TSTP Solution File: SWV010+1 by Enigma---0.5.1

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Enigma---0.5.1
% Problem  : SWV010+1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : enigmatic-eprover.py %s %d 1

% Computer : n009.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 600s
% DateTime : Wed Jul 20 17:45:17 EDT 2022

% Result   : Satisfiable 6.43s 2.35s
% Output   : Saturation 6.43s
% Verified : 
% SZS Type : ERROR: Analysing output (MakeTreeStats fails)

% Comments : 
%------------------------------------------------------------------------------
cnf(i_0_11,plain,
    ( message(sent(b,t,triple(b,generate_b_nonce(X1),encrypt(triple(X2,X1,generate_expiration_time(X1)),bt))))
    | ~ fresh_to_b(X1)
    | ~ message(sent(X2,b,pair(X2,X1))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_11) ).

cnf(i_0_3,plain,
    message(sent(a,b,pair(a,an_a_nonce))),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_3) ).

cnf(i_0_9,plain,
    fresh_to_b(an_a_nonce),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_9) ).

cnf(i_0_16,plain,
    ( message(sent(t,X1,triple(encrypt(quadruple(X2,X3,generate_key(X3),X4),X5),encrypt(triple(X1,generate_key(X3),X4),X6),X7)))
    | ~ t_holds(key(X5,X1))
    | ~ t_holds(key(X6,X2))
    | ~ message(sent(X2,t,triple(X2,X7,encrypt(triple(X1,X3,X4),X6)))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_16) ).

cnf(i_0_14,plain,
    t_holds(key(bt,b)),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_14) ).

cnf(i_0_6,plain,
    ( message(sent(a,X1,pair(X2,encrypt(X3,X4))))
    | ~ a_stored(pair(X1,X5))
    | ~ message(sent(t,a,triple(encrypt(quadruple(X1,X5,X4,X6),at),X2,X3))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_6) ).

cnf(i_0_4,plain,
    a_stored(pair(b,an_a_nonce)),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_4) ).

cnf(i_0_13,plain,
    t_holds(key(at,a)),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_13) ).

cnf(i_0_10,plain,
    ( b_stored(pair(X1,X2))
    | ~ fresh_to_b(X2)
    | ~ message(sent(X1,b,pair(X1,X2))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_10) ).

cnf(i_0_12,plain,
    ( b_holds(key(X1,X2))
    | ~ b_stored(pair(X2,X3))
    | ~ message(sent(X2,b,pair(encrypt(triple(X2,X1,generate_expiration_time(X3)),bt),encrypt(generate_b_nonce(X3),X1)))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_12) ).

cnf(i_0_5,plain,
    ( a_holds(key(X1,X2))
    | ~ a_stored(pair(X2,X3))
    | ~ message(sent(t,a,triple(encrypt(quadruple(X2,X3,X1,X4),at),X5,X6))) ),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_5) ).

cnf(i_0_7,plain,
    b_holds(key(bt,t)),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_7) ).

cnf(i_0_1,plain,
    a_holds(key(at,t)),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_1) ).

cnf(i_0_8,plain,
    party_of_protocol(b),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_8) ).

cnf(i_0_2,plain,
    party_of_protocol(a),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_2) ).

cnf(i_0_15,plain,
    party_of_protocol(t),
    file('/export/starexec/sandbox2/tmp/enigma-theBenchmark.p-73rg7ndl/input.p',i_0_15) ).

cnf(c_0_33,plain,
    ( message(sent(b,t,triple(b,generate_b_nonce(X1),encrypt(triple(X2,X1,generate_expiration_time(X1)),bt))))
    | ~ fresh_to_b(X1)
    | ~ message(sent(X2,b,pair(X2,X1))) ),
    i_0_11,
    [final] ).

cnf(c_0_34,plain,
    message(sent(a,b,pair(a,an_a_nonce))),
    i_0_3,
    [final] ).

cnf(c_0_35,plain,
    fresh_to_b(an_a_nonce),
    i_0_9,
    [final] ).

cnf(c_0_36,plain,
    ( message(sent(t,X1,triple(encrypt(quadruple(X2,X3,generate_key(X3),X4),X5),encrypt(triple(X1,generate_key(X3),X4),X6),X7)))
    | ~ t_holds(key(X5,X1))
    | ~ t_holds(key(X6,X2))
    | ~ message(sent(X2,t,triple(X2,X7,encrypt(triple(X1,X3,X4),X6)))) ),
    i_0_16,
    [final] ).

cnf(c_0_37,plain,
    message(sent(b,t,triple(b,generate_b_nonce(an_a_nonce),encrypt(triple(a,an_a_nonce,generate_expiration_time(an_a_nonce)),bt)))),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_33,c_0_34]),c_0_35])]),
    [final] ).

cnf(c_0_38,plain,
    t_holds(key(bt,b)),
    i_0_14,
    [final] ).

cnf(c_0_39,plain,
    ( message(sent(a,X1,pair(X2,encrypt(X3,X4))))
    | ~ a_stored(pair(X1,X5))
    | ~ message(sent(t,a,triple(encrypt(quadruple(X1,X5,X4,X6),at),X2,X3))) ),
    i_0_6,
    [final] ).

cnf(c_0_40,plain,
    ( message(sent(t,a,triple(encrypt(quadruple(b,an_a_nonce,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),X1),encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),generate_b_nonce(an_a_nonce))))
    | ~ t_holds(key(X1,a)) ),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_36,c_0_37]),c_0_38])]),
    [final] ).

cnf(c_0_41,plain,
    a_stored(pair(b,an_a_nonce)),
    i_0_4,
    [final] ).

cnf(c_0_42,plain,
    t_holds(key(at,a)),
    i_0_13,
    [final] ).

cnf(c_0_43,plain,
    ( b_stored(pair(X1,X2))
    | ~ fresh_to_b(X2)
    | ~ message(sent(X1,b,pair(X1,X2))) ),
    i_0_10,
    [final] ).

cnf(c_0_44,plain,
    ( b_holds(key(X1,X2))
    | ~ b_stored(pair(X2,X3))
    | ~ message(sent(X2,b,pair(encrypt(triple(X2,X1,generate_expiration_time(X3)),bt),encrypt(generate_b_nonce(X3),X1)))) ),
    i_0_12,
    [final] ).

cnf(c_0_45,plain,
    message(sent(a,b,pair(encrypt(triple(a,generate_key(an_a_nonce),generate_expiration_time(an_a_nonce)),bt),encrypt(generate_b_nonce(an_a_nonce),generate_key(an_a_nonce))))),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_39,c_0_40]),c_0_41]),c_0_42])]),
    [final] ).

cnf(c_0_46,plain,
    b_stored(pair(a,an_a_nonce)),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_43,c_0_34]),c_0_35])]),
    [final] ).

cnf(c_0_47,plain,
    ( a_holds(key(X1,X2))
    | ~ a_stored(pair(X2,X3))
    | ~ message(sent(t,a,triple(encrypt(quadruple(X2,X3,X1,X4),at),X5,X6))) ),
    i_0_5,
    [final] ).

cnf(c_0_48,plain,
    b_holds(key(generate_key(an_a_nonce),a)),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_44,c_0_45]),c_0_46])]),
    [final] ).

cnf(c_0_49,plain,
    a_holds(key(generate_key(an_a_nonce),b)),
    inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_47,c_0_40]),c_0_41]),c_0_42])]),
    [final] ).

cnf(c_0_50,plain,
    b_holds(key(bt,t)),
    i_0_7,
    [final] ).

cnf(c_0_51,plain,
    a_holds(key(at,t)),
    i_0_1,
    [final] ).

cnf(c_0_52,plain,
    party_of_protocol(b),
    i_0_8,
    [final] ).

cnf(c_0_53,plain,
    party_of_protocol(a),
    i_0_2,
    [final] ).

cnf(c_0_54,plain,
    party_of_protocol(t),
    i_0_15,
    [final] ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem  : SWV010+1 : TPTP v8.1.0. Released v2.4.0.
% 0.07/0.12  % Command  : enigmatic-eprover.py %s %d 1
% 0.13/0.33  % Computer : n009.cluster.edu
% 0.13/0.33  % Model    : x86_64 x86_64
% 0.13/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.33  % Memory   : 8042.1875MB
% 0.13/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 600
% 0.13/0.34  % DateTime : Tue Jun 14 19:20:24 EDT 2022
% 0.13/0.34  % CPUTime  : 
% 0.19/0.45  # ENIGMATIC: Selected complete mode:
% 6.43/2.35  # ENIGMATIC: Solved by autoschedule:
% 6.43/2.35  # No SInE strategy applied
% 6.43/2.35  # Trying AutoSched0 for 150 seconds
% 6.43/2.35  # AutoSched0-Mode selected heuristic G_E___208_C09_12_F1_SE_CS_SP_PS_S033N
% 6.43/2.35  # and selection function PSelectUnlessUniqMax.
% 6.43/2.35  #
% 6.43/2.35  # Preprocessing time       : 0.012 s
% 6.43/2.35  # Presaturation interreduction done
% 6.43/2.35  
% 6.43/2.35  # No proof found!
% 6.43/2.35  # SZS status Satisfiable
% 6.43/2.35  # SZS output start Saturation
% See solution above
% 6.43/2.35  
% 6.43/2.35  # -------------------------------------------------
% 6.43/2.35  # User time                : 0.014 s
% 6.43/2.35  # System time              : 0.003 s
% 6.43/2.35  # Total time               : 0.016 s
% 6.43/2.35  # Maximum resident set size: 7120 pages
% 6.43/2.35  
%------------------------------------------------------------------------------