TSTP Solution File: SWV014-1 by CSE---1.6
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : CSE---1.6
% Problem : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% Transfm : none
% Format : tptp:raw
% Command : java -jar /export/starexec/sandbox/solver/bin/mcs_scs.jar %s %d
% Computer : n026.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Thu Aug 31 21:31:34 EDT 2023
% Result : Unsatisfiable 1.06s 1.09s
% Output : CNFRefutation 1.07s
% Verified :
% SZS Type : -
% Comments :
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.13 % Problem : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% 0.00/0.14 % Command : java -jar /export/starexec/sandbox/solver/bin/mcs_scs.jar %s %d
% 0.14/0.35 % Computer : n026.cluster.edu
% 0.14/0.35 % Model : x86_64 x86_64
% 0.14/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35 % Memory : 8042.1875MB
% 0.14/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35 % CPULimit : 300
% 0.14/0.35 % WCLimit : 300
% 0.14/0.35 % DateTime : Tue Aug 29 09:01:35 EDT 2023
% 0.14/0.36 % CPUTime :
% 0.21/0.60 start to proof:theBenchmark
% 0.95/1.08 %-------------------------------------------
% 0.95/1.08 % File :CSE---1.6
% 0.95/1.08 % Problem :theBenchmark
% 0.95/1.08 % Transform :cnf
% 0.95/1.08 % Format :tptp:raw
% 0.95/1.08 % Command :java -jar mcs_scs.jar %d %s
% 0.95/1.08
% 0.95/1.08 % Result :Theorem 0.420000s
% 0.95/1.08 % Output :CNFRefutation 0.420000s
% 0.95/1.08 %-------------------------------------------
% 0.95/1.09 %--------------------------------------------------------------------------
% 0.95/1.09 % File : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% 0.95/1.09 % Domain : Software Verification
% 0.95/1.09 % Problem : Fact 6 of the Neumann-Stubblebine analysis
% 0.95/1.09 % Version : [Wei99] axioms.
% 0.95/1.09 % English :
% 0.95/1.09
% 0.95/1.09 % Refs : [Wei99] Weidenbach (1999), Towards and Automatic Analysis of S
% 0.95/1.09 % [Bau99] Baumgartner (1999), FTP'2000 - Problem Sets
% 0.95/1.09 % Source : [TPTP]
% 0.95/1.09 % Names :
% 0.95/1.09
% 0.95/1.09 % Status : Unsatisfiable
% 0.95/1.09 % Rating : 0.43 v8.1.0, 0.50 v6.1.0, 0.64 v6.0.0, 0.56 v5.5.0, 0.62 v5.4.0, 0.61 v5.3.0, 0.65 v5.2.0, 0.69 v5.1.0, 0.62 v5.0.0, 0.53 v4.1.0, 0.60 v4.0.1, 0.71 v3.7.0, 0.57 v3.4.0, 0.40 v3.3.0, 0.33 v3.1.0, 0.17 v2.7.0, 0.38 v2.6.0, 0.14 v2.5.0, 0.57 v2.4.0
% 0.95/1.09 % Syntax : Number of clauses : 34 ( 11 unt; 0 nHn; 32 RR)
% 0.95/1.09 % Number of literals : 77 ( 0 equ; 44 neg)
% 0.95/1.09 % Maximal clause size : 5 ( 2 avg)
% 0.95/1.09 % Maximal term depth : 6 ( 1 avg)
% 0.95/1.09 % Number of predicates : 10 ( 10 usr; 0 prp; 1-1 aty)
% 0.95/1.09 % Number of functors : 15 ( 15 usr; 6 con; 0-4 aty)
% 0.95/1.09 % Number of variables : 75 ( 26 sgn)
% 0.95/1.09 % SPC : CNF_UNS_RFO_NEQ_HRN
% 0.95/1.09
% 0.95/1.09 % Comments : Created by tptp2X -f tptp -t cnf:otter SWV014+1.p
% 0.95/1.09 %--------------------------------------------------------------------------
% 0.95/1.09 cnf(a_is_party_of_protocol_2,axiom,
% 0.95/1.09 party_of_protocol(a) ).
% 0.95/1.09
% 0.95/1.09 cnf(a_sent_message_i_to_b_3,axiom,
% 0.95/1.09 message(sent(a,b,pair(a,an_a_nonce))) ).
% 0.95/1.09
% 0.95/1.09 cnf(a_stored_message_i_4,axiom,
% 0.95/1.09 a_stored(pair(b,an_a_nonce)) ).
% 0.95/1.09
% 0.95/1.09 cnf(a_forwards_secure_5,axiom,
% 0.95/1.09 ( message(sent(a,A,pair(E,encrypt(F,C))))
% 0.95/1.09 | ~ a_stored(pair(A,B))
% 0.95/1.09 | ~ message(sent(t,a,triple(encrypt(quadruple(A,B,C,D),at),E,F))) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(b_is_party_of_protocol_8,axiom,
% 0.95/1.09 party_of_protocol(b) ).
% 0.95/1.09
% 0.95/1.09 cnf(nonce_a_is_fresh_to_b_9,axiom,
% 0.95/1.09 fresh_to_b(an_a_nonce) ).
% 0.95/1.09
% 0.95/1.09 cnf(b_creates_freash_nonces_in_time_10,axiom,
% 0.95/1.09 ( message(sent(b,t,triple(b,generate_b_nonce(B),encrypt(triple(A,B,generate_expiration_time(B)),bt))))
% 0.95/1.09 | ~ fresh_to_b(B)
% 0.95/1.09 | ~ message(sent(A,b,pair(A,B))) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(b_creates_freash_nonces_in_time_11,axiom,
% 0.95/1.09 ( b_stored(pair(A,B))
% 0.95/1.09 | ~ fresh_to_b(B)
% 0.95/1.09 | ~ message(sent(A,b,pair(A,B))) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(b_accepts_secure_session_key_12,axiom,
% 0.95/1.09 ( b_holds(key(B,A))
% 0.95/1.09 | ~ b_stored(pair(A,C))
% 0.95/1.09 | ~ message(sent(A,b,pair(encrypt(triple(A,B,generate_expiration_time(C)),bt),encrypt(generate_b_nonce(C),B)))) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(t_holds_key_at_for_a_13,axiom,
% 0.95/1.09 t_holds(key(at,a)) ).
% 0.95/1.09
% 0.95/1.09 cnf(t_holds_key_bt_for_b_14,axiom,
% 0.95/1.09 t_holds(key(bt,b)) ).
% 0.95/1.09
% 0.95/1.09 cnf(t_is_party_of_protocol_15,axiom,
% 0.95/1.09 party_of_protocol(t) ).
% 0.95/1.09
% 0.95/1.09 cnf(server_t_generates_key_16,axiom,
% 0.95/1.09 ( message(sent(t,C,triple(encrypt(quadruple(A,D,generate_key(D),E),G),encrypt(triple(C,generate_key(D),E),F),B)))
% 0.95/1.09 | ~ a_nonce(D)
% 0.95/1.09 | ~ message(sent(A,t,triple(A,B,encrypt(triple(C,D,E),F))))
% 0.95/1.09 | ~ t_holds(key(G,C))
% 0.95/1.09 | ~ t_holds(key(F,A)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_can_record_17,axiom,
% 0.95/1.09 ( intruder_message(C)
% 0.95/1.09 | ~ message(sent(A,B,C)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_pairs_18,axiom,
% 0.95/1.09 ( intruder_message(A)
% 0.95/1.09 | ~ intruder_message(pair(A,B)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_pairs_19,axiom,
% 0.95/1.09 ( intruder_message(B)
% 0.95/1.09 | ~ intruder_message(pair(A,B)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_triples_20,axiom,
% 0.95/1.09 ( intruder_message(A)
% 0.95/1.09 | ~ intruder_message(triple(A,B,C)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_triples_21,axiom,
% 0.95/1.09 ( intruder_message(B)
% 0.95/1.09 | ~ intruder_message(triple(A,B,C)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_triples_22,axiom,
% 0.95/1.09 ( intruder_message(C)
% 0.95/1.09 | ~ intruder_message(triple(A,B,C)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_quadruples_23,axiom,
% 0.95/1.09 ( intruder_message(A)
% 0.95/1.09 | ~ intruder_message(quadruple(A,B,C,D)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_quadruples_24,axiom,
% 0.95/1.09 ( intruder_message(B)
% 0.95/1.09 | ~ intruder_message(quadruple(A,B,C,D)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_quadruples_25,axiom,
% 0.95/1.09 ( intruder_message(C)
% 0.95/1.09 | ~ intruder_message(quadruple(A,B,C,D)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_decomposes_quadruples_26,axiom,
% 0.95/1.09 ( intruder_message(D)
% 0.95/1.09 | ~ intruder_message(quadruple(A,B,C,D)) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_composes_pairs_27,axiom,
% 0.95/1.09 ( intruder_message(pair(A,B))
% 0.95/1.09 | ~ intruder_message(B)
% 0.95/1.09 | ~ intruder_message(A) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_composes_triples_28,axiom,
% 0.95/1.09 ( intruder_message(triple(A,B,C))
% 0.95/1.09 | ~ intruder_message(C)
% 0.95/1.09 | ~ intruder_message(B)
% 0.95/1.09 | ~ intruder_message(A) ) ).
% 0.95/1.09
% 0.95/1.09 cnf(intruder_composes_quadruples_29,axiom,
% 0.95/1.09 ( intruder_message(quadruple(A,B,C,D))
% 0.95/1.09 | ~ intruder_message(D)
% 1.06/1.09 | ~ intruder_message(C)
% 1.06/1.09 | ~ intruder_message(B)
% 1.06/1.09 | ~ intruder_message(A) ) ).
% 1.06/1.09
% 1.06/1.09 cnf(intruder_interception_30,axiom,
% 1.06/1.09 ( intruder_message(B)
% 1.06/1.09 | ~ intruder_holds(key(B,C))
% 1.06/1.09 | ~ intruder_message(encrypt(A,B))
% 1.06/1.09 | ~ party_of_protocol(C) ) ).
% 1.06/1.09
% 1.06/1.09 cnf(intruder_message_sent_31,axiom,
% 1.06/1.09 ( message(sent(B,C,A))
% 1.06/1.09 | ~ intruder_message(A)
% 1.06/1.09 | ~ party_of_protocol(C)
% 1.06/1.09 | ~ party_of_protocol(B) ) ).
% 1.06/1.09
% 1.06/1.09 cnf(intruder_holds_key_32,axiom,
% 1.06/1.09 ( intruder_holds(key(A,B))
% 1.06/1.09 | ~ intruder_message(A)
% 1.06/1.09 | ~ party_of_protocol(B) ) ).
% 1.06/1.09
% 1.06/1.09 cnf(intruder_key_encrypts_33,axiom,
% 1.06/1.09 ( intruder_message(encrypt(A,B))
% 1.06/1.09 | ~ intruder_holds(key(B,C))
% 1.06/1.09 | ~ intruder_message(A)
% 1.06/1.09 | ~ party_of_protocol(C) ) ).
% 1.06/1.09
% 1.06/1.09 cnf(an_a_nonce_is_a_nonce_34,axiom,
% 1.06/1.09 a_nonce(an_a_nonce) ).
% 1.06/1.09
% 1.06/1.09 cnf(generated_times_and_nonces_are_nonces_36,axiom,
% 1.06/1.09 a_nonce(generate_expiration_time(A)) ).
% 1.06/1.09
% 1.06/1.09 cnf(generated_times_and_nonces_are_nonces_37,axiom,
% 1.06/1.09 a_nonce(generate_b_nonce(A)) ).
% 1.06/1.09
% 1.06/1.09 cnf(co1_38,negated_conjecture,
% 1.06/1.09 ( ~ b_holds(key(A,a))
% 1.06/1.09 | ~ intruder_holds(key(A,b)) ) ).
% 1.06/1.09
% 1.06/1.09 %--------------------------------------------------------------------------
% 1.06/1.09 %-------------------------------------------
% 1.06/1.09 % Proof found
% 1.06/1.09 % SZS status Theorem for theBenchmark
% 1.06/1.09 % SZS output start Proof
% 1.06/1.09 %ClaNum:34(EqnAxiom:0)
% 1.06/1.09 %VarNum:145(SingletonVarNum:75)
% 1.06/1.09 %MaxLitNum:5
% 1.06/1.09 %MaxfuncDepth:5
% 1.06/1.09 %SharedTerms:20
% 1.06/1.09 %goalClause: 16
% 1.06/1.10 [1]P1(a1)
% 1.06/1.10 [2]P1(a2)
% 1.06/1.10 [3]P1(a5)
% 1.06/1.10 [4]P2(a3)
% 1.06/1.10 [5]P3(a3)
% 1.06/1.10 [8]P4(f10(a2,a3))
% 1.06/1.10 [9]P10(f11(a4,a1))
% 1.06/1.10 [10]P10(f11(a7,a2))
% 1.06/1.10 [11]P7(f13(a1,a2,f10(a1,a3)))
% 1.06/1.10 [6]P3(f6(x61))
% 1.06/1.10 [7]P3(f9(x71))
% 1.06/1.10 [16]~P9(f11(x161,a2))+~P5(f11(x161,a1))
% 1.06/1.10 [14]P8(x141)+~P8(f10(x142,x141))
% 1.06/1.10 [15]P8(x151)+~P8(f10(x151,x152))
% 1.06/1.10 [21]P8(x211)+~P7(f13(x212,x213,x211))
% 1.06/1.10 [22]P8(x221)+~P8(f15(x222,x223,x221))
% 1.06/1.10 [23]P8(x231)+~P8(f15(x232,x231,x233))
% 1.06/1.10 [24]P8(x241)+~P8(f15(x241,x242,x243))
% 1.06/1.10 [27]P8(x271)+~P8(f14(x272,x273,x274,x271))
% 1.06/1.10 [28]P8(x281)+~P8(f14(x282,x283,x281,x284))
% 1.06/1.10 [29]P8(x291)+~P8(f14(x292,x291,x293,x294))
% 1.06/1.10 [30]P8(x301)+~P8(f14(x301,x302,x303,x304))
% 1.06/1.10 [12]~P8(x122)+~P8(x121)+P8(f10(x121,x122))
% 1.06/1.10 [13]~P1(x132)+~P8(x131)+P9(f11(x131,x132))
% 1.06/1.10 [25]~P2(x252)+P6(f10(x251,x252))+~P7(f13(x251,a2,f10(x251,x252)))
% 1.06/1.10 [31]~P2(x311)+~P7(f13(x312,a2,f10(x312,x311)))+P7(f13(a2,a5,f15(a2,f6(x311),f8(f15(x312,x311,f9(x311)),a7))))
% 1.06/1.10 [32]P5(f11(x321,x322))+~P6(f10(x322,x323))+~P7(f13(x322,a2,f10(f8(f15(x322,x321,f9(x323)),a7),f8(f6(x323),x321))))
% 1.06/1.10 [33]~P4(f10(x331,x335))+P7(f13(a1,x331,f10(x332,f8(x333,x334))))+~P7(f13(a5,a1,f15(f8(f14(x331,x335,x334,x336),a4),x332,x333)))
% 1.06/1.10 [17]~P8(x171)+~P1(x173)+~P9(f11(x172,x173))+P8(f8(x171,x172))
% 1.06/1.10 [18]P8(x181)+~P1(x182)+~P9(f11(x181,x182))+~P8(f8(x183,x181))
% 1.06/1.10 [19]~P1(x192)+~P1(x191)+~P8(x193)+P7(f13(x191,x192,x193))
% 1.06/1.10 [20]~P8(x203)+~P8(x202)+~P8(x201)+P8(f15(x201,x202,x203))
% 1.06/1.10 [26]~P8(x264)+~P8(x263)+~P8(x262)+~P8(x261)+P8(f14(x261,x262,x263,x264))
% 1.06/1.10 [34]~P3(x343)+~P10(f11(x346,x342))+~P10(f11(x345,x341))+~P7(f13(x342,a5,f15(x342,x347,f8(f15(x341,x343,x344),x346))))+P7(f13(a5,x341,f15(f8(f14(x342,x343,f12(x343),x344),x345),f8(f15(x341,f12(x343),x344),x346),x347)))
% 1.06/1.10 %EqnAxiom
% 1.06/1.10
% 1.06/1.10 %-------------------------------------------
% 1.06/1.10 cnf(35,plain,
% 1.06/1.10 (P8(f10(a1,a3))),
% 1.06/1.10 inference(scs_inference,[],[11,21])).
% 1.06/1.10 cnf(36,plain,
% 1.06/1.10 (P8(a1)),
% 1.06/1.10 inference(scs_inference,[],[11,21,15])).
% 1.06/1.10 cnf(37,plain,
% 1.06/1.10 (P8(a3)),
% 1.06/1.10 inference(scs_inference,[],[11,21,15,14])).
% 1.06/1.10 cnf(39,plain,
% 1.06/1.10 (P6(f10(a1,a3))),
% 1.06/1.10 inference(scs_inference,[],[4,11,21,15,14,25])).
% 1.06/1.10 cnf(41,plain,
% 1.06/1.10 (P9(f11(f10(a1,a3),a1))),
% 1.06/1.10 inference(scs_inference,[],[1,4,11,21,15,14,25,13])).
% 1.06/1.10 cnf(43,plain,
% 1.06/1.10 (P8(f10(f10(a1,a3),f10(a1,a3)))),
% 1.06/1.10 inference(scs_inference,[],[1,4,11,21,15,14,25,13,12])).
% 1.06/1.10 cnf(45,plain,
% 1.06/1.10 (P7(f13(a2,a5,f15(a2,f6(a3),f8(f15(a1,a3,f9(a3)),a7))))),
% 1.06/1.10 inference(scs_inference,[],[1,4,11,21,15,14,25,13,12,31])).
% 1.06/1.10 cnf(47,plain,
% 1.06/1.10 (P8(f15(f10(a1,a3),f10(a1,a3),f10(a1,a3)))),
% 1.06/1.10 inference(scs_inference,[],[1,4,11,21,15,14,25,13,12,31,20])).
% 1.06/1.10 cnf(53,plain,
% 1.06/1.10 (P8(f14(f10(a1,a3),f10(a1,a3),f10(a1,a3),f10(a1,a3)))),
% 1.06/1.10 inference(scs_inference,[],[1,4,11,21,15,14,25,13,12,31,20,19,17,26])).
% 1.06/1.10 cnf(55,plain,
% 1.06/1.10 (P7(f13(a5,a1,f15(f8(f14(a2,a3,f12(a3),f9(a3)),a4),f8(f15(a1,f12(a3),f9(a3)),a7),f6(a3))))),
% 1.06/1.10 inference(scs_inference,[],[1,4,5,9,10,11,21,15,14,25,13,12,31,20,19,17,26,34])).
% 1.06/1.10 cnf(57,plain,
% 1.06/1.10 (P7(f13(a1,a2,f10(f8(f15(a1,f12(a3),f9(a3)),a7),f8(f6(a3),f12(a3)))))),
% 1.06/1.10 inference(scs_inference,[],[1,4,5,8,9,10,11,21,15,14,25,13,12,31,20,19,17,26,34,33])).
% 1.06/1.10 cnf(59,plain,
% 1.06/1.10 (P5(f11(f12(a3),a1))),
% 1.06/1.10 inference(scs_inference,[],[1,4,5,8,9,10,11,21,15,14,25,13,12,31,20,19,17,26,34,33,32])).
% 1.06/1.10 cnf(61,plain,
% 1.06/1.10 (P9(f11(f10(f10(a1,a3),f10(a1,a3)),a1))),
% 1.06/1.10 inference(scs_inference,[],[1,43,13])).
% 1.06/1.10 cnf(69,plain,
% 1.06/1.10 (P8(f8(f10(f10(a1,a3),f10(a1,a3)),f10(a1,a3)))),
% 1.06/1.10 inference(scs_inference,[],[1,43,41,13,12,19,20,17])).
% 1.06/1.10 cnf(73,plain,
% 1.06/1.10 (~P9(f11(f12(a3),a2))),
% 1.06/1.10 inference(scs_inference,[],[1,43,41,59,13,12,19,20,17,26,16])).
% 1.06/1.10 cnf(85,plain,
% 1.06/1.10 (~P8(f12(a3))),
% 1.06/1.10 inference(scs_inference,[],[2,35,69,61,73,1,19,20,17,26,13])).
% 1.06/1.10 cnf(87,plain,
% 1.06/1.10 (~P8(f14(f12(a3),x871,x872,x873))),
% 1.06/1.10 inference(scs_inference,[],[2,35,69,61,73,1,19,20,17,26,13,30])).
% 1.06/1.10 cnf(89,plain,
% 1.06/1.10 (~P8(f14(x891,f12(a3),x892,x893))),
% 1.06/1.10 inference(scs_inference,[],[2,35,69,61,73,1,19,20,17,26,13,30,29])).
% 1.06/1.10 cnf(111,plain,
% 1.06/1.10 (P9(f11(f10(a1,a3),a2))),
% 1.06/1.10 inference(scs_inference,[],[2,35,57,21,15,13])).
% 1.06/1.10 cnf(115,plain,
% 1.06/1.10 (P8(f8(f6(a3),f12(a3)))),
% 1.06/1.10 inference(scs_inference,[],[2,35,87,57,21,15,13,18,14])).
% 1.06/1.10 cnf(117,plain,
% 1.06/1.10 (~P5(f11(f10(a1,a3),a1))),
% 1.06/1.10 inference(scs_inference,[],[2,35,87,57,21,15,13,18,14,16])).
% 1.06/1.10 cnf(119,plain,
% 1.06/1.10 (~P7(f13(a1,a2,f10(f8(f15(a1,f10(a1,a3),f9(a3)),a7),f8(f6(a3),f10(a1,a3)))))),
% 1.06/1.10 inference(scs_inference,[],[117,39,32])).
% 1.06/1.10 cnf(123,plain,
% 1.06/1.10 (~P8(f10(x1231,f14(x1232,f12(a3),x1233,x1234)))),
% 1.06/1.10 inference(scs_inference,[],[3,115,117,39,85,89,32,18,14])).
% 1.06/1.10 cnf(127,plain,
% 1.06/1.10 (P9(f11(a1,a5))),
% 1.06/1.10 inference(scs_inference,[],[3,36,115,117,39,85,89,2,1,32,18,14,19,13])).
% 1.06/1.10 cnf(131,plain,
% 1.06/1.10 (~P8(f10(f14(x1311,f12(a3),x1312,x1313),x1314))),
% 1.06/1.10 inference(scs_inference,[],[3,36,115,117,39,85,89,2,1,32,18,14,19,13,21,15])).
% 1.06/1.10 cnf(135,plain,
% 1.06/1.10 (~P8(f6(a3))+~P8(f8(f15(a1,f10(a1,a3),f9(a3)),a7))),
% 1.06/1.10 inference(scs_inference,[],[3,36,115,117,111,39,85,89,2,1,32,18,14,19,13,21,15,12,17])).
% 1.06/1.10 cnf(147,plain,
% 1.06/1.10 (P8(f8(f15(a1,a3,f9(a3)),a7))),
% 1.06/1.10 inference(scs_inference,[],[3,36,45,127,17,19,12,21,22])).
% 1.06/1.10 cnf(151,plain,
% 1.06/1.10 (P8(f6(a3))),
% 1.06/1.10 inference(scs_inference,[],[3,36,45,127,17,19,12,21,22,24,23])).
% 1.06/1.10 cnf(158,plain,
% 1.06/1.10 (~P8(f8(f15(a1,f10(a1,a3),f9(a3)),a7))),
% 1.07/1.10 inference(scs_inference,[],[151,135])).
% 1.07/1.10 cnf(163,plain,
% 1.07/1.10 (~P8(f15(x1631,f10(x1632,f14(x1633,f12(a3),x1634,x1635)),x1636))),
% 1.07/1.10 inference(scs_inference,[],[123,22,24,23])).
% 1.07/1.10 cnf(169,plain,
% 1.07/1.10 (P9(f11(a3,a5))),
% 1.07/1.10 inference(scs_inference,[],[37,123,127,3,22,24,23,17,19,13])).
% 1.07/1.10 cnf(177,plain,
% 1.07/1.10 (~P8(f14(x1771,f10(x1772,f14(x1773,f12(a3),x1774,x1775)),x1776,x1777))),
% 1.07/1.10 inference(scs_inference,[],[37,123,127,3,22,24,23,17,19,13,21,30,27,29])).
% 1.07/1.10 cnf(185,plain,
% 1.07/1.10 (~P8(f10(f10(x1851,f14(x1852,f12(a3),x1853,x1854)),x1855))),
% 1.07/1.10 inference(scs_inference,[],[37,123,127,3,22,24,23,17,19,13,21,30,27,29,28,14,20,15])).
% 1.07/1.10 cnf(189,plain,
% 1.07/1.10 (P9(f11(a1,a2))),
% 1.07/1.10 inference(scs_inference,[],[36,2,19,13])).
% 1.07/1.10 cnf(193,plain,
% 1.07/1.10 (P8(f8(f14(a2,a3,f12(a3),f9(a3)),a4))),
% 1.07/1.10 inference(scs_inference,[],[36,55,2,19,13,21,24])).
% 1.07/1.10 cnf(197,plain,
% 1.07/1.10 (~P5(f11(a1,a1))),
% 1.07/1.10 inference(scs_inference,[],[36,158,55,2,19,13,21,24,17,16])).
% 1.07/1.10 cnf(233,plain,
% 1.07/1.10 (~P7(f13(a5,a1,f15(f8(f14(a2,a3,f10(a1,a3),x2331),a4),f8(f15(a1,f10(a1,a3),f9(a3)),a7),f6(a3))))),
% 1.07/1.10 inference(scs_inference,[],[39,41,8,37,197,177,119,85,115,1,2,32,18,19,17,13,27,33])).
% 1.07/1.10 cnf(293,plain,
% 1.07/1.10 (~P5(f11(a3,a1))),
% 1.07/1.10 inference(scs_inference,[],[37,43,233,185,189,2,3,1,17,13,19,27,30,29,28,14,15,21,16])).
% 1.07/1.10 cnf(297,plain,
% 1.07/1.10 (~P8(f15(x2971,x2972,f10(f14(x2973,f12(a3),x2974,x2975),x2976)))),
% 1.07/1.10 inference(scs_inference,[],[131,22])).
% 1.07/1.10 cnf(305,plain,
% 1.07/1.10 (~P7(f13(a1,a2,f10(f8(f15(a1,a3,f9(a3)),a7),f8(f6(a3),a3))))),
% 1.07/1.10 inference(scs_inference,[],[47,39,297,293,20,24,32])).
% 1.07/1.10 cnf(360,plain,
% 1.07/1.10 (~P8(f8(f6(a3),a3))),
% 1.07/1.10 inference(scs_inference,[],[305,163,193,147,3,1,2,19,27,30,29,28,15,14,21,18,12])).
% 1.07/1.10 cnf(366,plain,
% 1.07/1.10 ($false),
% 1.07/1.10 inference(scs_inference,[],[53,360,169,151,3,12,17]),
% 1.07/1.10 ['proof']).
% 1.07/1.10 % SZS output end Proof
% 1.07/1.10 % Total time :0.420000s
%------------------------------------------------------------------------------