TSTP Solution File: SWV014-1 by ConnectPP---0.3.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : ConnectPP---0.3.0
% Problem  : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : connect++ --verbosity 0 --no-colour --tptp-proof --schedule default %s

% Computer : n018.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Mon Mar 25 14:37:37 EDT 2024

% Result   : Timeout 295.24s 295.43s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem  : SWV014-1 : TPTP v8.1.2. Released v2.4.0.
% 0.07/0.13  % Command  : connect++ --verbosity 0 --no-colour --tptp-proof --schedule default %s
% 0.13/0.34  % Computer : n018.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 300
% 0.13/0.34  % DateTime : Thu Mar 21 08:31:14 EDT 2024
% 0.13/0.34  % CPUTime  : 
% 295.24/295.43  % SZS status Unsatisfiable for theBenchmark
% 295.24/295.43  % SZS output start Proof for theBenchmark
% 295.24/295.43  
% 295.24/295.43  % Problem matrix:
% 295.24/295.43  cnf(matrix-0, plain, ( party_of_protocol(a) )).
% 295.24/295.43  cnf(matrix-1, plain, ( message(sent(a, b, pair(a, an_a_nonce))) )).
% 295.24/295.43  cnf(matrix-2, plain, ( a_stored(pair(b, an_a_nonce)) )).
% 295.24/295.43  cnf(matrix-3, plain, ( message(sent(a, A, pair(E, encrypt(F, C)))) | ~a_stored(pair(A, B)) | ~message(sent(t, a, triple(encrypt(quadruple(A, B, C, D), at), E, F))) )).
% 295.24/295.43  cnf(matrix-4, plain, ( party_of_protocol(b) )).
% 295.24/295.43  cnf(matrix-5, plain, ( fresh_to_b(an_a_nonce) )).
% 295.24/295.43  cnf(matrix-6, plain, ( message(sent(b, t, triple(b, generate_b_nonce(B), encrypt(triple(A, B, generate_expiration_time(B)), bt)))) | ~fresh_to_b(B) | ~message(sent(A, b, pair(A, B))) )).
% 295.24/295.43  cnf(matrix-7, plain, ( b_stored(pair(A, B)) | ~fresh_to_b(B) | ~message(sent(A, b, pair(A, B))) )).
% 295.24/295.43  cnf(matrix-8, plain, ( b_holds(key(B, A)) | ~b_stored(pair(A, C)) | ~message(sent(A, b, pair(encrypt(triple(A, B, generate_expiration_time(C)), bt), encrypt(generate_b_nonce(C), B)))) )).
% 295.24/295.43  cnf(matrix-9, plain, ( t_holds(key(at, a)) )).
% 295.24/295.43  cnf(matrix-10, plain, ( t_holds(key(bt, b)) )).
% 295.24/295.43  cnf(matrix-11, plain, ( party_of_protocol(t) )).
% 295.24/295.43  cnf(matrix-12, plain, ( message(sent(t, C, triple(encrypt(quadruple(A, D, generate_key(D), E), G), encrypt(triple(C, generate_key(D), E), F), B))) | ~a_nonce(D) | ~message(sent(A, t, triple(A, B, encrypt(triple(C, D, E), F)))) | ~t_holds(key(G, C)) | ~t_holds(key(F, A)) )).
% 295.24/295.43  cnf(matrix-13, plain, ( intruder_message(C) | ~message(sent(A, B, C)) )).
% 295.24/295.43  cnf(matrix-14, plain, ( intruder_message(A) | ~intruder_message(pair(A, B)) )).
% 295.24/295.43  cnf(matrix-15, plain, ( intruder_message(B) | ~intruder_message(pair(A, B)) )).
% 295.24/295.43  cnf(matrix-16, plain, ( intruder_message(A) | ~intruder_message(triple(A, B, C)) )).
% 295.24/295.43  cnf(matrix-17, plain, ( intruder_message(B) | ~intruder_message(triple(A, B, C)) )).
% 295.24/295.43  cnf(matrix-18, plain, ( intruder_message(C) | ~intruder_message(triple(A, B, C)) )).
% 295.24/295.43  cnf(matrix-19, plain, ( intruder_message(A) | ~intruder_message(quadruple(A, B, C, D)) )).
% 295.24/295.43  cnf(matrix-20, plain, ( intruder_message(B) | ~intruder_message(quadruple(A, B, C, D)) )).
% 295.24/295.43  cnf(matrix-21, plain, ( intruder_message(C) | ~intruder_message(quadruple(A, B, C, D)) )).
% 295.24/295.43  cnf(matrix-22, plain, ( intruder_message(D) | ~intruder_message(quadruple(A, B, C, D)) )).
% 295.24/295.43  cnf(matrix-23, plain, ( intruder_message(pair(A, B)) | ~intruder_message(B) | ~intruder_message(A) )).
% 295.24/295.43  cnf(matrix-24, plain, ( intruder_message(triple(A, B, C)) | ~intruder_message(C) | ~intruder_message(B) | ~intruder_message(A) )).
% 295.24/295.43  cnf(matrix-25, plain, ( intruder_message(quadruple(A, B, C, D)) | ~intruder_message(D) | ~intruder_message(C) | ~intruder_message(B) | ~intruder_message(A) )).
% 295.24/295.43  cnf(matrix-26, plain, ( intruder_message(B) | ~intruder_holds(key(B, C)) | ~intruder_message(encrypt(A, B)) | ~party_of_protocol(C) )).
% 295.24/295.43  cnf(matrix-27, plain, ( message(sent(B, C, A)) | ~intruder_message(A) | ~party_of_protocol(C) | ~party_of_protocol(B) )).
% 295.24/295.43  cnf(matrix-28, plain, ( intruder_holds(key(A, B)) | ~intruder_message(A) | ~party_of_protocol(B) )).
% 295.24/295.43  cnf(matrix-29, plain, ( intruder_message(encrypt(A, B)) | ~intruder_holds(key(B, C)) | ~intruder_message(A) | ~party_of_protocol(C) )).
% 295.24/295.43  cnf(matrix-30, plain, ( a_nonce(an_a_nonce) )).
% 295.24/295.43  cnf(matrix-31, plain, ( a_nonce(generate_expiration_time(A)) )).
% 295.24/295.43  cnf(matrix-32, plain, ( a_nonce(generate_b_nonce(A)) )).
% 295.24/295.43  cnf(matrix-33, plain, ( ~b_holds(key(A, a)) | ~intruder_holds(key(A, b)) )).
% 295.24/295.43  
% 295.24/295.43  % Proof stack:
% 295.24/295.43  cnf(proof-stack, plain, 
% 295.24/295.43  proof_stack(
% 295.24/295.43  start(33), 
% 295.24/295.43  left_branch(0, 8, 0, 2), 
% 295.24/295.43  left_branch(0, 27, 0, 3), 
% 295.24/295.43  left_branch(0, 0, 0, 4), 
% 295.24/295.43  right_branch(4), 
% 295.24/295.43  left_branch(0, 4, 0, 5), 
% 295.24/295.43  right_branch(5), 
% 295.24/295.43  left_branch(0, 23, 0, 6), 
% 295.24/295.43  left_branch(0, 18, 0, 7), 
% 295.24/295.43  left_branch(0, 13, 0, 8), 
% 295.24/295.43  left_branch(0, 6, 0, 9), 
% 295.24/295.43  left_branch(0, 1, 0, 10), 
% 295.24/295.43  right_branch(10), 
% 295.24/295.43  left_branch(0, 5, 0, 11), 
% 295.24/295.43  right_branch(11), 
% 295.24/295.43  right_branch(9), 
% 295.24/295.43  right_branch(8), 
% 295.24/295.43  right_branch(7), 
% 295.24/295.43  left_branch(0, 29, 0, 8), 
% 295.24/295.43  left_branch(0, 11, 0, 9), 
% 295.24/295.43  right_branch(9), 
% 295.24/295.43  left_branch(0, 17, 0, 10), 
% 295.24/295.43  left_branch(0, 13, 0, 11), 
% 295.24/295.43  left_branch(0, 6, 0, 12), 
% 295.24/295.43  left_branch(0, 1, 0, 13), 
% 295.24/295.43  right_branch(13), 
% 295.24/295.43  left_branch(0, 5, 0, 14), 
% 295.24/295.43  right_branch(14), 
% 295.24/295.43  right_branch(12), 
% 295.24/295.43  right_branch(11), 
% 295.24/295.43  right_branch(10), 
% 295.24/295.43  left_branch(0, 28, 0, 11), 
% 295.24/295.43  lemmata(0, 3), 
% 295.24/295.43  left_branch(0, 15, 0, 13), 
% 295.24/295.43  left_branch(0, 13, 0, 14), 
% 295.24/295.43  left_branch(0, 1, 0, 15), 
% 295.24/295.43  right_branch(15), 
% 295.24/295.43  right_branch(14), 
% 295.24/295.43  right_branch(13), 
% 295.24/295.43  right_branch(11), 
% 295.24/295.43  right_branch(8), 
% 295.24/295.43  right_branch(6), 
% 295.24/295.43  right_branch(3), 
% 295.24/295.43  left_branch(0, 7, 0, 4), 
% 295.24/295.43  left_branch(0, 27, 0, 5), 
% 295.24/295.43  left_branch(0, 0, 0, 6), 
% 295.24/295.43  right_branch(6), 
% 295.24/295.43  left_branch(0, 4, 0, 7), 
% 295.24/295.43  right_branch(7), 
% 295.24/295.43  left_branch(0, 23, 0, 8), 
% 295.24/295.43  left_branch(0, 14, 0, 9), 
% 295.24/295.43  left_branch(0, 13, 0, 10), 
% 295.24/295.43  left_branch(0, 1, 0, 11), 
% 295.24/295.43  right_branch(11), 
% 295.24/295.43  right_branch(10), 
% 295.24/295.43  right_branch(9), 
% 295.24/295.43  left_branch(0, 15, 0, 10), 
% 295.24/295.43  left_branch(0, 13, 0, 11), 
% 295.24/295.43  left_branch(0, 1, 0, 12), 
% 295.24/295.43  right_branch(12), 
% 295.24/295.43  right_branch(11), 
% 295.24/295.43  right_branch(10), 
% 295.24/295.43  right_branch(8), 
% 295.24/295.43  right_branch(5), 
% 295.24/295.43  left_branch(0, 5, 0, 6), 
% 295.24/295.43  right_branch(6), 
% 295.24/295.43  right_branch(4), 
% 295.24/295.43  right_branch(2), 
% 295.24/295.43  left_branch(0, 28, 0, 3), 
% 295.24/295.43  left_branch(0, 4, 0, 4), 
% 295.24/295.43  right_branch(4), 
% 295.24/295.43  left_branch(0, 15, 0, 5), 
% 295.24/295.43  left_branch(0, 13, 0, 6), 
% 295.24/295.43  left_branch(0, 1, 0, 7), 
% 295.24/295.43  right_branch(7), 
% 295.24/295.43  right_branch(6), 
% 295.24/295.43  right_branch(5), 
% 295.24/295.43  right_branch(3)
% 295.24/295.43  )).
% 295.24/295.43  % SZS output end Proof for theBenchmark
%------------------------------------------------------------------------------