神隐是什么意思| 足跟血筛查什么疾病| 12320是什么电话| 睡着了流口水是什么原因| 除是什么意思| 11月10号是什么星座| 什么是rpa| 2023年是什么生肖年| 双歧杆菌三联和四联有什么区别| 外周动脉僵硬度增高什么意思| 头部麻木是什么征兆| 11月7号是什么星座| 悄悄的什么| 唯我独尊指什么生肖| 白色配什么颜色好看| 刚怀孕需要注意什么| 神经根型颈椎病吃什么药| 九零年属什么生肖| 什么经验| 绝倒是什么意思| 黑代表什么生肖| 觉得什么| 扁桃体发炎什么症状| 什么样的镜子| 甘油三酯高吃什么好| 门道是什么意思| 孩子不长个子是什么原因| 佛法无边是什么生肖| 什么补气血| 法国鳄鱼属于什么档次| 鸩是什么意思| 正军级是什么级别| 植物神经紊乱看什么科| 顺其自然是什么意思| 抗锯齿是什么意思| 斯密达什么意思| 消化不良吃什么水果| 邪气是什么意思| 从商是什么意思| 先兆性流产是什么症状| 长发公主叫什么名字| 乙肝五项第二项阳性是什么意思| 清真是什么意思啊| 抑扬顿挫什么意思| 大牛是什么意思| 7月15日是什么日子| 大面积杀跳蚤用什么药| 冷冻跟冷藏有什么区别| 什么是湿疹| 凤凰单丛茶属于什么茶| 屋后有坟有什么影响吗| ct值是什么意思| 阴虚吃什么食补最快| 钙是什么| 棋逢对手下一句是什么| 不什么其烦| 外阴起红点是什么病| 马跟什么生肖最配| 什么是甲减有什么症状| 身心交瘁什么意思| 腹水是什么原因引起的| 宫颈囊肿是什么| 癸水的根是什么| 拖油瓶是什么意思| 脑袋疼挂什么科| 黄疸高吃什么药| 吃什么水果可以降火| 什么车最长脑筋急转弯| 脚筋膜炎什么办法恢复的最快| 胆怯是什么意思| 男人长阴虱是什么原因| 生物科学是什么专业| rush什么意思| 臻字五行属什么的| 桂枝茯苓丸主治什么病| 什么叫腺肌瘤| 身体怕热是什么原因| 脑白质脱髓鞘吃什么药| mandy英文名什么意思| 前列腺液和精液有什么区别| 梦见锁门是什么意思| 无欲无求是什么意思| 医保定点医院是什么意思| 吃什么有助睡眠| bottle什么意思| 1月3号什么星座| 什么什么不动| 老人吃什么水果对身体好| 为什么英文怎么写| 妇科假丝酵母菌是什么病| 赫五行属性是什么| 罹患是什么意思| 照顾是什么意思| 摆子是什么意思| 蚕吃什么| 太平间是什么意思| acs是什么| 瑾字属于五行属什么| 落叶像什么| 咳嗽两个月了一直不好是什么原因| v店是什么| 劓刑是什么意思| 九头身什么意思| 孕妇吃什么菜| cheese什么意思| 缺钾是什么症状| 皮肤瘙痒用什么药好| 飞机上不能带什么东西| 刘晓庆为什么坐牢| 精神病的前兆是什么| 一直流鼻血是什么原因| 湿疹用什么药膏| 夹生是什么意思| 12月18是什么星座| 分泌物呈褐色是什么原因| 三部曲是什么意思| 乳房疼挂什么科室| 梦见自己光脚走路是什么意思| 蜻蜓点水是什么行为| 苹果越狱是什么意思啊| 梦见好多老鼠是什么意思| 什么宽带网速快又便宜| 7月29日什么星座| 胸腰椎退行性变是什么意思| 三个为什么| 热玛吉是什么| bmi指数是什么意思| 胃镜预约挂什么科| 肆无忌惮的意思是什么| 猴赛雷什么意思| 多吃香蕉有什么好处和坏处| 血管瘤是什么症状| 什么是地震| 辣椒蟹吃什么| 啐是什么意思| 做梦梦到屎什么意思| dmd是什么病| 眉毛痒是什么原因| 孕妇吃什么长胎不长肉| 脑供血不足是什么原因| 鲜为人知什么意思| ecc是检查什么的| 摄取是什么意思| 肚脐眼大代表什么| 手发胀是什么原因造成的| 这个故事告诉我们什么道理| 康熙的儿子叫什么| 活检是什么检查| 明鉴是什么意思| 手掌上的三条线分别代表什么| 寂寞什么意思| 海带和什么菜搭配好吃| 舌炎吃什么药好得快| 什么什么的荷叶| 睾酮是什么| 什么是黄体期| oof是什么意思| 人参果长什么样| 老年斑是什么原因引起的| 寓言故事有什么特点| 什么叫执行力| 有肾病的人吃什么好| 阑尾炎手术后吃什么好| 黑乎乎的什么| 小孩打喷嚏流鼻涕吃什么药| 月经突然提前一周是什么原因| 左小腹疼是什么原因| 什么叫熬夜| 什么齿| 鱼油什么牌子好| 耳语是什么意思| 剖腹产第三天可以吃什么| 夜间盗汗是什么原因| 公积金缴存基数是什么| 遇上方知有什么意思| lsa是什么胎位| 腹腔积水是什么原因造成的| 7月16号是什么星座| 欲购从速什么意思| 木丑念什么| 窦性心动过缓是什么病| 瞑眩反应是什么意思| 呕气是什么意思| 弊是什么意思| 牙痛吃什么药| 休止期脱发什么意思| 呃逆什么意思| 什么鱼不会游泳| 梦见水是什么预兆| 突然流鼻血是什么原因| 什么姓氏排第一| 减持是什么意思| 两肺纹理增多是什么意思| 土地确权是什么意思| 灰指甲是什么| 脑鸣吃什么药| 减肥医院挂什么科| 忽冷忽热是什么症状| butterfly是什么意思| 月经不调去医院要做什么检查| 为什么受伤总是我| 处变不惊是什么意思| 妥了是什么意思| 白领是什么职业| 梦见朋友死了是什么意思| 考护士资格证需要什么条件| 牛肉用什么炒好吃| 尿道结石有什么症状| cashmere是什么面料| 沉鱼落雁闭月羞花什么意思| 梦见衣服是什么意思| 咽喉肿痛吃什么药好| hbv是什么意思| 吃什么补营养最快| 山药什么季节成熟| 为什么缺钾| 广州为什么叫羊城| 胆结石什么原因引起的| 百草霜是什么| 什么是导管| 排骨炖什么好吃又有营养| 吃胡萝卜有什么好处| 月经来了有血块是什么原因| 第一次世界大战是什么时候| tid什么意思| 胆固醇低是什么原因| 小气是什么意思| 孩子发烧吃什么饭菜好| 前列腺炎有什么症状| 空气净化器有什么作用| 脑肿瘤有什么症状| 淋巴结吃什么药| 嘴唇发黑是什么原因| 贫血是什么原因导致的| 鱼加完念什么| 8月15号是什么日子| 小白加小白等于什么| 发热门诊属于什么科| 咽炎有什么症状| 白狗子是什么意思| tfboys什么意思| 针对是什么意思| 如来藏是什么意思| 无名指是什么经络| 亚麻籽油和胡麻油有什么区别| 脆鱼是什么鱼| 鲍温病是什么病| 单身贵族什么意思| 上眼皮突然肿了是什么原因| 摆渡人是什么意思| 孕妇喝什么牛奶| 走路出汗多是什么原因| 心脏房颤是什么原因| 五音是什么| 男性吃什么生精快| 痰多是什么原因引起的| 阴道感染用什么药| 英特纳雄耐尔是什么意思| 不昧因果是什么意思| 撤退性出血什么意思| 农历4月是什么月| 针灸有什么作用| 北京大裤衩建筑叫什么| 梦到挖坟墓是什么意思| 百度Jump to content

卡瓦尼建功马图伊迪双响+绝杀,巴黎客场3-2梅斯

From Wikipedia, the free encyclopedia
百度 管好“身边人”,筑牢“节日防腐墙”,过好廉洁自律的“廉”关,过一个廉洁、节俭、文明、祥和的春节。

Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as a type of post-quantum cryptography.

So far, hash-based cryptography is used to construct digital signatures schemes such as the Merkle signature scheme, zero knowledge and computationally integrity proofs, such as the zk-STARK[1] proof system and range proofs over issued credentials via the HashWires[2] protocol. Hash-based signature schemes combine a one-time signature scheme, such as a Lamport signature, with a Merkle tree structure. Since a one-time signature scheme key can only sign a single message securely, it is practical to combine many such keys within a single, larger structure. A Merkle tree structure is used to this end. In this hierarchical data structure, a hash function and concatenation are used repeatedly to compute tree nodes.

One consideration with hash-based signature schemes is that they can only sign a limited number of messages securely, because of their use of one-time signature schemes. The US National Institute of Standards and Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 264 signatures safely.[3]

NIST standardized stateful hash-based cryptography based on the eXtended Merkle Signature Scheme (XMSS) and Leighton–Micali Signatures (LMS),[4] which are applicable in different circumstances, in 2020, but noted that the requirement to maintain state when using them makes them more difficult to implement in a way that avoids misuse.[5][6][7]

In 2022, NIST announced SPHINCS+ as one of three algorithms to be standardized for digital signatures.[8] and in 2024 NIST announced the Stateless Hash-Based Digital Signature Standard (SLH-DSA)[9] based on SPHINCS+.

History

[edit]

Leslie Lamport invented hash-based signatures in 1979. The XMSS (eXtended Merkle Signature Scheme)[10] and SPHINCS[11][12] hash-based signature schemes were introduced in 2011 and 2015, respectively. XMSS was developed by a team of researchers under the direction of Johannes Buchmann and is based both on Merkle's seminal scheme and on the 2007 Generalized Merkle Signature Scheme (GMSS).[13] A multi-tree variant of XMSS, XMSSMT, was described in 2013.[14]

One-time signature schemes

[edit]

Hash-based signature schemes use one-time signature schemes as their building block. A given one-time signing key can only be used to sign a single message securely. Indeed, signatures reveal part of the signing key. The security of (hash-based) one-time signature schemes relies exclusively on the security of an underlying hash function.

Commonly used one-time signature schemes include the Lamport–Diffie scheme, the Winternitz scheme[15] and its improvements, such as the W-OTS+ scheme.[16] Unlike the seminal Lamport–Diffie scheme, the Winternitz scheme and variants can sign many bits at once. The number of bits to be signed at once is determined by a value: the Winternitz parameter. The existence of this parameter provides a trade-off between size and speed. Large values of the Winternitz parameter yield short signatures and keys, at the price of slower signing and verifying. In practice, a typical value for this parameter is 16.

In the case of stateless hash-based signatures, few-time signature schemes are used. Such schemes allow security to decrease gradually in case a few-time key is used more than once. HORST is an example of a few-time signature scheme.

Combining many one-time key pairs into a hash-based signature scheme

[edit]

The central idea of hash-based signature schemes is to combine a larger number of one-time key pairs into a single structure to obtain a practical way of signing more than once (yet a limited number of times). This is done using a Merkle tree structure, with possible variations. One public and one private key are constructed from the numerous public and private keys of the underlying one-time scheme. The global public key is the single node at the very top of the Merkle tree. Its value is an output of the selected hash function, so a typical public key size is 32 bytes. The validity of this global public key is related to the validity of a given one-time public key using a sequence of tree nodes. This sequence is called the authentication path. It is stored as part of the signature, and allows a verifier to reconstruct the node path between those two public keys.

The global private key is generally handled using a pseudo-random number generator. It is then sufficient to store a seed value. One-time secret keys are derived successively from the seed value using the generator. With this approach, the global private key is also very small, e.g. typically 32 bytes.

The problem of tree traversal is critical to signing performance. Increasingly efficient approaches have been introduced, dramatically speeding up signing time.

Some hash-based signature schemes use multiple layers of tree, offering faster signing at the price of larger signatures. In such schemes, only the lowest layer of trees is used to sign messages, while all other trees sign root values of lower trees.

The Naor–Yung work[17] shows the pattern by which to transfer a limited time signature of the Merkle type family into an unlimited (regular) signature scheme.

Properties of hash-based signature schemes

[edit]

Hash-based signature schemes rely on security assumptions about the underlying hash function, but any hash function fulfilling these assumptions can be used. As a consequence, each adequate hash function yields a different corresponding hash-based signature scheme. Even if a given hash function becomes insecure, it is sufficient to replace it by a different, secure one to obtain a secure instantiation of the hash-based signature scheme under consideration. Some hash-based signature schemes (such as XMSS with pseudorandom key generation) are forward secure, meaning that previous signatures remain valid if a secret key is compromised.

The minimality of security assumptions is another characteristic of hash-based signature schemes. Generally, these schemes only require a secure (for instance in the sense of second preimage resistance) cryptographic hash function to guarantee the overall security of the scheme. This kind of assumption is necessary for any digital signature scheme; however, other signature schemes require additional security assumptions, which is not the case here.

Because of their reliance on an underlying one-time signature scheme, hash-based signature schemes can only sign a fixed number of messages securely. In the case of the Merkle and XMSS schemes, a maximum of messages can be signed securely, with the total Merkle tree height.

Examples of hash-based signature schemes

[edit]

Since Merkle's initial scheme, numerous hash-based signature schemes with performance improvements have been introduced. Recent ones include the XMSS, the Leighton–Micali (LMS), the SPHINCS and the BPQS schemes. Most hash-based signature schemes are stateful, meaning that signing requires updating the secret key, unlike conventional digital signature schemes. For stateful hash-based signature schemes, signing requires keeping state of the used one-time keys and making sure they are never reused. The XMSS, LMS and BPQS[18] schemes are stateful, while the SPHINCS scheme is stateless. SPHINCS signatures are larger than XMSS and LMS signatures. BPQS has been designed specifically for blockchain systems. Additionally to the WOTS+ one-time signature scheme,[16] SPHINCS also uses a few-time (hash-based) signature scheme called HORST. HORST is an improvement of an older few-time signature scheme, HORS (Hash to Obtain Random Subset).[19]

The stateful hash-based schemes XMSS and XMSSMT are specified in RFC 8391 (XMSS: eXtended Merkle Signature Scheme).[20] Leighton–Micali Hash-Based Signatures are specified in RFC 8554.[4] Practical improvements have been proposed in the literature that alleviate the concerns introduced by stateful schemes.[21] Hash functions appropriate for these schemes include SHA-2, SHA-3 and BLAKE.

The stateless hash-based scheme SLH-DSA is specified in FIPS-205.

Implementations

[edit]

The XMSS, GMSS and SPHINCS schemes are available in the Java Bouncy Castle cryptographic APIs.[22] LMS[23] and XMSS schemes are available in the wolfSSL cryptographic APIs.[24] SPHINCS is implemented in the SUPERCOP benchmarking toolkit.[25] Optimised[26] and unoptimised[27] reference implementations of the XMSS RFC exist. The LMS scheme has been implemented in Python[28] and in C[29] following its Internet-Draft.

References

[edit]
  1. ^ Ben-Sasson, Eli and Bentov, Iddo and Horesh, Yinon and Riabzev, Michael, 2018. Scalable, transparent, and post-quantum secure computational integrity.
  2. ^ Chalkias, Konstantinos; Cohen, Shir; Lewi, Kevin; Moezinia, Fredric; Romailler, Yolan (2021). "HashWires: Hyperefficient Credential-Based Range Proofs". Privacy Enhancing Technologies Symposium (PETS) 2021.
  3. ^ "Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process" (PDF). NIST CSRC.
  4. ^ a b McGrew, David; Curcio, Michael; Fluhrer, Scott (April 2019). "RFC 8554 – Leighton–Micali Hash-Based Signatures". tools.ietf.org. IETF.
  5. ^ Computer Security Division, Information Technology Laboratory (2025-08-06). "Request for Public Comments on Stateful HBS | CSRC". CSRC | NIST. Retrieved 2025-08-06.
  6. ^ Alagic, Gorjan; Apon, Daniel; Cooper, David; Dang, Quynh; Dang, Thinh; Kelsey, John; Lichtinger, Jacob; Miller, Carl; Moody, Dustin; Peralta, Rene; Perlner, Ray (2025-08-06). "Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process". NIST Ir 8413. doi:10.6028/NIST.IR.8413-upd1.
  7. ^ Cooper, David; Apon, Daniel; Dang, Quynh; Davidson, Michael; Dworkin, Morris; Miller, Carl (2025-08-06). "Recommendation for Stateful Hash-Based Signature Schemes". NIST Special Publication 800-208. doi:10.6028/NIST.SP.800-208.
  8. ^ "NIST announces four quantum-resistant algorithms". VentureBeat. 2025-08-06. Retrieved 2025-08-06.
  9. ^ "Stateless Hash-Based Digital Signature Standard" (PDF). NIST.gov. August 2024. doi:10.6028/NIST.FIPS.205.
  10. ^ Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas (2011). "XMSS – A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 7071. pp. 117–129. CiteSeerX 10.1.1.400.6086. doi:10.1007/978-3-642-25405-5_8. ISBN 978-3-642-25404-8. ISSN 0302-9743.
  11. ^ Bernstein, Daniel J.; Hopwood, Daira; Hülsing, Andreas; Lange, Tanja; Niederhagen, Ruben; Papachristodoulou, Louiza; Schneider, Michael; Schwabe, Peter; Wilcox-O’Hearn, Zooko (2015). "SPHINCS: Practical Stateless Hash-Based Signatures". In Oswald, Elisabeth; Fischlin, Marc (eds.). Advances in Cryptology -- EUROCRYPT 2015. Lecture Notes in Computer Science. Vol. 9056. Springer Berlin Heidelberg. pp. 368–397. CiteSeerX 10.1.1.690.6403. doi:10.1007/978-3-662-46800-5_15. ISBN 9783662467992.
  12. ^ "SPHINCS:Introduction".
  13. ^ Buchmann, Johannes; Dahmen, Erik; Klintsevich, Elena; Okeya, Katsuyuki; Vuillaume, Camille (2007). "Merkle Signatures with Virtually Unlimited Signature Capacity". Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 4521. pp. 31–45. doi:10.1007/978-3-540-72738-5_3. ISBN 978-3-540-72737-8.
  14. ^ Hülsing, Andreas; Rausch, Lea; Buchmann, Johannes (2013). "Optimal Parameters for XMSS MT". Security Engineering and Intelligence Informatics. Lecture Notes in Computer Science. Vol. 8128. pp. 194–208. doi:10.1007/978-3-642-40588-4_14. ISBN 978-3-642-40587-7.
  15. ^ Dods, C.; Smart, N. P.; Stam, M. (2005). "Hash Based Digital Signature Schemes". Cryptography and Coding. Lecture Notes in Computer Science. Vol. 3796. pp. 96–115. doi:10.1007/11586821_8. ISBN 978-3-540-30276-6.
  16. ^ a b Hülsing, Andreas (2013). "W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes". Progress in Cryptology – AFRICACRYPT 2013. Lecture Notes in Computer Science. Vol. 7918. pp. 173–188. doi:10.1007/978-3-642-38553-7_10. ISBN 978-3-642-38552-0.
  17. ^ M. Naor, M. Yung. "Universal One-Way Hash Functions and their Cryptographic Applications". STOC 1989. [1].
  18. ^ Chalkias, Konstantinos; Brown, James; Hearn, Mike; Lillehagen, Tommy; Nitto, Igor; Schroeter, Thomas (2018). "Blockchained Post-Quantum Signatures" (PDF). Proceedings of the IEEE International Conference on Blockchain (Cybermatics-2018): 1196–1203.
  19. ^ Reyzin, Leonid; Reyzin, Natan (2002). "Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying". Information Security and Privacy. Lecture Notes in Computer Science. Vol. 2384. pp. 144–153. CiteSeerX 10.1.1.24.7320. doi:10.1007/3-540-45450-0_11. ISBN 978-3-540-43861-8.
  20. ^ Hülsing, Andreas; Butin, Denis; Gazdag, Stefan; Rijneveld, Joost; Mohaisen, Aziz (May 2018). "RFC 8391 – XMSS: eXtended Merkle Signature Scheme". tools.ietf.org. IETF.
  21. ^ McGrew, David; Kampanakis, Panos; Fluhrer, Scott; Gazdag, Stefan-Lukas; Butin, Denis; Buchmann, Johannes (2016). "State Management for Hash-Based Signatures" (PDF). Security Standardisation Research. Lecture Notes in Computer Science. Vol. 10074. pp. 244–260. doi:10.1007/978-3-319-49100-4_11. ISBN 978-3-319-49099-1. S2CID 809073. Archived from the original (PDF) on 2025-08-06.
  22. ^ "bcgit/bc-java". GitHub. 2025-08-06.
  23. ^ "wolfCrypt implementations of LMS/HSS and XMSS/XMSS^MT signatures: build options and benchmarks (Intel x86)". wolfSSL. 2025-08-06.
  24. ^ "wolfSSL/wolfssl". GitHub. 2025-08-06.
  25. ^ "SUPERCOP". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  26. ^ "Code". Andreas Hülsing. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  27. ^ "squareUP > Publications". www.pqsignatures.org.
  28. ^ David, McGrew (2025-08-06). "The hash-sigs package: an implementation of the Leighton–Micali Hierarchical Signature System (HSS)". GitHub.
  29. ^ David, McGrew (2025-08-06). "A full-featured implementation of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07". GitHub.
  • T. Lange. "Hash-Based Signatures". Encyclopedia of Cryptography and Security, Springer U.S., 2011. [2]
  • F. T. Leighton, S. Micali. "Large provably fast and secure digital signature schemes based one secure hash functions". US Patent 5,432,852, [3] 1995.
  • G. Becker. "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis", seminar 'Post Quantum Cryptology' at the Ruhr-University Bochum, Germany, 2008. [4]
  • E. Dahmen, M. Dring, E. Klintsevich, J. Buchmann, L. C. Coronado Garcia. "CMSS — An Improved Merkle Signature Scheme". Progress in Cryptology – Indocrypt 2006. [5]
  • R. Merkle. "Secrecy, authentication and public key systems / A certified digital signature". Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979. [6] Archived 2025-08-06 at the Wayback Machine
  • S. Micali, M. Jakobsson, T. Leighton, M. Szydlo. "Fractal Merkle Tree Representation and Traversal". RSA-CT 03. [7]
  • P. Kampanakis, S. Fluhrer. "LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards". Cryptology ePrint Archive, Report 2017/349. [8]
  • D. Naor, A. Shenhav, A. Wool. "One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal". IEEE 24th Convention of Electrical and Electronics Engineers in Israel, 2006. [9] Archived 2025-08-06 at the Wayback Machine
[edit]
  • [10] A commented list of literature about hash-based signature schemes.
  • [11] Another list of references (uncommented).
英语八级是什么水平 越吃越瘦是什么原因 检查怀没怀孕挂什么科 国手什么意思 蛋蛋疼是什么原因
喝红酒对身体有什么好处 儿童风热感冒吃什么药 1988属什么生肖 户口分户需要什么条件 照见五蕴皆空什么意思
戴尾戒是什么意思 不到长城非好汉的下一句是什么 夜尿频多吃什么药效果好 地板砖什么颜色好看 为什么不愿意工作
什么叫玄学 手脚发烫是什么原因造成的 67年的羊是什么命 月黑见渔灯的见读什么 土霉素喂鸡有什么作用
什么叫甲亢病hcv7jop6ns0r.cn 九零年属什么生肖hcv9jop5ns5r.cn 抗体是指什么hcv9jop0ns7r.cn 石敢当是什么意思inbungee.com 2008年属什么生肖hcv9jop6ns6r.cn
二胎政策什么时候开放的hcv8jop7ns6r.cn 入殓师是干什么的hcv9jop8ns0r.cn 阿尔兹海默症是什么病hcv7jop9ns3r.cn 衤字旁的字与什么有关hcv8jop6ns8r.cn 富翁是什么意思hcv8jop1ns3r.cn
苦不堪言是什么意思hcv7jop9ns8r.cn 四月四号什么星座clwhiglsz.com 脚气真菌感染用什么药hcv9jop0ns8r.cn anker是什么牌子hcv7jop4ns8r.cn yearcon是什么牌子hcv8jop0ns8r.cn
中秋节什么时候hcv8jop5ns4r.cn 什么茶可以降血压hcv9jop3ns8r.cn 汪星人什么意思hcv8jop8ns3r.cn 为什么老是流鼻血hcv9jop1ns3r.cn 扬代表什么生肖hcv8jop8ns5r.cn
百度