• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding?

    2018-11-24 07:39:46HongLai賴紅MingXingLuo羅明星YongJianXu徐永健JosefPieprzykJunZhang張軍LeiPan潘磊andMehmetOrgun
    Communications in Theoretical Physics 2018年10期
    關(guān)鍵詞:張軍明星

    Hong Lai(賴紅), Ming-Xing Luo(羅明星),Yong-Jian Xu(徐永健),Josef Pieprzyk,Jun Zhang(張軍), Lei Pan(潘磊),and Mehmet A.Orgun

    1School of Computer and Information Science and Centre for Research and Innovation in Software Engineering(RISE),Southwest University,Chongqing 400715,China

    2Information Security and National Computing Grid Laboratory,School of Information Science and Technology,Southwest Jiaotong University,Chengdu 610031,China

    3Data61,Commonwealth Scientific and Industrial Research Organisation,Sydney,Australia

    4Institute of Computer Science,Polish Academy of Sciences,Warsaw,01-248,Poland

    5School of Software and Electrical Engineering,Swinburne University of Technology,Hawthorn,VIC,3122,Australia

    6School of Information Technology,Deakin University,Geelong,VIC,3220,Australia

    7Department of Computing,Macquarie University,Sydney,NSW 2109,Australia

    8Faculty of Information Technology,Macau University of Science and Technology,Avenida Wai Long,Taipa,999078,Macau

    AbstractSince the use of a quantum channel is very expensive for transmitting large messages,it is vital to develop an effective quantum compression encoding scheme that is easy to implement.Given that,with the single-photon spin-orbit entanglement,we propose a quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding.In our proposed scheme,we can represent the frequency of any secret message which is typically collection of bits encodings of text or integers as a bitstring using the base Fibonacci sequence,which is encoded multiple spin states for secret shares transmitted to participants.We demonstrate that Fibonacci compression encoding carries excellent properties that enable us to achieve more robust quantum secret sharing schemes with fewer number of photons.

    Key words:spin-orbit entanglement,multiple spin states,Fibonacci compression encoding,quantum secret sharing

    1 Introduction

    In 1979,Shamir[1]and Blakeley[2]showed how a secret can be shared among a group of participants.Shamir used an algebraic construction while Blakley applied a geometric approach.In their schemes,if the number of collaborating participants is above the set threshold,then they can recover the secret.Conversely,if the number of participants in any given subset is below the set threshold,then they should obtain nothing about the secret.In 1999,Hillery et al.[3]proposed a quantum secret sharing(QSS)scheme based on the Greenberger-Horne-Zeilinger(GHZ)state.[4]The Hillery et al.scheme uses entangled quantum states to share a secret in the context of classic cryptography.In the same year,Cleve et al.[5]introduced an alternative QSS scheme that allows quantum state sharing(QSTS).For these schemes based on quantum mechanics,[6]participants use certain quantum techniques to share a secret,which makes it possible to achieve unconditionally secure QSS schemes.Inspired by their schemes,more and more authors have shown great interest in the study of QSS[7?13]and QSTS.[14?16]

    On the other hand,in 1909,Poynting[17]discovered that light waves have spin angular momentum(SAM).In 1992,Allen et al.[18]observed that a photon carries orbital angular momentum(OAM)as well.Using SAM photon freedom,qubit coding can be conducted in a similar manner to the demonstration provided by Bennett and Bras-sard in their quantum key distribution(QKD).[19]An interesting property of photon OAM is that it can achieve a high dimensional quantum state coding(i.e.qudit coding).In 2002,Leach et al.[20]conducted experiments with encoding separation techniques using photonic OAM.They pointed out that the OAM carrier could greatly improve the communication capacity of a single photon.In 2001,Mair et al.[21]experimentally demonstrated that photon pairs prepared by the spontaneous parametric down conversion(SPDC)share similar characteristics to those of OAM.A year later,Leach et al.[20]devised an interferometric technique that individually recognizes photons in arbitrarily many OAM states and routes each of the photons.Leach et al.advanced[22]their techniques to measure the orbital,spin or total angular momenta and subsequently a successful measurement of the sign of OAM of a light beam using a Shack Hartmann wavefront sensor.[23]In 2015,with OAM of photons,Mi et al.[24]proposed a high-capacity quantum secure direct communication.By using the rotational Doppler shift and an interferometer spanning the angle space,Vasnetsov et al.[25]and Zambrini and Barnett[26]discovered the resolution of the OAM spectrum respectively.Consequently,these developments ignited a great interest in studying quantum information processing with enlarged sets of alphabets based on OAM sorting.

    A separate line of research deals with the problem of how to achieve a coupling between SAM and OAM in an inhomogeneous and anisotropic medium(which is also known as q-plates).[27]Q-plates together with quantum information transfer between different degrees of freedom were studied by Nagali et al.[28]In this context,Chen and She demonstrated the Shannon dimensionality increase.[29]In 2009,Chen and She[30]proposed to use an OAM-dependent polarization manipulation technique to design a practical scheme,which is able to sort OAM by cascading conventional polarizing beam splitters.Moreover,they found that their scheme could induce spinorbit coupling.This provides an alternative technique for encoding OAM onto multiple spin states using a Hu ffman tree.[31]The technique could have some potential use in optical communication.Although Huffman codes have the optimal compression ratio,the encoding and decoding process is complicated as it depends on the probability distribution of the alphabetical letters in the given message.Moreover,its robustness against errors is absent.In order to address these problems,we propose to use a new variable-length codewords,i.e.,a binary Fibonacci numeration system.We show how to use them to design quantum secret sharing with Fibonacci compression encoding based on the technique proposed by Chen and She.[30]

    The rest of paper is organized as follows.Section 2 discusses Fibonacci sequences,Fibonacci representation and Fibonacci diagonal matrices.Section 3 describes the proposed compressed QSS scheme.The security analysis and features of the protocol are presented in Secs.4 and 5,respectively.Section 6 concludes the work.

    2 Fibonacci Sequences,Fibonacci Representation and Fibonacci Diagonal Matrices

    In this section,we give the necessary background on Fibonacci sequences and related mathematical structures that we use in the paper.

    2.1 Fibonacci Sequences

    The Fibonacci sequence for our proposed scheme is defi ned as follows:

    Definition 1Fibonacci sequence Fifor(i= 0,1,2,...)[32]satisfies the following recurrence relation:

    Therefore,the first few Fibonacci numbers are 0,1,1,2,3,5,8,13,21,34,55,89,...

    Alternatively,the Fibonacci sequence can be represented as follows[33]

    2.2 Fibonacci Representation

    A fundamental theorem in discrete mathematics states that any positive integer can be represented by Fibonacci bases.[34]The following definition describes the representation.

    Definition 2(Fibonacci representation[34])For any positive integer n,there exists a finite subset S ={l1,l2,...,lk}of the natural numbers,where l1

    (i)Fl1+Fl2+ ···+Flk=n.

    (ii)For all i,Fli+1≥Fli+2(no adjacent ones).

    There is also an efficient algorithm that produces such representation.

    Algorithm

    Parameters:Fibonacci bases Fl1,Fl2,Fl3,...,Flk.Input:an integer n.

    Output:a sequence S such that∑Fli=n.

    (i)S=?.

    (ii) For i∈[1,k]be the largest number such that Fli≤n.

    (iii)S=li.

    (iv)n→n?Fli.

    Proposition 1[34]The Fibonacci representation of an integer is uniquely decodable.

    Example 1According to the above-mentioned algorithm,the integer 45 can be represented using Fibonacci sequence as follows:

    where S={3,5,8}.

    2.3 Fibonacci Block Diagonal Matrices

    The simplest Fibonacci matrix can be constructed from the first three Fibonacci numbers 0,1,1 as follows:[35]

    where det(Q1)=F0F2?= ?1.Using Eq.(1),we can compute the k-th power of the Fibonacci matrixas follows

    Fibonacci block diagonal matrices are defined as follows:

    So,the Fibonacci block diagonal matrix for Example 1 is

    where O is a matrix of dimension 2×2 with zero entries.

    3 A QSS Scheme Based on Fibonacci Compression Encoding

    In this section,we apply the technique based on Ref.[30]to encode OAM onto multiple spin states using Fibonacci compression encoding and propose a quantum secret sharing scheme.We note that Fibonacci compression encoding[36]enjoys excellent properties that enable us to design a compressed QSS scheme.The proposed scheme can greatly increase the transmission capacity,and thus save qubits for the transmission.Most importantly,it provides extra resilience to the attacks against the secret message.

    Our QSS scheme includes two phases,i.e.,distributing key with Fibonacci compression encoding phase and recovering secret phase.There are three kinds of roles involved in our compressed QSS scheme,which are as follows:

    (i)A Dealer.

    (ii)Quantum participants.

    (iii)An adversary.

    The dealer(Alice),which is at a free-space OAM qudit network,is responsible for converting a classical secret message into multiple spin states and sending them to m quantum participants P1,P2,...,Pm.

    Quantum participants,denoted as P1,P2,...,Pmconnected viaaqubitnetwork,hold quantum shares s1,s2,...,smrespectively.Their task is to detect eavesdropping and jointly recover the shared secret.

    The adversary,who could also be any of participants,can eavesdrop the transmitted information over the quantum channel.

    3.1 Distributing Key with Fibonacci Compression Encoding Phase

    Our scheme accepts the triplet:a secret S(this is typically collection of bits,which are encodings of text or integers),a designated collection of participants P={P1,P2,...,Pm}from an access structure Γ as an input.The access structure Γ determines a collection of participants that are authorized to reconstruct the secret.It outputs quantum shares si,i=1,2,...,m-multiple spin states for participants Pi,i=1,2,...,m.

    The detailed steps of our protocol are given as follows:Step 1 Compressing the secretThe Dealer sets up the secret sharing.She computes the frequency of every block(for example,each sentence of a secrete text can be regarded as a block)of S and represents them in Fibonacci bases such as 34,21,13,8,5,3,2,1,(see Definition 2).

    The compressing processes are performed in clearly separated stages:

    (i)Compute the frequencies of the collection of bits which are encodings of the text or the integers.

    (ii)Rank the collection of bits by their frequencies.

    (iii)Compute the Fibonacci code of each ranking.

    (iv) Output the ranking as the header of the compressed secret.

    (v)Reread the input secret S,using the code table to generate the output and transfer it to the compressed secret.

    Step 2 Quantum encodingThe step aims to convert the binary codes 1s and 0s into single photon’s polarizations Vs and Hs.The Dealer encodes the frequencies with OAM by assigning a twisted number of a single photon to each Fibonacci value:.That is,only 8 different twists are required in terms of Chen and She’s work[30](see Fig.1).Moreover,the Dealer encodes every character into binary codes,i.e.,1s and 0s which are represented by single photon’s polarizations Vs and Hs.Also,to remove this encoding ambiguity,we append an extra bit 1 to every character binary codes,which is used to act as a “comma”,separating consecutive codewords.

    Step 3 Distributing the keyAs shown in Fig.1,Alice sends the quantum shares to P1,P2,...,Pmaccording to the setting of an array of angularly separated light sources illuminating the static phase mask.After entering static modulation,the input planar photons are converted into twisted ones with coinciding propagation direction.Each twist number assigned is selectively dependent on their inclinations in front of the phase mask.

    Then,the encoded twisted photons are sent into the free-space link by an afocal telescope.The Dealer’s qudit receiver consists of a similar telescope,the aforementioned OAM sorter,and an array of photodiode detectors which are set up to monitor the output intensity of each port.Thus,the aggregated information is used to decode the message.The Dealer Alice can encode the secret message as binary codes(spin),and send quantum shares–the corresponding multiple spin states through the quantum channel,and publish the determinants of Fibonacci diagonal matrices to participants P1,P2,...,Pmthrough the classical communication channel.

    Example 2Take the secret message“action please” as an example to illustrate Steps 1-3,we can obtain the encoded information listed in Table 1.

    Table 1 Compress and encode the secret message “action please” as binary bits,where each binary code(0 or 1)is represented by a single photon’s polarization(H or V).

    The Dealer sends VV to P1,HHVV to P2,...,HVV to P10via the quantum channel.At the same time,the Dealer publishes det(),det(),...,det()via the classical channel.

    3.2 Recovering the Secret Phase

    In this phase,the system accepts the triplet:quantum shares s1,s2,...,smand a set of currently active participants{P1,P2,...,Pm}as the input.It outputs the aggregated secret S if{P1,P2,...,Pm}are verified,or“FAIL”otherwise.

    The detailed steps are as follows:

    Step1 EavesdroppingDetectionUpon recipient of these multiple spin states,the participants{P1,P2,...,Pm}can obtain their qubits.According to Table 1,they first verify the determinants of Fibonacci diagonal matrices consisting of the Rank’s Fibonacci bases in terms of Eq.(5).If they are different,they immediately abort the communication and the final output is FAIL.Otherwise,they continue to obtain the matching codes.

    Step 2 Secret RecoveryAfter confirming that the secret shares received by all participants are valid,the Dealer informs the nominated aggregator immediately(which can be any participant)on the positions of every character or integer of the collection of bits.Finally,the secret S can be reconstructed by concatenating all the decoded pieces based on each participant’s secret share.An example is provided in Table 1.

    In Example 2,according to the published det(),det(),...,det()by the Dealer,P1,...,P10can detect potential eavesdropping in terms of Eq.(5).If the com-puted determinants from P1,...,P10are identical to the Dealer’s published values,P1can obtain “a” from the code word VV,P2can obtain “c” from the code word HHVV,···,P10can obtain “e” from the code word HVV.At last,they can obtain the secret message “action please”.

    4 Security Analysis

    In this section,we analyze the security of the proposed QSS scheme in the presence of some known attack strategies.

    4.1 The Man-in-the-Middle Attack

    As shown in Fig.1,the Dealer manipulates the qudit state of the signal photons only in her private side and keeps these photons all the time.Similarly,the participants P1,P2,...,Pmmanipulate the qubit states in their own sides.In these private places,it is not possible for the adversary Eve to have access to the photons.Nevertheless,participants P1,P2,...,Pmdo not always keep the qubit photons,providing a chance for Eve’s eavesdropping.That is,Eve can intercept the qubit photons from the Dealer to the participants P1,P2,...,Pmin the free space,and then send the unoriginal qubit photons to P1,P2,...,Pm,i.e.,man-in-the-middle attacks.However,our scheme can defend the secrets against the man-in-themiddle attack.This is because we can use the determinant of matching Fibonacci diagonal matrices of photon’s information to verify the identification of every participant.

    Take Table 1 for example,if the adversary Eve intercepts the multiple spin states HVV from the Dealer to participant 2,and then re-sends HHVV to participant 2.However,the determinant of matching Fibonacci diagonal matrices is also changed.In this case,the Fibonacci diagonal matrix is changed to

    4.2 The Participants’Attack

    Our scheme uses an access control mechanism,i.e.only designated participants can recover the secret.So,we consider the attacks launched from the external participants here.We analyze the following three scenarios.

    (i)Firstly,as shown in Fig.1,the external participant who is located at the other side of the qubit network,cannot see the secret message over the qudit network directly.

    (ii)Secondly,according to Eq.(5),we use the determinants of Fibonacci diagonal matrices consisting of the rank’s Fibonacci bases to verify the identity of the participant.For example,if a participant receives multiple spin states HVV and its Rank’s Fibonacci base is 2,then the Fibonacci diagonal matrices is

    (iii)Finally,even if the external participants can obtain the quantum information,any attacks can be detected by the compression coding with representation of every block.Each sentence or a certain number of letters can be regarded as a block of the secret.The position of every letters of a block is only given to the legal participants through the secure channel.Therefore,the external participants cannot obtain the secret.

    4.3 The Photon-Number-Splitting(PNS)Attack

    The photon-number-splitting(PNS)attack is defined as follows:as non-ideal light sources are used in quantum cryptography,the number of produced photons can be multiple,providing a chance for the attacker Eve to obtain the transmitted quantum messages in two-way quantum communications.However,as shown in Fig.1,our scheme is one-way and we use orbital angular momentum onto multiple spin states rather than spin angular momentum.Therefore,Eve cannot obtain the secret using the photon-number-splitting(PNS)attack.

    5 Features of Our Proposed Protocol

    Based on Chen and She’s work,[29]we have proposed a novel QSS scheme,i.e.compressed QSS.In our protocol,the q-plate is used as a qudit-to-qubit transverter to transform the polarization higher-dimensional photons into the two-dimensional photons,which provides the possibility to explore the features of the higher-dimensional space of OAM states to encode information.More importantly,our encoding process is much simpler than the Huffman encoding,because the latter must take every probability distribution of letters in the secret information into account.In addition,the actual decoding process is very similar to that of the Huffman coding.In our QSS scheme,one-to-one mapping between the multiple spin states and the participants P1,P2,...,Pmwould make the column of codewords in Table 1 superfluous.In the following,we introduce the features brought by the higher-dimensional space of OAM states in detail.

    (i)Our QSS scheme has high compression efficiency Due to the use of the variable-length Fibonacci compression encoding,the length of codeword is reduced tofromin the standard binary coding(see Table 2),where M is the maximal bytes of codewords length.The longer the secret messages,the more substantial the saving codes(photons)(see Fig.2).Figure 2 plots the codewords length as a function of the rank of the character on a logarithmic scale for Huffman and Fibonacci compression coding.

    Fig.2 The comparison of compression efficiency between Huffman encoding and our Fibonacci compression encoding.

    Also,as shown in Table 2,the Prob√ability of 1-bit guess is reduced from 1/2 to(1/2)(1? 1/)=0.276.Meanwhile,the average codeword lengths of 1-bit areandfor standard binary coding and our Fibonacci compression encoding respectively.

    Also,review Example 2,the size of header+51 bits is encoded into at most 51/10=6 bytes,though the header may be larger.With an ordinary representation,each letter of the original string “action please” in Example 2 requires one byte or 8 bits.Compared to the standard binary codes with our Fibonacci compression encoding,the length of character“a” is one fourth of that of standard binary codes.Moreover,if we can obtain a more accurate estimate of the probability of each letter in the secret message,the proportion of lossless compression can be significantly increased.

    Table 2 Performance comparison between standard binary encoding and Fibonacci encoding,where M is the maximal bytes of codewords length.

    (ii)Our QSS scheme is robustWhile inserting and deleting of a single bit,the Huffman coding may lose all the suffixes,since it renders the decoding to be shifted and all the true codeword boundaries to be missed.However,our Fibonacci coding is immune to such effects(see Fig.2),because of its explicit codeword ending.

    (iii)Our QSS scheme can save a substantial number of photons As shown in Fig.2,if the shared secret is long,with our Fibonacci compression encoding,the length of codes is reduced greatly,and in turn,in our QSS scheme,the number of the used photons is greatly reduced.

    (iv) The dealer and the participants P1,P2,...,Pmare in different kinds of a qubit network As is described in Sec.3,Dealer is at a free-space OAM qudit network while all participants P1,P2,...,Pmare at a qubit network.So,the participants P1,P2,...,Pmcould not see the Dealer’s secret,and the security is provided.

    6 Conclusion

    The paper uses Fibonacci compression encoding to achieve a compressed QSS scheme based on orbital angular momentum onto multiple spin states.The proposed scheme improves the efficiency of photon usage due to the significant improvement over the standard binary coding.The proposed scheme also improves the level of security,because the probability of successfully guess√ing 1-bit information is reduced from 1/2 to(1/2)(1?1/=0.276.Because we use the Fibonacci compression coding to tolerate information loss,our proposed scheme is more robust than the traditional schemes using the Huffman coding.

    猜你喜歡
    張軍明星
    篆刻:張軍
    萬松浦(2023年6期)2023-04-08 11:57:16
    張軍從脾論治痛風(fēng)性關(guān)節(jié)炎緩解期的經(jīng)驗總結(jié)
    明星猝死背后
    南方周末(2019-11-28)2019-11-28 08:37:59
    交通安全小明星
    幼兒園(2017年23期)2018-02-07 15:26:54
    明星們愛用什么健身APP
    Coco薇(2017年2期)2017-04-25 03:02:27
    扒一扒明星們的
    Coco薇(2016年10期)2016-11-29 16:59:54
    誰是大明星
    誰動了我的壽限
    貪小便宜毀人生
    CO2 Capture by Vacuum Swing Adsorption Using F200 and Sorbead WS as Protective Pre-layers*
    久久国产精品大桥未久av| 如日韩欧美国产精品一区二区三区| 人妻 亚洲 视频| 不卡一级毛片| xxxhd国产人妻xxx| 在线av久久热| 99精品久久久久人妻精品| 精品国产乱码久久久久久男人| 免费少妇av软件| 欧美日韩精品网址| 久久久精品94久久精品| 日韩大片免费观看网站| 日本一区二区免费在线视频| 美女大奶头黄色视频| 男女床上黄色一级片免费看| 日韩视频在线欧美| 999久久久国产精品视频| 一二三四在线观看免费中文在| 热re99久久国产66热| 中文字幕色久视频| 亚洲av国产av综合av卡| 久久中文字幕一级| 欧美黄色片欧美黄色片| av线在线观看网站| 日韩中文字幕欧美一区二区| 国产精品久久久久成人av| 国产免费视频播放在线视频| 欧美精品av麻豆av| 日本一区二区免费在线视频| 亚洲熟女精品中文字幕| a在线观看视频网站| 女人久久www免费人成看片| 亚洲欧美色中文字幕在线| 一区二区三区激情视频| 欧美日韩av久久| 美国免费a级毛片| 国产99久久九九免费精品| 2018国产大陆天天弄谢| 国产欧美日韩综合在线一区二区| 男女边摸边吃奶| 日韩视频一区二区在线观看| 成人免费观看视频高清| kizo精华| 久久中文看片网| 成年动漫av网址| tube8黄色片| 日本91视频免费播放| 国产一级毛片在线| 91九色精品人成在线观看| 黑人欧美特级aaaaaa片| 国产精品 欧美亚洲| 久久久久久亚洲精品国产蜜桃av| 亚洲精品自拍成人| 香蕉丝袜av| 午夜福利免费观看在线| 国内毛片毛片毛片毛片毛片| 人人妻人人澡人人爽人人夜夜| 国产一区二区三区综合在线观看| 国产又爽黄色视频| 自线自在国产av| 黄色 视频免费看| 亚洲精品第二区| 手机成人av网站| 国产亚洲一区二区精品| a 毛片基地| 美女国产高潮福利片在线看| 国产精品免费视频内射| 韩国高清视频一区二区三区| 亚洲欧美日韩另类电影网站| 亚洲欧美日韩另类电影网站| 久久久精品区二区三区| 久久人人爽人人片av| 热re99久久精品国产66热6| 亚洲欧美激情在线| 国产日韩欧美视频二区| 亚洲精品国产av成人精品| 亚洲情色 制服丝袜| 欧美精品av麻豆av| 中文字幕色久视频| 国产精品亚洲av一区麻豆| 91麻豆av在线| 国产成人啪精品午夜网站| 成年女人毛片免费观看观看9 | 成人免费观看视频高清| 两性夫妻黄色片| 日韩人妻精品一区2区三区| 麻豆国产av国片精品| 久久久久视频综合| 国产成人av激情在线播放| 高清欧美精品videossex| 另类精品久久| 精品国产一区二区三区四区第35| 国产精品.久久久| 中亚洲国语对白在线视频| 18禁黄网站禁片午夜丰满| 久久久久精品国产欧美久久久 | 国产日韩欧美亚洲二区| 一二三四社区在线视频社区8| 亚洲七黄色美女视频| 桃花免费在线播放| 精品福利观看| 99国产精品免费福利视频| 免费在线观看黄色视频的| 在线观看免费高清a一片| 成人国产一区最新在线观看| 亚洲欧美一区二区三区黑人| av网站在线播放免费| a 毛片基地| 国产91精品成人一区二区三区 | 久久人人爽av亚洲精品天堂| 欧美+亚洲+日韩+国产| 亚洲av电影在线进入| 亚洲成国产人片在线观看| 亚洲国产精品成人久久小说| 亚洲国产精品999| 成人黄色视频免费在线看| 亚洲精品av麻豆狂野| 嫩草影视91久久| 亚洲性夜色夜夜综合| 18禁裸乳无遮挡动漫免费视频| 热99国产精品久久久久久7| 巨乳人妻的诱惑在线观看| 亚洲九九香蕉| 亚洲avbb在线观看| 亚洲精品中文字幕在线视频| 国产有黄有色有爽视频| 欧美少妇被猛烈插入视频| 黄网站色视频无遮挡免费观看| 在线精品无人区一区二区三| 中文字幕色久视频| 不卡一级毛片| 性色av乱码一区二区三区2| 国产精品欧美亚洲77777| 黑人巨大精品欧美一区二区mp4| 亚洲av美国av| 爱豆传媒免费全集在线观看| 国产无遮挡羞羞视频在线观看| videosex国产| 欧美中文综合在线视频| 欧美 日韩 精品 国产| 国产精品自产拍在线观看55亚洲 | 久9热在线精品视频| 午夜福利视频精品| 日韩精品免费视频一区二区三区| 欧美日韩福利视频一区二区| 下体分泌物呈黄色| 成年人免费黄色播放视频| 国产一区二区在线观看av| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲精品在线美女| 亚洲九九香蕉| 国产高清videossex| 一区二区三区激情视频| 免费观看av网站的网址| av天堂久久9| 男人舔女人的私密视频| 高清黄色对白视频在线免费看| 狂野欧美激情性xxxx| 亚洲欧美精品综合一区二区三区| 日本黄色日本黄色录像| 成人三级做爰电影| 亚洲熟女毛片儿| 大香蕉久久网| 国产亚洲午夜精品一区二区久久| 成年av动漫网址| 狠狠婷婷综合久久久久久88av| 99热网站在线观看| 国产精品免费视频内射| 精品国产一区二区三区久久久樱花| 国产亚洲欧美精品永久| 久久久久久久大尺度免费视频| 亚洲av电影在线进入| 免费久久久久久久精品成人欧美视频| 激情视频va一区二区三区| 成人免费观看视频高清| 青春草亚洲视频在线观看| 久久久久久久国产电影| 这个男人来自地球电影免费观看| 夜夜骑夜夜射夜夜干| 欧美午夜高清在线| 桃花免费在线播放| 欧美 日韩 精品 国产| 男女之事视频高清在线观看| 国精品久久久久久国模美| 国产精品久久久av美女十八| 国产熟女午夜一区二区三区| 国产老妇伦熟女老妇高清| 亚洲av美国av| 18禁裸乳无遮挡动漫免费视频| 国产视频一区二区在线看| 国产免费现黄频在线看| 亚洲精品国产一区二区精华液| 亚洲精品成人av观看孕妇| 大香蕉久久网| 成人18禁高潮啪啪吃奶动态图| 亚洲精品一区蜜桃| 后天国语完整版免费观看| 一区二区三区乱码不卡18| 精品人妻在线不人妻| 99精品久久久久人妻精品| 老司机亚洲免费影院| 欧美黄色片欧美黄色片| 免费久久久久久久精品成人欧美视频| 纯流量卡能插随身wifi吗| 欧美xxⅹ黑人| 窝窝影院91人妻| 在线观看一区二区三区激情| 久9热在线精品视频| 女性被躁到高潮视频| 国产精品二区激情视频| 亚洲精品国产一区二区精华液| 亚洲国产欧美日韩在线播放| 亚洲国产欧美一区二区综合| 亚洲av片天天在线观看| 亚洲,欧美精品.| 操美女的视频在线观看| 久久久久久人人人人人| 国产91精品成人一区二区三区 | 一区二区三区乱码不卡18| 国产91精品成人一区二区三区 | 中文字幕精品免费在线观看视频| 欧美黑人欧美精品刺激| 高清av免费在线| 黄色 视频免费看| 在线看a的网站| 亚洲精品av麻豆狂野| av欧美777| 人人妻人人澡人人看| 老司机在亚洲福利影院| 一二三四社区在线视频社区8| 成人三级做爰电影| 丁香六月天网| 成人手机av| 国产成+人综合+亚洲专区| 亚洲第一av免费看| 亚洲人成电影观看| 91麻豆av在线| 久久人人97超碰香蕉20202| 黄色视频不卡| 精品熟女少妇八av免费久了| 亚洲专区国产一区二区| 国产精品.久久久| 99热网站在线观看| 在线亚洲精品国产二区图片欧美| 中国美女看黄片| 国产免费一区二区三区四区乱码| 亚洲精品美女久久久久99蜜臀| 精品久久蜜臀av无| 99久久人妻综合| 青草久久国产| 国产老妇伦熟女老妇高清| 女性生殖器流出的白浆| 一级毛片女人18水好多| 久久av网站| 老司机福利观看| 丝瓜视频免费看黄片| 国产黄色免费在线视频| 91九色精品人成在线观看| 中文字幕人妻丝袜一区二区| 人妻久久中文字幕网| 老熟妇仑乱视频hdxx| 国产精品 国内视频| 啦啦啦视频在线资源免费观看| 天天影视国产精品| 中国美女看黄片| 久久久久国产一级毛片高清牌| 亚洲美女黄色视频免费看| 91麻豆av在线| 曰老女人黄片| 1024香蕉在线观看| 中文字幕人妻熟女乱码| 女人爽到高潮嗷嗷叫在线视频| 欧美老熟妇乱子伦牲交| 制服诱惑二区| 精品高清国产在线一区| 免费黄频网站在线观看国产| 麻豆av在线久日| 9色porny在线观看| 国产高清视频在线播放一区 | 老司机午夜福利在线观看视频 | 久久99热这里只频精品6学生| 国产精品久久久久久精品古装| 五月开心婷婷网| 日本vs欧美在线观看视频| 老司机亚洲免费影院| 亚洲精品一二三| 免费观看a级毛片全部| 亚洲中文日韩欧美视频| 国产精品香港三级国产av潘金莲| 18在线观看网站| 精品国内亚洲2022精品成人 | 黄色片一级片一级黄色片| 精品少妇内射三级| 日韩三级视频一区二区三区| 国产高清国产精品国产三级| 亚洲第一av免费看| 亚洲第一欧美日韩一区二区三区 | 久久亚洲精品不卡| 精品久久久久久电影网| 成年av动漫网址| 制服诱惑二区| 久久人人爽人人片av| cao死你这个sao货| 一边摸一边抽搐一进一出视频| 五月开心婷婷网| 50天的宝宝边吃奶边哭怎么回事| 欧美黑人欧美精品刺激| 国产成人av激情在线播放| 久久久欧美国产精品| 久久久久视频综合| 国产成人系列免费观看| 后天国语完整版免费观看| 亚洲专区字幕在线| av天堂在线播放| 成年av动漫网址| 久久女婷五月综合色啪小说| 男女高潮啪啪啪动态图| 飞空精品影院首页| 亚洲七黄色美女视频| 黄色a级毛片大全视频| 免费少妇av软件| 别揉我奶头~嗯~啊~动态视频 | 精品乱码久久久久久99久播| 人人妻人人澡人人看| 亚洲五月色婷婷综合| videosex国产| 国产成人av激情在线播放| 一个人免费看片子| a级毛片在线看网站| 亚洲 欧美一区二区三区| 国产主播在线观看一区二区| 欧美亚洲 丝袜 人妻 在线| av在线播放精品| 亚洲精品一区蜜桃| 国产黄色免费在线视频| 窝窝影院91人妻| av天堂在线播放| 午夜福利在线观看吧| 亚洲av片天天在线观看| 久久精品国产亚洲av香蕉五月 | 国产91精品成人一区二区三区 | 亚洲国产欧美网| 国产伦理片在线播放av一区| 少妇人妻久久综合中文| 亚洲国产精品成人久久小说| 女性生殖器流出的白浆| 黑人猛操日本美女一级片| 亚洲伊人久久精品综合| 丰满迷人的少妇在线观看| 婷婷成人精品国产| 男女床上黄色一级片免费看| 最新在线观看一区二区三区| av免费在线观看网站| 老汉色av国产亚洲站长工具| 最新在线观看一区二区三区| 久久人人爽人人片av| 女人久久www免费人成看片| 久久久久国产一级毛片高清牌| 亚洲欧美精品综合一区二区三区| 亚洲精品国产精品久久久不卡| 两人在一起打扑克的视频| 国产欧美亚洲国产| 夫妻午夜视频| 国产精品影院久久| 免费人妻精品一区二区三区视频| 国产在视频线精品| 在线精品无人区一区二区三| 91麻豆av在线| 天天躁夜夜躁狠狠躁躁| 母亲3免费完整高清在线观看| 日日爽夜夜爽网站| 一区福利在线观看| 国产欧美日韩一区二区精品| 午夜激情av网站| 女人久久www免费人成看片| 男女高潮啪啪啪动态图| 国产野战对白在线观看| 欧美亚洲 丝袜 人妻 在线| 欧美性长视频在线观看| 久久天堂一区二区三区四区| 女人被躁到高潮嗷嗷叫费观| 亚洲精品久久成人aⅴ小说| 80岁老熟妇乱子伦牲交| 久久天堂一区二区三区四区| 国产一区二区三区av在线| xxxhd国产人妻xxx| 少妇裸体淫交视频免费看高清 | 国产亚洲欧美在线一区二区| 欧美日韩一级在线毛片| 秋霞在线观看毛片| 色94色欧美一区二区| 国产高清videossex| 亚洲精品国产av蜜桃| 亚洲精华国产精华精| 国产免费视频播放在线视频| 欧美激情 高清一区二区三区| 中文精品一卡2卡3卡4更新| 国产无遮挡羞羞视频在线观看| 亚洲av日韩在线播放| 国产免费一区二区三区四区乱码| 亚洲国产精品999| 久久久久国产一级毛片高清牌| 亚洲精品第二区| 亚洲中文av在线| 精品国产一区二区久久| 热re99久久国产66热| 久久精品aⅴ一区二区三区四区| 国产麻豆69| 韩国高清视频一区二区三区| 最近中文字幕2019免费版| www.精华液| 久久久国产欧美日韩av| 精品国产乱码久久久久久小说| 欧美日韩精品网址| www.999成人在线观看| 一进一出抽搐动态| 不卡一级毛片| 亚洲国产欧美一区二区综合| 美国免费a级毛片| 一个人免费在线观看的高清视频 | 五月天丁香电影| 黄片小视频在线播放| √禁漫天堂资源中文www| 日韩欧美国产一区二区入口| 美女主播在线视频| 亚洲精品国产区一区二| 精品免费久久久久久久清纯 | 欧美精品一区二区免费开放| 午夜91福利影院| 国产精品一区二区在线观看99| 大片电影免费在线观看免费| 亚洲av成人不卡在线观看播放网 | 妹子高潮喷水视频| 国产精品一区二区在线观看99| 日日摸夜夜添夜夜添小说| 99re6热这里在线精品视频| 99久久精品国产亚洲精品| 亚洲国产精品成人久久小说| 久久精品人人爽人人爽视色| 黄色怎么调成土黄色| 久久狼人影院| 操出白浆在线播放| 亚洲中文字幕日韩| 日韩人妻精品一区2区三区| 色播在线永久视频| 欧美变态另类bdsm刘玥| 少妇的丰满在线观看| 午夜免费成人在线视频| 欧美成狂野欧美在线观看| 午夜免费鲁丝| 午夜福利视频在线观看免费| 一进一出抽搐动态| 久热爱精品视频在线9| 成人亚洲精品一区在线观看| 久久久久久久精品精品| 日韩电影二区| 在线观看免费午夜福利视频| 丝袜脚勾引网站| 69av精品久久久久久 | 午夜视频精品福利| 中亚洲国语对白在线视频| 自拍欧美九色日韩亚洲蝌蚪91| 老汉色∧v一级毛片| 久久天躁狠狠躁夜夜2o2o| 欧美性长视频在线观看| 久久久久精品人妻al黑| 一本色道久久久久久精品综合| 婷婷色av中文字幕| 欧美xxⅹ黑人| 午夜激情av网站| 免费看十八禁软件| 亚洲精品国产区一区二| 中文字幕人妻熟女乱码| 好男人电影高清在线观看| 女警被强在线播放| 国产精品久久久久久精品电影小说| 91精品三级在线观看| 国产一区二区在线观看av| 日韩中文字幕欧美一区二区| 国产一区二区三区在线臀色熟女 | 又黄又粗又硬又大视频| 亚洲成人国产一区在线观看| 婷婷丁香在线五月| 自线自在国产av| 国产精品秋霞免费鲁丝片| 老司机靠b影院| 欧美亚洲 丝袜 人妻 在线| 国产日韩欧美视频二区| 国产精品 国内视频| 一二三四社区在线视频社区8| 国产高清国产精品国产三级| 午夜福利视频在线观看免费| 久久久国产成人免费| 老汉色∧v一级毛片| 青草久久国产| 999久久久精品免费观看国产| 国产精品偷伦视频观看了| 韩国高清视频一区二区三区| 美女大奶头黄色视频| 不卡av一区二区三区| 最近中文字幕2019免费版| 美国免费a级毛片| 久久人妻熟女aⅴ| 一边摸一边抽搐一进一出视频| 成人免费观看视频高清| 亚洲中文日韩欧美视频| 精品少妇黑人巨大在线播放| 女警被强在线播放| 狠狠精品人妻久久久久久综合| 如日韩欧美国产精品一区二区三区| 国产视频一区二区在线看| 欧美精品人与动牲交sv欧美| 99久久综合免费| 人人妻人人爽人人添夜夜欢视频| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲全国av大片| 久久九九热精品免费| 亚洲午夜精品一区,二区,三区| 美女脱内裤让男人舔精品视频| 国产日韩一区二区三区精品不卡| 国产主播在线观看一区二区| 一本色道久久久久久精品综合| 亚洲第一av免费看| 精品欧美一区二区三区在线| 在线观看一区二区三区激情| 黄色片一级片一级黄色片| av天堂在线播放| bbb黄色大片| 国产深夜福利视频在线观看| 日韩制服骚丝袜av| 亚洲全国av大片| 免费在线观看黄色视频的| 丝袜在线中文字幕| 亚洲天堂av无毛| 99热全是精品| 制服诱惑二区| 性色av一级| 亚洲美女黄色视频免费看| 老汉色∧v一级毛片| 欧美日韩视频精品一区| 久久久精品区二区三区| 成人黄色视频免费在线看| 欧美 日韩 精品 国产| 国产成人av教育| 乱人伦中国视频| 欧美日韩一级在线毛片| 在线亚洲精品国产二区图片欧美| 后天国语完整版免费观看| 久久久久国产精品人妻一区二区| 亚洲美女黄色视频免费看| 999精品在线视频| 亚洲人成电影免费在线| av在线app专区| 亚洲成国产人片在线观看| 亚洲成人免费av在线播放| 国产97色在线日韩免费| 国产视频一区二区在线看| 亚洲精华国产精华精| 9热在线视频观看99| 久久人妻福利社区极品人妻图片| 大片免费播放器 马上看| 精品少妇黑人巨大在线播放| 久久人人爽av亚洲精品天堂| 考比视频在线观看| 欧美中文综合在线视频| 午夜福利,免费看| 精品卡一卡二卡四卡免费| 纵有疾风起免费观看全集完整版| 手机成人av网站| 一级,二级,三级黄色视频| 97人妻天天添夜夜摸| 国产一区二区三区av在线| 好男人电影高清在线观看| 老司机午夜十八禁免费视频| 亚洲av成人不卡在线观看播放网 | 每晚都被弄得嗷嗷叫到高潮| 黄色片一级片一级黄色片| 一个人免费看片子| 亚洲国产中文字幕在线视频| av欧美777| 搡老乐熟女国产| 深夜精品福利| 热re99久久国产66热| 欧美xxⅹ黑人| 一级黄色大片毛片| 久9热在线精品视频| 韩国精品一区二区三区| 国产精品亚洲av一区麻豆| 国产av一区二区精品久久| 高潮久久久久久久久久久不卡| 19禁男女啪啪无遮挡网站| 精品国产国语对白av| 69av精品久久久久久 | 日韩欧美国产一区二区入口| 成年女人毛片免费观看观看9 | 成人三级做爰电影| 亚洲第一青青草原| 91精品伊人久久大香线蕉| 成年美女黄网站色视频大全免费| 少妇 在线观看| 制服诱惑二区| 波多野结衣av一区二区av| 窝窝影院91人妻| 最新的欧美精品一区二区| 国产在线观看jvid| 窝窝影院91人妻| 国产成人影院久久av| 国产一区有黄有色的免费视频| 免费一级毛片在线播放高清视频 | av一本久久久久| 久久人妻熟女aⅴ| 好男人电影高清在线观看| 9色porny在线观看| 伊人亚洲综合成人网| 日本91视频免费播放|