| 色哟哟哟哟哟哟| 欧美区成人在线视频| 男女做爰动态图高潮gif福利片| 嫩草影院入口| 内地一区二区视频在线| h日本视频在线播放| 九色成人免费人妻av| 一边摸一边抽搐一进一小说| 天堂网av新在线| 午夜福利18| 一个人观看的视频www高清免费观看| 国产在线精品亚洲第一网站| 亚洲精品在线观看二区| 日韩欧美精品免费久久 | 色视频www国产| 欧美最新免费一区二区三区 | 国产午夜精品久久久久久一区二区三区 | 在线十欧美十亚洲十日本专区| 国产欧美日韩一区二区三| 亚洲成人久久爱视频| 日韩国内少妇激情av| 亚洲18禁久久av| 狂野欧美激情性xxxx| 精品国产超薄肉色丝袜足j| 香蕉丝袜av| 久久久精品大字幕| eeuss影院久久| 久99久视频精品免费| 日本成人三级电影网站| 久久久久久大精品| 亚洲人成网站在线播| 老熟妇仑乱视频hdxx| 69av精品久久久久久| 啦啦啦韩国在线观看视频| 久久这里只有精品中国| 无人区码免费观看不卡| 午夜福利在线观看免费完整高清在 | 在线观看免费午夜福利视频| 亚洲精品亚洲一区二区| 成人鲁丝片一二三区免费| 日韩欧美精品v在线| 亚洲第一欧美日韩一区二区三区| 搡女人真爽免费视频火全软件 | 国产午夜精品久久久久久一区二区三区 | 老司机深夜福利视频在线观看| 亚洲欧美一区二区三区黑人| 精品福利观看| 俺也久久电影网| 欧美三级亚洲精品| 国产精品美女特级片免费视频播放器| 婷婷精品国产亚洲av在线| 亚洲人成伊人成综合网2020| 丁香欧美五月| www.熟女人妻精品国产| 亚洲精品色激情综合| 亚洲在线观看片| 亚洲内射少妇av| 少妇的逼水好多| 极品教师在线免费播放| 成人国产综合亚洲| 男插女下体视频免费在线播放| 欧美日韩黄片免| 久99久视频精品免费| 久久欧美精品欧美久久欧美| 国产单亲对白刺激| 国产蜜桃级精品一区二区三区| 制服人妻中文乱码| 国产欧美日韩精品亚洲av| 一级毛片高清免费大全| 欧美一区二区亚洲| 亚洲国产精品合色在线| 十八禁人妻一区二区| 身体一侧抽搐| 久久久久性生活片| 搡老岳熟女国产| 欧洲精品卡2卡3卡4卡5卡区| 国产91精品成人一区二区三区| 午夜精品一区二区三区免费看| 成年女人永久免费观看视频| 特级一级黄色大片| 99久久无色码亚洲精品果冻| 国产午夜福利久久久久久| 在线观看免费午夜福利视频| 日韩成人在线观看一区二区三区| svipshipincom国产片| 精品乱码久久久久久99久播| 午夜视频国产福利| 51午夜福利影视在线观看| 亚洲av二区三区四区| 一本久久中文字幕| 又粗又爽又猛毛片免费看| 首页视频小说图片口味搜索| 黄色女人牲交| 国产精品电影一区二区三区| 制服丝袜大香蕉在线| 成年版毛片免费区| 亚洲最大成人手机在线| 人人妻,人人澡人人爽秒播| 中出人妻视频一区二区| 国产精品,欧美在线| 成人欧美大片| 搡老妇女老女人老熟妇| 国产老妇女一区| 最近在线观看免费完整版| 国产精品久久久久久亚洲av鲁大| 特大巨黑吊av在线直播| 99热只有精品国产| 亚洲av中文字字幕乱码综合| 成年免费大片在线观看| 男女下面进入的视频免费午夜| 制服人妻中文乱码| 久久久久久大精品| 少妇熟女aⅴ在线视频| 色精品久久人妻99蜜桃| 91久久精品电影网| 蜜桃亚洲精品一区二区三区| 亚洲,欧美精品.| 午夜视频国产福利| 欧美激情在线99| 亚洲国产高清在线一区二区三| 一进一出抽搐动态| 少妇人妻一区二区三区视频| 中文在线观看免费www的网站| 老汉色av国产亚洲站长工具| 麻豆一二三区av精品| 久久久久久久午夜电影| 国产精品电影一区二区三区| 亚洲国产欧洲综合997久久,| 法律面前人人平等表现在哪些方面| 久久国产乱子伦精品免费另类| 无人区码免费观看不卡| 国产爱豆传媒在线观看| 真人一进一出gif抽搐免费| 一区二区三区激情视频| 男女视频在线观看网站免费| 欧美日韩瑟瑟在线播放| 99国产综合亚洲精品| 欧美高清成人免费视频www| 波多野结衣高清作品| 两个人看的免费小视频| 91av网一区二区| 国产69精品久久久久777片| 欧美+亚洲+日韩+国产| 精品一区二区三区视频在线 | 日日干狠狠操夜夜爽| 国产欧美日韩精品一区二区| 午夜免费观看网址| 亚洲国产精品久久男人天堂| avwww免费| 蜜桃久久精品国产亚洲av| 亚洲乱码一区二区免费版| 一级作爱视频免费观看| 全区人妻精品视频| 欧美黑人巨大hd| 99久久九九国产精品国产免费| 久久久久九九精品影院| 精品人妻1区二区| www.熟女人妻精品国产| 九九热线精品视视频播放| 成人国产综合亚洲| 成人性生交大片免费视频hd| 久久精品国产自在天天线| 国内精品久久久久精免费| 听说在线观看完整版免费高清| 在线观看66精品国产| 三级毛片av免费| eeuss影院久久| 啦啦啦观看免费观看视频高清| 日本免费a在线| 久久精品91蜜桃| 国产97色在线日韩免费| 久久精品国产清高在天天线| 韩国av一区二区三区四区| 午夜老司机福利剧场| 欧美又色又爽又黄视频| 99久久成人亚洲精品观看| 国产精品爽爽va在线观看网站| 日韩精品中文字幕看吧| 欧美日韩一级在线毛片| 日本 av在线| 天堂av国产一区二区熟女人妻| 亚洲国产精品成人综合色| 老熟妇仑乱视频hdxx| 一卡2卡三卡四卡精品乱码亚洲| 国产av不卡久久| 岛国在线观看网站| 最近在线观看免费完整版| 国产真人三级小视频在线观看| 亚洲在线自拍视频| 日本免费a在线| 亚洲中文字幕一区二区三区有码在线看| 欧美3d第一页| 中文字幕人妻丝袜一区二区| 天天一区二区日本电影三级| 国产淫片久久久久久久久 | 久久婷婷人人爽人人干人人爱| 美女被艹到高潮喷水动态| 91久久精品国产一区二区成人 | 18禁裸乳无遮挡免费网站照片| 久久久久亚洲av毛片大全| 日韩欧美国产在线观看| 超碰av人人做人人爽久久 | 免费搜索国产男女视频| 国产爱豆传媒在线观看| 亚洲国产精品久久男人天堂| 国产精品爽爽va在线观看网站| 国产老妇女一区| 国产亚洲欧美98| 国产精品,欧美在线| 欧美+日韩+精品| 精品欧美国产一区二区三| 国产一区二区在线观看日韩 | 美女高潮喷水抽搐中文字幕| 免费看光身美女| 国产真实乱freesex| 搡女人真爽免费视频火全软件 | 国产av不卡久久| 免费无遮挡裸体视频| 在线免费观看不下载黄p国产 | 亚洲成人中文字幕在线播放| 99精品在免费线老司机午夜| 日本 欧美在线| 女人高潮潮喷娇喘18禁视频| 精品一区二区三区av网在线观看| 欧美激情在线99| 嫩草影视91久久| 国产aⅴ精品一区二区三区波| 18禁在线播放成人免费| 老汉色∧v一级毛片| 精品99又大又爽又粗少妇毛片 | 国产精品久久久久久亚洲av鲁大| 内地一区二区视频在线| 乱人视频在线观看| 精品一区二区三区视频在线观看免费| 精品日产1卡2卡| 九九热线精品视视频播放| 熟女电影av网| 国产成人欧美在线观看| 哪里可以看免费的av片| av福利片在线观看| 成人鲁丝片一二三区免费| 99在线人妻在线中文字幕| 黄色日韩在线| 欧美色欧美亚洲另类二区| 国产91精品成人一区二区三区| 精品国内亚洲2022精品成人| 亚洲av电影在线进入| 欧美激情久久久久久爽电影| 18禁裸乳无遮挡免费网站照片| 亚洲一区二区三区色噜噜| 亚洲成人久久爱视频| 18禁黄网站禁片免费观看直播| 中文字幕人妻熟人妻熟丝袜美 | 国产成人a区在线观看| 黄色视频,在线免费观看| 成人永久免费在线观看视频| 亚洲欧美日韩卡通动漫| 亚洲中文字幕日韩| 国产精品美女特级片免费视频播放器| 久久欧美精品欧美久久欧美| 99久国产av精品| 精品国产美女av久久久久小说| 中文资源天堂在线| 麻豆国产av国片精品| www.色视频.com| 国产探花极品一区二区| 精品熟女少妇八av免费久了| 丰满的人妻完整版| 特级一级黄色大片|