0.08/0.14 % Problem : theBenchmark.p : TPTP v0.0.0. Released v0.0.0. 0.08/0.14 % Command : java -jar /export/starexec/sandbox2/solver/bin/mcs_epr.jar %d %s 0.15/0.36 % Computer : n022.cluster.edu 0.15/0.36 % Model : x86_64 x86_64 0.15/0.36 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz 0.15/0.36 % Memory : 8042.1875MB 0.15/0.36 % OS : Linux 3.10.0-693.el7.x86_64 0.15/0.36 % CPULimit : 960 0.15/0.36 % WCLimit : 120 0.15/0.36 % DateTime : Thu Jul 2 08:32:47 EDT 2020 0.15/0.36 % CPUTime : 0.22/0.47 openjdk version "1.8.0_171" 0.22/0.47 OpenJDK Runtime Environment (build 1.8.0_171-b10) 0.22/0.47 OpenJDK 64-Bit Server VM (build 25.171-b10, mixed mode) 0.22/0.48 file=/export/starexec/sandbox2/benchmark/theBenchmark.p 0.41/0.60 start to proof:theBenchmark.p 2.31/2.38 % Version : CSE_E---1.2 2.31/2.38 % Problem : theBenchmark.p 2.31/2.38 % Proof found! 2.31/2.38 % SZS status Theorem for theBenchmark.p 2.31/2.38 % SZS output start Proof 2.31/2.38 fof(ax161, axiom, ![X60, X61]:((pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X61,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(X61)))=>pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X60),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X61,constr_pkey(name_skS))))))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax161)). 2.31/2.38 fof(ax86, axiom, ![X104, X105]:pred_eq_bitstring_bitstring(X104,X105), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax86)). 2.31/2.38 fof(ax166, axiom, ![X65, X66, X67]:((pred_table(tuple_keys(X65,X66))&pred_attacker(tuple_key_retrieval_server_in_1(X67,X65)))=>pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X65,X66),name_skS)))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax166)). 2.31/2.38 fof(ax164, axiom, ![X114, X115, X116]:(pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X115,name_skB)),name_Nb(X114)),constr_tuple_2_get_1_bitstring(constr_checksign(X116,constr_pkey(name_skS))))))<=(((pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X115,name_skB)))&pred_attacker(tuple_client_B_in_3(X115)))&pred_attacker(tuple_client_B_in_2(X116)))&pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X116,constr_pkey(name_skS)))))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax164)). 2.31/2.38 fof(ax134, axiom, ![X59]:(pred_attacker(tuple_client_A_in_2(X59))<=pred_attacker(X59)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax134)). 2.31/2.38 fof(ax156, axiom, pred_table(tuple_keys(name_B,constr_pkey(name_skB))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax156)). 2.31/2.38 fof(ax102, axiom, ![X47, X48]:(pred_attacker(tuple_key_retrieval_server_in_1(X47,X48))<=(pred_attacker(X48)&pred_attacker(X47))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax102)). 2.31/2.38 fof(ax123, axiom, ![X13]:(pred_attacker(X13)=>pred_attacker(tuple_client_B_in_2(X13))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax123)). 2.31/2.38 fof(ax128, axiom, ![X90]:(pred_attacker(tuple_client_A_out_3(X90))=>pred_attacker(X90)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax128)). 2.31/2.38 fof(ax151, axiom, pred_attacker(name_B), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax151)). 2.31/2.38 fof(ax154, axiom, ![X111]:pred_attacker(name_new0x2Dname(X111)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax154)). 2.31/2.38 fof(ax121, axiom, ![X31]:(pred_attacker(X31)=>pred_attacker(tuple_client_B_in_3(X31))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax121)). 2.31/2.38 fof(ax81, axiom, ![X107, X108]:X108=constr_checksign(constr_sign(X108,X107),constr_pkey(X107)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax81)). 2.31/2.38 fof(ax101, axiom, ![X62]:(pred_attacker(tuple_key_retrieval_server_out_2(X62))=>pred_attacker(X62)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax101)). 2.31/2.38 fof(ax165, axiom, ![X24, X25, X26, X27]:((((((pred_eq_bitstring_bitstring(name_Nb(X24),constr_adec(X26,name_skB))&pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X25,name_skB))))&pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X27,constr_pkey(name_skS)))))&pred_attacker(tuple_client_B_in_2(X27)))&pred_attacker(tuple_client_B_in_3(X25)))&pred_attacker(tuple_client_B_in_5(X26)))=>pred_attacker(tuple_client_B_out_6(name_objective))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax165)). 2.31/2.38 fof(ax162, axiom, ![X72, X73, X74]:((((pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X74,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(X74)))&pred_attacker(tuple_client_A_in_4(X73)))&pred_eq_bitstring_bitstring(name_Na(X72),constr_tuple_2_get_0x30(constr_adec(X73,name_skA))))=>pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X73,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X74,constr_pkey(name_skS))))))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax162)). 2.31/2.38 fof(ax78, axiom, ![X33, X34]:constr_adec(constr_aenc(X34,constr_pkey(X33)),X33)=X34, file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax78)). 2.31/2.38 fof(ax82, axiom, ![X80, X81]:constr_tuple_2_get_1_bitstring(tuple_2(X80,X81))=X81, file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax82)). 2.31/2.38 fof(ax155, axiom, pred_table(tuple_keys(name_A,constr_pkey(name_skA))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax155)). 2.31/2.38 fof(ax119, axiom, ![X9]:(pred_attacker(X9)=>pred_attacker(tuple_client_B_in_5(X9))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax119)). 2.31/2.38 fof(ax132, axiom, ![X36]:(pred_attacker(tuple_client_A_in_4(X36))<=pred_attacker(X36)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax132)). 2.31/2.38 fof(ax83, axiom, ![X55, X56]:constr_tuple_2_get_0x30_bitstring(tuple_2(X55,X56))=X55, file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax83)). 2.31/2.38 fof(ax152, axiom, pred_attacker(name_A), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax152)). 2.31/2.38 fof(ax167, axiom, ![X28, X29]:(pred_table(tuple_keys(X28,X29))<=((name_B!=X28&pred_attacker(tuple_key_register_server_in_1(X28,X29)))&X28!=name_A)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax167)). 2.31/2.38 fof(ax105, axiom, ![X39, X40]:((pred_attacker(X39)&pred_attacker(X40))=>pred_attacker(tuple_key_register_server_in_1(X39,X40))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax105)). 2.31/2.38 fof(ax126, axiom, ![X75]:(pred_attacker(X75)<=pred_attacker(tuple_client_A_out_5(X75))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax126)). 2.31/2.38 fof(ax104, axiom, ![X4, X5]:(pred_attacker(X5)<=pred_attacker(tuple_key_retrieval_server_in_1(X4,X5))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax104)). 2.31/2.38 fof(ax115, axiom, ![X86]:(pred_attacker(X86)<=pred_attacker(tuple_client_B_out_4(X86))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax115)). 2.31/2.38 fof(co0, conjecture, ![X106]:pred_attacker(tuple_2(name_Nb(X106),name_objective)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', co0)). 2.31/2.38 fof(ax144, axiom, ![X93, X94]:((pred_attacker(X94)&pred_attacker(X93))=>pred_attacker(tuple_2(X93,X94))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax144)). 2.31/2.38 fof(ax113, axiom, ![X57]:(pred_attacker(tuple_client_B_out_6(X57))=>pred_attacker(X57)), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax113)). 2.31/2.38 fof(ax138, axiom, ![X109, X110]:(pred_attacker(constr_adec(X109,X110))<=(pred_attacker(X109)&pred_attacker(X110))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax138)). 2.31/2.38 fof(ax93, axiom, ![X97]:(pred_attacker(X97)=>pred_attacker(constr_pkey(X97))), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax93)). 2.31/2.38 fof(ax149, axiom, pred_attacker(name_c), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax149)). 2.31/2.38 fof(ax58, axiom, name_B!=name_c, file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax58)). 2.31/2.38 fof(ax52, axiom, name_A!=name_c, file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax52)). 2.31/2.38 fof(ax143, axiom, pred_attacker(constr_CONST_0x30), file('/export/starexec/sandbox2/benchmark/theBenchmark.p', ax143)). 2.31/2.38 fof(c_0_37, plain, ![X176, X177]:(~pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X177,constr_pkey(name_skS))))|~pred_attacker(tuple_client_A_in_2(X177))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X176),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X177,constr_pkey(name_skS))))))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax161])])). 2.31/2.38 fof(c_0_38, plain, ![X220, X221]:pred_eq_bitstring_bitstring(X220,X221), inference(variable_rename,[status(thm)],[ax86])). 2.31/2.38 fof(c_0_39, plain, ![X181, X182, X183]:(~pred_table(tuple_keys(X181,X182))|~pred_attacker(tuple_key_retrieval_server_in_1(X183,X181))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X181,X182),name_skS)))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax166])])). 2.31/2.38 fof(c_0_40, plain, ![X230, X231, X232]:(~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X231,name_skB)))|~pred_attacker(tuple_client_B_in_3(X231))|~pred_attacker(tuple_client_B_in_2(X232))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X232,constr_pkey(name_skS))))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X231,name_skB)),name_Nb(X230)),constr_tuple_2_get_1_bitstring(constr_checksign(X232,constr_pkey(name_skS))))))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax164])])])). 2.31/2.38 cnf(c_0_41, plain, (pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X2),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))|~pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))|~pred_attacker(tuple_client_A_in_2(X1))), inference(split_conjunct,[status(thm)],[c_0_37])). 2.31/2.38 cnf(c_0_42, plain, (pred_eq_bitstring_bitstring(X1,X2)), inference(split_conjunct,[status(thm)],[c_0_38])). 2.31/2.38 fof(c_0_43, plain, ![X175]:(~pred_attacker(X175)|pred_attacker(tuple_client_A_in_2(X175))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax134])])])). 2.31/2.38 cnf(c_0_44, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))|~pred_table(tuple_keys(X1,X2))|~pred_attacker(tuple_key_retrieval_server_in_1(X3,X1))), inference(split_conjunct,[status(thm)],[c_0_39])). 2.31/2.38 cnf(c_0_45, plain, (pred_table(tuple_keys(name_B,constr_pkey(name_skB)))), inference(split_conjunct,[status(thm)],[ax156])). 2.31/2.38 fof(c_0_46, plain, ![X163, X164]:(~pred_attacker(X164)|~pred_attacker(X163)|pred_attacker(tuple_key_retrieval_server_in_1(X163,X164))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax102])])])). 2.31/2.38 cnf(c_0_47, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X3)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))|~pred_attacker(tuple_client_B_in_3(X1))|~pred_attacker(tuple_client_B_in_2(X2))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))), inference(split_conjunct,[status(thm)],[c_0_40])). 2.31/2.38 fof(c_0_48, plain, ![X129]:(~pred_attacker(X129)|pred_attacker(tuple_client_B_in_2(X129))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax123])])). 2.31/2.38 fof(c_0_49, plain, ![X206]:(~pred_attacker(tuple_client_A_out_3(X206))|pred_attacker(X206)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax128])])). 2.31/2.38 cnf(c_0_50, plain, (pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X2),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))|~pred_attacker(tuple_client_A_in_2(X1))), inference(cn,[status(thm)],[inference(rw,[status(thm)],[c_0_41, c_0_42])])). 2.31/2.38 cnf(c_0_51, plain, (pred_attacker(tuple_client_A_in_2(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_43])). 2.31/2.38 cnf(c_0_52, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_B,constr_pkey(name_skB)),name_skS)))|~pred_attacker(tuple_key_retrieval_server_in_1(X1,name_B))), inference(spm,[status(thm)],[c_0_44, c_0_45])). 2.31/2.38 cnf(c_0_53, plain, (pred_attacker(tuple_key_retrieval_server_in_1(X2,X1))|~pred_attacker(X1)|~pred_attacker(X2)), inference(split_conjunct,[status(thm)],[c_0_46])). 2.31/2.38 cnf(c_0_54, plain, (pred_attacker(name_B)), inference(split_conjunct,[status(thm)],[ax151])). 2.31/2.38 fof(c_0_55, plain, ![X227]:pred_attacker(name_new0x2Dname(X227)), inference(variable_rename,[status(thm)],[ax154])). 2.31/2.38 cnf(c_0_56, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X3)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))|~pred_attacker(tuple_client_B_in_2(X2))|~pred_attacker(tuple_client_B_in_3(X1))), inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[c_0_47, c_0_42]), c_0_42])])). 2.31/2.38 cnf(c_0_57, plain, (pred_attacker(tuple_client_B_in_2(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_48])). 2.31/2.38 fof(c_0_58, plain, ![X147]:(~pred_attacker(X147)|pred_attacker(tuple_client_B_in_3(X147))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax121])])). 2.31/2.38 cnf(c_0_59, plain, (pred_attacker(X1)|~pred_attacker(tuple_client_A_out_3(X1))), inference(split_conjunct,[status(thm)],[c_0_49])). 2.31/2.38 cnf(c_0_60, plain, (pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_50, c_0_51])). 2.31/2.38 fof(c_0_61, plain, ![X223, X224]:X224=constr_checksign(constr_sign(X224,X223),constr_pkey(X223)), inference(variable_rename,[status(thm)],[ax81])). 2.31/2.38 fof(c_0_62, plain, ![X178]:(~pred_attacker(tuple_key_retrieval_server_out_2(X178))|pred_attacker(X178)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax101])])). 2.31/2.38 cnf(c_0_63, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_B,constr_pkey(name_skB)),name_skS)))|~pred_attacker(X1)), inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_52, c_0_53]), c_0_54])])). 2.31/2.38 cnf(c_0_64, plain, (pred_attacker(name_new0x2Dname(X1))), inference(split_conjunct,[status(thm)],[c_0_55])). 2.31/2.38 fof(c_0_65, plain, ![X140, X141, X142, X143]:(~pred_eq_bitstring_bitstring(name_Nb(X140),constr_adec(X142,name_skB))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X141,name_skB)))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X143,constr_pkey(name_skS))))|~pred_attacker(tuple_client_B_in_2(X143))|~pred_attacker(tuple_client_B_in_3(X141))|~pred_attacker(tuple_client_B_in_5(X142))|pred_attacker(tuple_client_B_out_6(name_objective))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax165])])). 2.31/2.38 fof(c_0_66, plain, ![X188, X189, X190]:(~pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X190,constr_pkey(name_skS))))|~pred_attacker(tuple_client_A_in_2(X190))|~pred_attacker(tuple_client_A_in_4(X189))|~pred_eq_bitstring_bitstring(name_Na(X188),constr_tuple_2_get_0x30(constr_adec(X189,name_skA)))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X189,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X190,constr_pkey(name_skS))))))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax162])])). 2.31/2.38 cnf(c_0_67, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X3,constr_pkey(name_skS))))))|~pred_attacker(tuple_client_B_in_3(X1))|~pred_attacker(X3)), inference(spm,[status(thm)],[c_0_56, c_0_57])). 2.31/2.38 cnf(c_0_68, plain, (pred_attacker(tuple_client_B_in_3(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_58])). 2.31/2.38 fof(c_0_69, plain, ![X149, X150]:constr_adec(constr_aenc(X150,constr_pkey(X149)),X149)=X150, inference(variable_rename,[status(thm)],[ax78])). 2.31/2.38 cnf(c_0_70, plain, (pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_59, c_0_60])). 2.31/2.38 cnf(c_0_71, plain, (X1=constr_checksign(constr_sign(X1,X2),constr_pkey(X2))), inference(split_conjunct,[status(thm)],[c_0_61])). 2.31/2.38 cnf(c_0_72, plain, (pred_attacker(X1)|~pred_attacker(tuple_key_retrieval_server_out_2(X1))), inference(split_conjunct,[status(thm)],[c_0_62])). 2.31/2.38 cnf(c_0_73, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_B,constr_pkey(name_skB)),name_skS)))), inference(spm,[status(thm)],[c_0_63, c_0_64])). 2.31/2.38 fof(c_0_74, plain, ![X196, X197]:constr_tuple_2_get_1_bitstring(tuple_2(X196,X197))=X197, inference(variable_rename,[status(thm)],[ax82])). 2.31/2.38 cnf(c_0_75, plain, (pred_table(tuple_keys(name_A,constr_pkey(name_skA)))), inference(split_conjunct,[status(thm)],[ax155])). 2.31/2.38 cnf(c_0_76, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))|~pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X4,constr_pkey(name_skS))))|~pred_attacker(tuple_client_B_in_2(X4))|~pred_attacker(tuple_client_B_in_3(X3))|~pred_attacker(tuple_client_B_in_5(X2))), inference(split_conjunct,[status(thm)],[c_0_65])). 2.31/2.38 fof(c_0_77, plain, ![X125]:(~pred_attacker(X125)|pred_attacker(tuple_client_B_in_5(X125))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax119])])). 2.31/2.38 cnf(c_0_78, plain, (pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))|~pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))|~pred_attacker(tuple_client_A_in_2(X1))|~pred_attacker(tuple_client_A_in_4(X2))|~pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))), inference(split_conjunct,[status(thm)],[c_0_66])). 2.31/2.38 fof(c_0_79, plain, ![X152]:(~pred_attacker(X152)|pred_attacker(tuple_client_A_in_4(X152))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax132])])])). 2.31/2.38 cnf(c_0_80, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X3,constr_pkey(name_skS))))))|~pred_attacker(X3)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_67, c_0_68])). 2.31/2.38 cnf(c_0_81, plain, (constr_adec(constr_aenc(X1,constr_pkey(X2)),X2)=X1), inference(split_conjunct,[status(thm)],[c_0_69])). 2.31/2.38 cnf(c_0_82, plain, (pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(X2)))|~pred_attacker(constr_sign(X2,name_skS))), inference(spm,[status(thm)],[c_0_70, c_0_71])). 2.31/2.38 cnf(c_0_83, plain, (pred_attacker(constr_sign(tuple_2(name_B,constr_pkey(name_skB)),name_skS))), inference(spm,[status(thm)],[c_0_72, c_0_73])). 2.31/2.38 cnf(c_0_84, plain, (constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))=X2), inference(split_conjunct,[status(thm)],[c_0_74])). 2.31/2.38 fof(c_0_85, plain, ![X171, X172]:constr_tuple_2_get_0x30_bitstring(tuple_2(X171,X172))=X171, inference(variable_rename,[status(thm)],[ax83])). 2.31/2.38 cnf(c_0_86, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))|~pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A))), inference(spm,[status(thm)],[c_0_44, c_0_75])). 2.31/2.38 cnf(c_0_87, plain, (pred_attacker(name_A)), inference(split_conjunct,[status(thm)],[ax152])). 2.31/2.38 cnf(c_0_88, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(tuple_client_B_in_5(X2))|~pred_attacker(tuple_client_B_in_2(X4))|~pred_attacker(tuple_client_B_in_3(X3))), inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[c_0_76, c_0_42]), c_0_42]), c_0_42])])). 2.31/2.38 cnf(c_0_89, plain, (pred_attacker(tuple_client_B_in_5(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_77])). 2.31/2.38 cnf(c_0_90, plain, (pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))|~pred_attacker(tuple_client_A_in_4(X2))|~pred_attacker(tuple_client_A_in_2(X1))), inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[c_0_78, c_0_42]), c_0_42])])). 2.31/2.38 cnf(c_0_91, plain, (pred_attacker(tuple_client_A_in_4(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_79])). 2.31/2.38 cnf(c_0_92, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(X1),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X3,constr_pkey(name_skS))))))|~pred_attacker(constr_aenc(X1,constr_pkey(name_skB)))|~pred_attacker(X3)), inference(spm,[status(thm)],[c_0_80, c_0_81])). 2.31/2.38 cnf(c_0_93, plain, (pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_pkey(name_skB)))), inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_82, c_0_83]), c_0_84])). 2.31/2.38 cnf(c_0_94, plain, (constr_tuple_2_get_0x30_bitstring(tuple_2(X1,X2))=X1), inference(split_conjunct,[status(thm)],[c_0_85])). 2.31/2.38 cnf(c_0_95, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))|~pred_attacker(X1)), inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_86, c_0_53]), c_0_87])])). 2.31/2.38 fof(c_0_96, plain, ![X144, X145]:(name_B=X144|~pred_attacker(tuple_key_register_server_in_1(X144,X145))|X144=name_A|pred_table(tuple_keys(X144,X145))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax167])])])). 2.31/2.38 fof(c_0_97, plain, ![X155, X156]:(~pred_attacker(X155)|~pred_attacker(X156)|pred_attacker(tuple_key_register_server_in_1(X155,X156))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax105])])). 2.31/2.38 cnf(c_0_98, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(tuple_client_B_in_2(X1))|~pred_attacker(tuple_client_B_in_3(X2))|~pred_attacker(X3)), inference(spm,[status(thm)],[c_0_88, c_0_89])). 2.31/2.38 fof(c_0_99, plain, ![X191]:(~pred_attacker(tuple_client_A_out_5(X191))|pred_attacker(X191)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax126])])])). 2.31/2.38 cnf(c_0_100, plain, (pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))|~pred_attacker(tuple_client_A_in_2(X2))|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_90, c_0_91])). 2.31/2.38 cnf(c_0_101, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(name_Na(X1),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X3,constr_pkey(name_skS))))))|~pred_attacker(X3)), inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_92, c_0_93]), c_0_94])). 2.31/2.38 cnf(c_0_102, plain, (pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))), inference(spm,[status(thm)],[c_0_95, c_0_64])). 2.31/2.38 cnf(c_0_103, plain, (name_B=X1|X1=name_A|pred_table(tuple_keys(X1,X2))|~pred_attacker(tuple_key_register_server_in_1(X1,X2))), inference(split_conjunct,[status(thm)],[c_0_96])). 2.31/2.38 cnf(c_0_104, plain, (pred_attacker(tuple_key_register_server_in_1(X1,X2))|~pred_attacker(X1)|~pred_attacker(X2)), inference(split_conjunct,[status(thm)],[c_0_97])). 2.31/2.38 fof(c_0_105, plain, ![X120, X121]:(~pred_attacker(tuple_key_retrieval_server_in_1(X120,X121))|pred_attacker(X121)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax104])])])). 2.31/2.38 cnf(c_0_106, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(tuple_client_B_in_3(X1))|~pred_attacker(X2)|~pred_attacker(X3)), inference(spm,[status(thm)],[c_0_98, c_0_57])). 2.31/2.38 cnf(c_0_107, plain, (pred_attacker(X1)|~pred_attacker(tuple_client_A_out_5(X1))), inference(split_conjunct,[status(thm)],[c_0_99])). 2.31/2.38 cnf(c_0_108, plain, (pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))|~pred_attacker(X1)|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_100, c_0_51])). 2.31/2.38 fof(c_0_109, plain, ![X202]:(~pred_attacker(tuple_client_B_out_4(X202))|pred_attacker(X202)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax115])])])). 2.31/2.38 cnf(c_0_110, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(name_Na(X1),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X3))))|~pred_attacker(constr_sign(X3,name_skS))), inference(spm,[status(thm)],[c_0_101, c_0_71])). 2.31/2.38 cnf(c_0_111, plain, (pred_attacker(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))), inference(spm,[status(thm)],[c_0_72, c_0_102])). 2.31/2.38 cnf(c_0_112, plain, (X1=name_A|name_B=X1|pred_table(tuple_keys(X1,X2))|~pred_attacker(X2)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_103, c_0_104])). 2.31/2.38 cnf(c_0_113, plain, (pred_attacker(X2)|~pred_attacker(tuple_key_retrieval_server_in_1(X1,X2))), inference(split_conjunct,[status(thm)],[c_0_105])). 2.31/2.38 cnf(c_0_114, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(X1)|~pred_attacker(X2)|~pred_attacker(X3)), inference(spm,[status(thm)],[c_0_106, c_0_68])). 2.31/2.38 cnf(c_0_115, plain, (pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))|~pred_attacker(X1)|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_107, c_0_108])). 2.31/2.38 cnf(c_0_116, plain, (pred_attacker(X1)|~pred_attacker(tuple_client_B_out_4(X1))), inference(split_conjunct,[status(thm)],[c_0_109])). 2.31/2.38 cnf(c_0_117, plain, (pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(name_Na(X1),name_Nb(X2)),constr_pkey(name_skA))))), inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_110, c_0_111]), c_0_84])). 2.31/2.38 cnf(c_0_118, plain, (name_B=X1|X1=name_A|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))|~pred_attacker(tuple_key_retrieval_server_in_1(X3,X1))|~pred_attacker(X2)), inference(csr,[status(thm)],[inference(spm,[status(thm)],[c_0_44, c_0_112]), c_0_113])). 2.31/2.38 fof(c_0_119, negated_conjecture, ~(![X106]:pred_attacker(tuple_2(name_Nb(X106),name_objective))), inference(assume_negation,[status(cth)],[co0])). 2.31/2.38 cnf(c_0_120, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(X1)|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_114, c_0_64])). 2.31/2.38 cnf(c_0_121, plain, (pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X1),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))|~pred_attacker(constr_aenc(X1,constr_pkey(name_skA)))|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_115, c_0_81])). 2.31/2.38 cnf(c_0_122, plain, (pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_Nb(X2)),constr_pkey(name_skA)))), inference(spm,[status(thm)],[c_0_116, c_0_117])). 2.31/2.38 cnf(c_0_123, plain, (X1=name_A|name_B=X1|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))|~pred_attacker(X2)|~pred_attacker(X3)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_118, c_0_53])). 2.31/2.38 fof(c_0_124, negated_conjecture, ~pred_attacker(tuple_2(name_Nb(esk1_0),name_objective)), inference(skolemize,[status(esa)],[inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[c_0_119])])])). 2.31/2.38 fof(c_0_125, plain, ![X209, X210]:(~pred_attacker(X210)|~pred_attacker(X209)|pred_attacker(tuple_2(X209,X210))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax144])])). 2.31/2.38 fof(c_0_126, plain, ![X173]:(~pred_attacker(tuple_client_B_out_6(X173))|pred_attacker(X173)), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax113])])). 2.31/2.38 cnf(c_0_127, plain, (pred_attacker(tuple_client_B_out_6(name_objective))|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_120, c_0_64])). 2.31/2.38 fof(c_0_128, plain, ![X225, X226]:(~pred_attacker(X225)|~pred_attacker(X226)|pred_attacker(constr_adec(X225,X226))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[inference(fof_simplification,[status(thm)],[ax138])])])). 2.31/2.38 cnf(c_0_129, plain, (pred_attacker(constr_aenc(name_Nb(X1),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))|~pred_attacker(X2)), inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_121, c_0_122]), c_0_84])). 2.31/2.38 cnf(c_0_130, plain, (name_B=X1|X1=name_A|pred_attacker(constr_sign(tuple_2(X1,X2),name_skS))|~pred_attacker(X2)|~pred_attacker(X3)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_72, c_0_123])). 2.31/2.38 cnf(c_0_131, negated_conjecture, (~pred_attacker(tuple_2(name_Nb(esk1_0),name_objective))), inference(split_conjunct,[status(thm)],[c_0_124])). 2.31/2.38 cnf(c_0_132, plain, (pred_attacker(tuple_2(X2,X1))|~pred_attacker(X1)|~pred_attacker(X2)), inference(split_conjunct,[status(thm)],[c_0_125])). 2.31/2.38 cnf(c_0_133, plain, (pred_attacker(X1)|~pred_attacker(tuple_client_B_out_6(X1))), inference(split_conjunct,[status(thm)],[c_0_126])). 2.31/2.38 cnf(c_0_134, plain, (pred_attacker(tuple_client_B_out_6(name_objective))), inference(spm,[status(thm)],[c_0_127, c_0_64])). 2.31/2.38 cnf(c_0_135, plain, (pred_attacker(constr_adec(X1,X2))|~pred_attacker(X1)|~pred_attacker(X2)), inference(split_conjunct,[status(thm)],[c_0_128])). 2.31/2.38 cnf(c_0_136, plain, (pred_attacker(constr_aenc(name_Nb(X1),constr_tuple_2_get_1_bitstring(X2)))|~pred_attacker(constr_sign(X2,name_skS))), inference(spm,[status(thm)],[c_0_129, c_0_71])). 2.31/2.38 cnf(c_0_137, plain, (X1=name_A|name_B=X1|pred_attacker(constr_sign(tuple_2(X1,X2),name_skS))|~pred_attacker(X2)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_130, c_0_64])). 2.31/2.38 fof(c_0_138, plain, ![X213]:(~pred_attacker(X213)|pred_attacker(constr_pkey(X213))), inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax93])])). 2.31/2.38 cnf(c_0_139, negated_conjecture, (~pred_attacker(name_Nb(esk1_0))|~pred_attacker(name_objective)), inference(spm,[status(thm)],[c_0_131, c_0_132])). 2.31/2.38 cnf(c_0_140, plain, (pred_attacker(name_objective)), inference(spm,[status(thm)],[c_0_133, c_0_134])). 2.31/2.38 cnf(c_0_141, plain, (pred_attacker(X1)|~pred_attacker(constr_aenc(X1,constr_pkey(X2)))|~pred_attacker(X2)), inference(spm,[status(thm)],[c_0_135, c_0_81])). 2.31/2.38 cnf(c_0_142, plain, (name_B=X1|X1=name_A|pred_attacker(constr_aenc(name_Nb(X2),X3))|~pred_attacker(X3)|~pred_attacker(X1)), inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_136, c_0_137]), c_0_84])). 2.31/2.38 cnf(c_0_143, plain, (pred_attacker(constr_pkey(X1))|~pred_attacker(X1)), inference(split_conjunct,[status(thm)],[c_0_138])). 2.31/2.38 cnf(c_0_144, negated_conjecture, (~pred_attacker(name_Nb(esk1_0))), inference(cn,[status(thm)],[inference(rw,[status(thm)],[c_0_139, c_0_140])])). 2.31/2.38 cnf(c_0_145, plain, (X1=name_A|name_B=X1|pred_attacker(name_Nb(X2))|~pred_attacker(X3)|~pred_attacker(X1)), inference(csr,[status(thm)],[inference(spm,[status(thm)],[c_0_141, c_0_142]), c_0_143])). 2.31/2.38 cnf(c_0_146, negated_conjecture, (name_B=X1|X1=name_A|~pred_attacker(X2)|~pred_attacker(X1)), inference(spm,[status(thm)],[c_0_144, c_0_145])). 2.31/2.38 cnf(c_0_147, plain, (pred_attacker(name_c)), inference(split_conjunct,[status(thm)],[ax149])). 2.31/2.38 cnf(c_0_148, plain, (name_B!=name_c), inference(split_conjunct,[status(thm)],[ax58])). 2.31/2.38 cnf(c_0_149, plain, (name_A!=name_c), inference(split_conjunct,[status(thm)],[ax52])). 2.31/2.38 cnf(c_0_150, plain, (pred_attacker(constr_CONST_0x30)), inference(split_conjunct,[status(thm)],[ax143])). 2.31/2.38 cnf(c_0_151, negated_conjecture, (~pred_attacker(X1)), inference(sr,[status(thm)],[inference(sr,[status(thm)],[inference(spm,[status(thm)],[c_0_146, c_0_147]), c_0_148]), c_0_149])). 2.31/2.38 cnf(c_0_152, plain, ($false), inference(sr,[status(thm)],[c_0_150, c_0_151]), ['proof']). 2.31/2.38 % SZS output end Proof 2.31/2.38 % User time : 1.619 s 2.31/2.38 % System time : 0.067 s 2.31/2.38 % Total time : 1.687 s 2.31/2.38 2.31/2.40 EOF