TSTP Solution File: SWW960+1 by iProver---3.9
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : iProver---3.9
% Problem : SWW960+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_iprover %s %d THM
% Computer : n026.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Fri May 3 03:26:56 EDT 2024
% Result : Theorem 7.53s 1.62s
% Output : CNFRefutation 7.53s
% Verified :
% SZS Type : ERROR: Analysing output (Could not find formula named definition)
% Comments :
%------------------------------------------------------------------------------
fof(f54,axiom,
name_A != name_objective,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax53) ).
fof(f60,axiom,
name_B != name_objective,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax59) ).
fof(f79,axiom,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).
fof(f81,axiom,
! [X4,X5] : constr_getmess(constr_sign(X5,X4)) = X5,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).
fof(f82,axiom,
! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).
fof(f83,axiom,
! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).
fof(f84,axiom,
! [X10,X11] : constr_tuple_2_get_0x30_bitstring(tuple_2(X10,X11)) = X10,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax83) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f94,axiom,
! [X24] :
( pred_attacker(X24)
=> pred_attacker(constr_pkey(X24)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax93) ).
fof(f98,axiom,
! [X28] :
( pred_attacker(tuple_out_2(X28))
=> pred_attacker(X28) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).
fof(f102,axiom,
! [X32] :
( pred_attacker(tuple_key_retrieval_server_out_2(X32))
=> pred_attacker(X32) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax101) ).
fof(f103,axiom,
! [X33,X34] :
( ( pred_attacker(X34)
& pred_attacker(X33) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).
fof(f106,axiom,
! [X39,X40] :
( ( pred_attacker(X40)
& pred_attacker(X39) )
=> pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).
fof(f109,axiom,
! [X45] :
( pred_attacker(X45)
=> pred_attacker(constr_getmess(X45)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax108) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f116,axiom,
! [X53] :
( pred_attacker(tuple_client_B_out_4(X53))
=> pred_attacker(X53) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax115) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).
fof(f127,axiom,
! [X67] :
( pred_attacker(tuple_client_A_out_5(X67))
=> pred_attacker(X67) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).
fof(f133,axiom,
! [X76] :
( pred_attacker(X76)
=> pred_attacker(tuple_client_A_in_4(X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax132) ).
fof(f135,axiom,
! [X78] :
( pred_attacker(X78)
=> pred_attacker(tuple_client_A_in_2(X78)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).
fof(f138,axiom,
! [X82,X83] :
( ( pred_attacker(X83)
& pred_attacker(X82) )
=> pred_attacker(constr_aenc(X82,X83)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax137) ).
fof(f139,axiom,
! [X84,X85] :
( ( pred_attacker(X85)
& pred_attacker(X84) )
=> pred_attacker(constr_adec(X84,X85)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).
fof(f145,axiom,
! [X86,X87] :
( ( pred_attacker(X87)
& pred_attacker(X86) )
=> pred_attacker(tuple_2(X86,X87)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax144) ).
fof(f153,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).
fof(f156,axiom,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax155) ).
fof(f159,axiom,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).
fof(f163,axiom,
! [X100,X101,X102] :
( ( pred_attacker(tuple_client_A_in_2(X102))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X101))
& pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax162) ).
fof(f165,axiom,
! [X103,X104,X105] :
( ( pred_attacker(tuple_client_B_in_2(X105))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X104))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax164) ).
fof(f166,axiom,
! [X106,X107,X108,X109] :
( ( pred_attacker(tuple_client_B_in_2(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).
fof(f167,axiom,
! [X110,X111,X112] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
& pred_table(tuple_keys(X110,X111)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax166) ).
fof(f168,axiom,
! [X113,X114] :
( ( pred_attacker(tuple_key_register_server_in_1(X113,X114))
& name_A != X113
& name_B != X113 )
=> pred_table(tuple_keys(X113,X114)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).
fof(f169,conjecture,
! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f170,negated_conjecture,
~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
inference(negated_conjecture,[],[f169]) ).
fof(f172,plain,
! [X0,X1] : constr_getmess(constr_sign(X1,X0)) = X1,
inference(rectify,[],[f81]) ).
fof(f173,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f82]) ).
fof(f174,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f83]) ).
fof(f175,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(rectify,[],[f84]) ).
fof(f178,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f184,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f94]) ).
fof(f188,plain,
! [X0] :
( pred_attacker(tuple_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f98]) ).
fof(f192,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f102]) ).
fof(f193,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f103]) ).
fof(f196,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f106]) ).
fof(f199,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_getmess(X0)) ),
inference(rectify,[],[f109]) ).
fof(f203,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f205,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f116]) ).
fof(f209,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f211,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f213,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f216,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_5(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f127]) ).
fof(f222,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f133]) ).
fof(f224,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f135]) ).
fof(f227,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_aenc(X0,X1)) ),
inference(rectify,[],[f138]) ).
fof(f228,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_adec(X0,X1)) ),
inference(rectify,[],[f139]) ).
fof(f229,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f145]) ).
fof(f237,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X1))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f163]) ).
fof(f238,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f165]) ).
fof(f239,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f240,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f167]) ).
fof(f241,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f168]) ).
fof(f242,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f170]) ).
fof(f250,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f184]) ).
fof(f254,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_out_2(X0)) ),
inference(ennf_transformation,[],[f188]) ).
fof(f258,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f192]) ).
fof(f259,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f193]) ).
fof(f260,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f259]) ).
fof(f263,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f196]) ).
fof(f264,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f263]) ).
fof(f267,plain,
! [X0] :
( pred_attacker(constr_getmess(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f199]) ).
fof(f273,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f203]) ).
fof(f275,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f205]) ).
fof(f280,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f209]) ).
fof(f282,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f211]) ).
fof(f284,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f213]) ).
fof(f287,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(ennf_transformation,[],[f216]) ).
fof(f294,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f222]) ).
fof(f296,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f224]) ).
fof(f300,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f227]) ).
fof(f301,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f300]) ).
fof(f302,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f228]) ).
fof(f303,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f302]) ).
fof(f304,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f229]) ).
fof(f305,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f304]) ).
fof(f314,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(ennf_transformation,[],[f237]) ).
fof(f315,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(flattening,[],[f314]) ).
fof(f316,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(ennf_transformation,[],[f238]) ).
fof(f317,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(flattening,[],[f316]) ).
fof(f318,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(ennf_transformation,[],[f239]) ).
fof(f319,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(flattening,[],[f318]) ).
fof(f320,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f240]) ).
fof(f321,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f320]) ).
fof(f322,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f241]) ).
fof(f323,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f322]) ).
fof(f324,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f242]) ).
fof(f325,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f326,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f324,f325]) ).
fof(f380,plain,
name_A != name_objective,
inference(cnf_transformation,[],[f54]) ).
fof(f386,plain,
name_B != name_objective,
inference(cnf_transformation,[],[f60]) ).
fof(f405,plain,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f79]) ).
fof(f407,plain,
! [X0,X1] : constr_getmess(constr_sign(X1,X0)) = X1,
inference(cnf_transformation,[],[f172]) ).
fof(f408,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f173]) ).
fof(f409,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f174]) ).
fof(f410,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f175]) ).
fof(f413,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f178]) ).
fof(f420,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f250]) ).
fof(f424,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_out_2(X0)) ),
inference(cnf_transformation,[],[f254]) ).
fof(f428,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(cnf_transformation,[],[f258]) ).
fof(f429,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f260]) ).
fof(f432,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f264]) ).
fof(f435,plain,
! [X0] :
( pred_attacker(constr_getmess(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f267]) ).
fof(f440,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(cnf_transformation,[],[f273]) ).
fof(f442,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(cnf_transformation,[],[f275]) ).
fof(f446,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f280]) ).
fof(f448,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f282]) ).
fof(f450,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f284]) ).
fof(f453,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(cnf_transformation,[],[f287]) ).
fof(f459,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f294]) ).
fof(f461,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f296]) ).
fof(f464,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f301]) ).
fof(f465,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f303]) ).
fof(f471,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f305]) ).
fof(f479,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f153]) ).
fof(f481,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f156]) ).
fof(f484,plain,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
inference(cnf_transformation,[],[f159]) ).
fof(f488,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(cnf_transformation,[],[f315]) ).
fof(f490,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(cnf_transformation,[],[f317]) ).
fof(f491,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(cnf_transformation,[],[f319]) ).
fof(f492,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f321]) ).
fof(f493,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(cnf_transformation,[],[f323]) ).
fof(f494,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f326]) ).
cnf(c_102,plain,
name_A != name_objective,
inference(cnf_transformation,[],[f380]) ).
cnf(c_108,plain,
name_B != name_objective,
inference(cnf_transformation,[],[f386]) ).
cnf(c_127,plain,
constr_adec(constr_aenc(X0,constr_pkey(X1)),X1) = X0,
inference(cnf_transformation,[],[f405]) ).
cnf(c_129,plain,
constr_getmess(constr_sign(X0,X1)) = X0,
inference(cnf_transformation,[],[f407]) ).
cnf(c_130,plain,
constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(cnf_transformation,[],[f408]) ).
cnf(c_131,plain,
constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f409]) ).
cnf(c_132,plain,
constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f410]) ).
cnf(c_135,plain,
pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f413]) ).
cnf(c_142,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_pkey(X0)) ),
inference(cnf_transformation,[],[f420]) ).
cnf(c_146,plain,
( ~ pred_attacker(tuple_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f424]) ).
cnf(c_150,plain,
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f428]) ).
cnf(c_151,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(cnf_transformation,[],[f429]) ).
cnf(c_154,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
inference(cnf_transformation,[],[f432]) ).
cnf(c_157,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_getmess(X0)) ),
inference(cnf_transformation,[],[f435]) ).
cnf(c_162,plain,
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f440]) ).
cnf(c_164,plain,
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f442]) ).
cnf(c_168,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_5(X0)) ),
inference(cnf_transformation,[],[f446]) ).
cnf(c_170,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(cnf_transformation,[],[f448]) ).
cnf(c_172,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(cnf_transformation,[],[f450]) ).
cnf(c_175,plain,
( ~ pred_attacker(tuple_client_A_out_5(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f453]) ).
cnf(c_181,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(cnf_transformation,[],[f459]) ).
cnf(c_183,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(cnf_transformation,[],[f461]) ).
cnf(c_186,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(X1,X0)) ),
inference(cnf_transformation,[],[f464]) ).
cnf(c_187,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_adec(X1,X0)) ),
inference(cnf_transformation,[],[f465]) ).
cnf(c_193,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(X1,X0)) ),
inference(cnf_transformation,[],[f471]) ).
cnf(c_201,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f479]) ).
cnf(c_203,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f481]) ).
cnf(c_206,plain,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
inference(cnf_transformation,[],[f484]) ).
cnf(c_210,plain,
( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA)))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f488]) ).
cnf(c_212,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f490]) ).
cnf(c_213,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(cnf_transformation,[],[f491]) ).
cnf(c_214,plain,
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_table(tuple_keys(X1,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
inference(cnf_transformation,[],[f492]) ).
cnf(c_215,plain,
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| X0 = name_A
| X0 = name_B
| pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f493]) ).
cnf(c_216,negated_conjecture,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f494]) ).
cnf(c_224,plain,
( ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_in_3(name_A)) ),
inference(instantiation,[status(thm)],[c_170]) ).
cnf(c_225,plain,
( ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_in_5(name_A)) ),
inference(instantiation,[status(thm)],[c_168]) ).
cnf(c_233,plain,
( ~ pred_attacker(name_A)
| pred_attacker(constr_pkey(name_A)) ),
inference(instantiation,[status(thm)],[c_142]) ).
cnf(c_298,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(prop_impl_just,[status(thm)],[c_172]) ).
cnf(c_589,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_212,c_298]) ).
cnf(c_590,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(bin_hyper_res,[status(thm)],[c_213,c_298]) ).
cnf(c_619,plain,
( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_210,c_135]) ).
cnf(c_620,plain,
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_589,c_135]) ).
cnf(c_621,plain,
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(backward_subsumption_resolution,[status(thm)],[c_590,c_135]) ).
cnf(c_1084,plain,
( ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_619,c_135]) ).
cnf(c_1099,plain,
( ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_620,c_135]) ).
cnf(c_1116,plain,
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X2)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_621,c_135,c_135]) ).
cnf(c_1117,plain,
( ~ pred_attacker(tuple_client_B_in_5(name_A))
| ~ pred_attacker(tuple_client_B_in_3(name_A))
| ~ pred_attacker(name_A)
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(instantiation,[status(thm)],[c_1116]) ).
cnf(c_1118,plain,
pred_attacker(tuple_client_B_out_6(name_objective)),
inference(global_subsumption_just,[status(thm)],[c_1116,c_201,c_224,c_225,c_1117]) ).
cnf(c_1513,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(prop_impl_just,[status(thm)],[c_170]) ).
cnf(c_1529,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(prop_impl_just,[status(thm)],[c_181]) ).
cnf(c_1797,plain,
( ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_1084,c_1529]) ).
cnf(c_1798,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(bin_hyper_res,[status(thm)],[c_1099,c_1513]) ).
cnf(c_2621,plain,
name_Nb(sK0) = sP0_iProver_def,
definition ).
cnf(c_2622,plain,
tuple_2(sP0_iProver_def,name_objective) = sP1_iProver_def,
definition ).
cnf(c_2623,negated_conjecture,
~ pred_attacker(sP1_iProver_def),
inference(demodulation,[status(thm)],[c_216,c_2621,c_2622]) ).
cnf(c_4746,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(superposition,[status(thm)],[c_2621,c_1798]) ).
cnf(c_4796,plain,
pred_attacker(constr_pkey(name_skB)),
inference(superposition,[status(thm)],[c_206,c_146]) ).
cnf(c_4829,plain,
pred_attacker(name_objective),
inference(superposition,[status(thm)],[c_1118,c_162]) ).
cnf(c_4840,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_4746,c_164]) ).
cnf(c_4892,plain,
( ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_1797,c_175]) ).
cnf(c_4928,plain,
( ~ pred_attacker(constr_sign(X0,X1))
| pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_129,c_157]) ).
cnf(c_5001,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_127,c_4892]) ).
cnf(c_5003,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skB)))
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(X0),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_127,c_4840]) ).
cnf(c_5146,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_127,c_187]) ).
cnf(c_5156,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(sP0_iProver_def)
| pred_attacker(sP1_iProver_def) ),
inference(superposition,[status(thm)],[c_2622,c_193]) ).
cnf(c_5159,plain,
~ pred_attacker(sP0_iProver_def),
inference(forward_subsumption_resolution,[status(thm)],[c_5156,c_2623,c_4829]) ).
cnf(c_5174,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(superposition,[status(thm)],[c_151,c_214]) ).
cnf(c_5188,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| X1 = name_A
| X1 = name_B
| pred_table(tuple_keys(X1,X0)) ),
inference(superposition,[status(thm)],[c_154,c_215]) ).
cnf(c_5388,plain,
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(X1,name_skS)))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(X1))) ),
inference(superposition,[status(thm)],[c_130,c_5001]) ).
cnf(c_5843,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(superposition,[status(thm)],[c_4829,c_5174]) ).
cnf(c_5899,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_sign(tuple_2(X0,X1),name_skS)) ),
inference(superposition,[status(thm)],[c_5843,c_150]) ).
cnf(c_5911,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_2(X0,X1)) ),
inference(superposition,[status(thm)],[c_5899,c_4928]) ).
cnf(c_5931,plain,
( ~ pred_attacker(name_A)
| pred_attacker(tuple_2(name_A,constr_pkey(name_skA))) ),
inference(superposition,[status(thm)],[c_203,c_5911]) ).
cnf(c_5935,plain,
pred_attacker(tuple_2(name_A,constr_pkey(name_skA))),
inference(forward_subsumption_resolution,[status(thm)],[c_5931,c_201]) ).
cnf(c_6002,plain,
( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skB)))
| ~ pred_attacker(X2)
| pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_132,c_5003]) ).
cnf(c_6019,plain,
( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA)))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
| pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2))) ),
inference(superposition,[status(thm)],[c_131,c_5388]) ).
cnf(c_9847,plain,
( ~ pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(constr_pkey(name_skB))
| ~ pred_attacker(X2)
| pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_186,c_6002]) ).
cnf(c_9862,plain,
( ~ pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X2)
| pred_attacker(constr_aenc(tuple_2(X0,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_9847,c_4796]) ).
cnf(c_10627,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
inference(superposition,[status(thm)],[c_5935,c_9862]) ).
cnf(c_10682,plain,
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_130,c_10627]) ).
cnf(c_10690,plain,
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),X1)) ),
inference(superposition,[status(thm)],[c_131,c_10682]) ).
cnf(c_10729,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),X1)) ),
inference(superposition,[status(thm)],[c_5899,c_10690]) ).
cnf(c_11721,plain,
( ~ pred_attacker(name_A)
| pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_pkey(name_skA))) ),
inference(superposition,[status(thm)],[c_203,c_10729]) ).
cnf(c_11725,plain,
pred_attacker(constr_aenc(tuple_2(name_A,sP0_iProver_def),constr_pkey(name_skA))),
inference(forward_subsumption_resolution,[status(thm)],[c_11721,c_201]) ).
cnf(c_11744,plain,
( ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
| pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_11725,c_6019]) ).
cnf(c_11986,plain,
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
inference(superposition,[status(thm)],[c_183,c_11744]) ).
cnf(c_11994,plain,
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
inference(superposition,[status(thm)],[c_131,c_11986]) ).
cnf(c_12039,plain,
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
inference(superposition,[status(thm)],[c_5899,c_11994]) ).
cnf(c_12080,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| X1 = name_A
| X1 = name_B
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(superposition,[status(thm)],[c_5188,c_12039]) ).
cnf(c_16483,plain,
( ~ pred_attacker(X0)
| name_A = name_objective
| name_B = name_objective
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(superposition,[status(thm)],[c_4829,c_12080]) ).
cnf(c_16694,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_16483,c_108,c_102]) ).
cnf(c_16706,plain,
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0)
| pred_attacker(sP0_iProver_def) ),
inference(superposition,[status(thm)],[c_16694,c_5146]) ).
cnf(c_16707,plain,
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(forward_subsumption_resolution,[status(thm)],[c_16706,c_5159]) ).
cnf(c_16712,plain,
( ~ pred_attacker(constr_pkey(name_A))
| ~ pred_attacker(name_A) ),
inference(instantiation,[status(thm)],[c_16707]) ).
cnf(c_16713,plain,
$false,
inference(prop_impl_just,[status(thm)],[c_16712,c_233,c_201]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.10 % Problem : SWW960+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.11 % Command : run_iprover %s %d THM
% 0.11/0.32 % Computer : n026.cluster.edu
% 0.11/0.32 % Model : x86_64 x86_64
% 0.11/0.32 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.32 % Memory : 8042.1875MB
% 0.11/0.32 % OS : Linux 3.10.0-693.el7.x86_64
% 0.11/0.32 % CPULimit : 300
% 0.11/0.32 % WCLimit : 300
% 0.11/0.32 % DateTime : Thu May 2 22:45:21 EDT 2024
% 0.11/0.32 % CPUTime :
% 0.16/0.43 Running first-order theorem proving
% 0.16/0.43 Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 7.53/1.62 % SZS status Started for theBenchmark.p
% 7.53/1.62 % SZS status Theorem for theBenchmark.p
% 7.53/1.62
% 7.53/1.62 %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 7.53/1.62
% 7.53/1.62 ------ iProver source info
% 7.53/1.62
% 7.53/1.62 git: date: 2024-05-02 19:28:25 +0000
% 7.53/1.62 git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 7.53/1.62 git: non_committed_changes: false
% 7.53/1.62
% 7.53/1.62 ------ Parsing...
% 7.53/1.62 ------ Clausification by vclausify_rel & Parsing by iProver...
% 7.53/1.62
% 7.53/1.62 ------ Preprocessing... sup_sim: 0 sf_s rm: 2 0s sf_e pe_s pe:1:0s pe_e sup_sim: 0 sf_s rm: 1 0s sf_e pe_s pe_e
% 7.53/1.62
% 7.53/1.62 ------ Preprocessing... gs_s sp: 0 0s gs_e snvd_s sp: 0 0s snvd_e
% 7.53/1.62
% 7.53/1.62 ------ Preprocessing... sf_s rm: 1 0s sf_e sf_s rm: 0 0s sf_e
% 7.53/1.62 ------ Proving...
% 7.53/1.62 ------ Problem Properties
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62 clauses 167
% 7.53/1.62 conjectures 1
% 7.53/1.62 EPR 90
% 7.53/1.62 Horn 166
% 7.53/1.62 unary 109
% 7.53/1.62 binary 43
% 7.53/1.62 lits 241
% 7.53/1.62 lits eq 90
% 7.53/1.62 fd_pure 0
% 7.53/1.62 fd_pseudo 0
% 7.53/1.62 fd_cond 1
% 7.53/1.62 fd_pseudo_cond 0
% 7.53/1.62 AC symbols 0
% 7.53/1.62
% 7.53/1.62 ------ Schedule dynamic 5 is on
% 7.53/1.62
% 7.53/1.62 ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62 ------
% 7.53/1.62 Current options:
% 7.53/1.62 ------
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62 ------ Proving...
% 7.53/1.62
% 7.53/1.62
% 7.53/1.62 % SZS status Theorem for theBenchmark.p
% 7.53/1.62
% 7.53/1.62 % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 7.53/1.62
% 7.53/1.63
%------------------------------------------------------------------------------