TSTP Solution File: SWW959+1 by CSE_E---1.5
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : CSE_E---1.5
% Problem : SWW959+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : java -jar /export/starexec/sandbox2/solver/bin/mcs_scs.jar %d %s
% Computer : n031.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Fri Sep 1 00:19:21 EDT 2023
% Result : Theorem 0.21s 0.60s
% Output : CNFRefutation 0.21s
% Verified :
% SZS Type : Refutation
% Derivation depth : 10
% Number of leaves : 62
% Syntax : Number of formulae : 86 ( 11 unt; 54 typ; 0 def)
% Number of atoms : 77 ( 0 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 82 ( 37 ~; 35 |; 5 &)
% ( 0 <=>; 5 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 4 avg)
% Maximal term depth : 4 ( 1 avg)
% Number of types : 2 ( 0 usr)
% Number of type conns : 54 ( 39 >; 15 *; 0 +; 0 <<)
% Number of predicates : 6 ( 5 usr; 1 prp; 0-2 aty)
% Number of functors : 49 ( 49 usr; 15 con; 0-2 aty)
% Number of variables : 48 ( 19 sgn; 22 !; 0 ?; 0 :)
% Comments :
%------------------------------------------------------------------------------
tff(decl_22,type,
constr_CONST_0x30: $i ).
tff(decl_23,type,
constr_CONST_1: $i ).
tff(decl_24,type,
constr_CONST_2: $i ).
tff(decl_25,type,
constr_CONST_3: $i ).
tff(decl_26,type,
constr_CONST_4: $i ).
tff(decl_27,type,
name_A: $i ).
tff(decl_28,type,
name_B: $i ).
tff(decl_29,type,
name_I: $i ).
tff(decl_30,type,
name_c: $i ).
tff(decl_31,type,
name_objective: $i ).
tff(decl_32,type,
name_skA: $i ).
tff(decl_33,type,
name_skB: $i ).
tff(decl_34,type,
name_skS: $i ).
tff(decl_35,type,
constr_pkey: $i > $i ).
tff(decl_36,type,
constr_aenc: ( $i * $i ) > $i ).
tff(decl_37,type,
constr_adec: ( $i * $i ) > $i ).
tff(decl_38,type,
constr_enc: ( $i * $i ) > $i ).
tff(decl_39,type,
constr_dec: ( $i * $i ) > $i ).
tff(decl_40,type,
constr_sign: ( $i * $i ) > $i ).
tff(decl_41,type,
constr_getmess: $i > $i ).
tff(decl_42,type,
constr_checksign: ( $i * $i ) > $i ).
tff(decl_43,type,
tuple_2: ( $i * $i ) > $i ).
tff(decl_44,type,
constr_tuple_2_get_1_bitstring: $i > $i ).
tff(decl_45,type,
constr_tuple_2_get_0x30_bitstring: $i > $i ).
tff(decl_46,type,
constr_tuple_2_get_1: $i > $i ).
tff(decl_47,type,
constr_tuple_2_get_0x30: $i > $i ).
tff(decl_48,type,
pred_eq_bitstring_bitstring: ( $i * $i ) > $o ).
tff(decl_49,type,
pred_attacker: $i > $o ).
tff(decl_50,type,
tuple_true: $i ).
tff(decl_51,type,
tuple_out_3: $i > $i ).
tff(decl_52,type,
tuple_out_2: $i > $i ).
tff(decl_53,type,
tuple_out_1: $i > $i ).
tff(decl_54,type,
tuple_key_retrieval_server_out_2: $i > $i ).
tff(decl_55,type,
tuple_key_retrieval_server_in_1: ( $i * $i ) > $i ).
tff(decl_56,type,
tuple_key_register_server_in_1: ( $i * $i ) > $i ).
tff(decl_57,type,
tuple_false: $i ).
tff(decl_58,type,
tuple_client_B_out_6: $i > $i ).
tff(decl_59,type,
tuple_client_B_out_4: $i > $i ).
tff(decl_60,type,
tuple_client_B_out_1: ( $i * $i ) > $i ).
tff(decl_61,type,
tuple_client_B_in_5: $i > $i ).
tff(decl_62,type,
tuple_client_B_in_3: $i > $i ).
tff(decl_63,type,
tuple_client_B_in_2: $i > $i ).
tff(decl_64,type,
tuple_client_A_out_5: $i > $i ).
tff(decl_65,type,
tuple_client_A_out_3: $i > $i ).
tff(decl_66,type,
tuple_client_A_out_1: ( $i * $i ) > $i ).
tff(decl_67,type,
tuple_client_A_in_4: $i > $i ).
tff(decl_68,type,
tuple_client_A_in_2: $i > $i ).
tff(decl_69,type,
pred_mess: ( $i * $i ) > $o ).
tff(decl_70,type,
pred_equal: ( $i * $i ) > $o ).
tff(decl_71,type,
name_new0x2Dname: $i > $i ).
tff(decl_72,type,
tuple_keys: ( $i * $i ) > $i ).
tff(decl_73,type,
pred_table: $i > $o ).
tff(decl_74,type,
name_Na: $i > $i ).
tff(decl_75,type,
name_Nb: $i > $i ).
fof(ax165,axiom,
! [X107,X108,X109,X110] :
( ( pred_eq_bitstring_bitstring(name_Nb(X107),constr_adec(X109,name_skB))
& pred_attacker(tuple_client_B_in_5(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X108,name_skB)))
& pred_attacker(tuple_client_B_in_3(X108))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X110,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X110)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).
fof(ax86,axiom,
! [X17,X18] : pred_eq_bitstring_bitstring(X17,X18),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(ax119,axiom,
! [X61] :
( pred_attacker(X61)
=> pred_attacker(tuple_client_B_in_5(X61)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).
fof(ax121,axiom,
! [X63] :
( pred_attacker(X63)
=> pred_attacker(tuple_client_B_in_3(X63)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(ax123,axiom,
! [X65] :
( pred_attacker(X65)
=> pred_attacker(tuple_client_B_in_2(X65)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).
fof(ax154,axiom,
! [X98] : pred_attacker(name_new0x2Dname(X98)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax154) ).
fof(ax113,axiom,
! [X52] :
( pred_attacker(tuple_client_B_out_6(X52))
=> pred_attacker(X52) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(co0,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(c_0_8,plain,
! [X222,X223,X224,X225] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X222),constr_adec(X224,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X224))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X223,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X223))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X225,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X225))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax165])]) ).
fof(c_0_9,plain,
! [X132,X133] : pred_eq_bitstring_bitstring(X132,X133),
inference(variable_rename,[status(thm)],[ax86]) ).
cnf(c_0_10,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X4,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X4)) ),
inference(split_conjunct,[status(thm)],[c_0_8]) ).
cnf(c_0_11,plain,
pred_eq_bitstring_bitstring(X1,X2),
inference(split_conjunct,[status(thm)],[c_0_9]) ).
fof(c_0_12,plain,
! [X176] :
( ~ pred_attacker(X176)
| pred_attacker(tuple_client_B_in_5(X176)) ),
inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax119])]) ).
cnf(c_0_13,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(tuple_client_B_in_2(X4)) ),
inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(rw,[status(thm)],[c_0_10,c_0_11]),c_0_11]),c_0_11])]) ).
cnf(c_0_14,plain,
( pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_attacker(X1) ),
inference(split_conjunct,[status(thm)],[c_0_12]) ).
fof(c_0_15,plain,
! [X178] :
( ~ pred_attacker(X178)
| pred_attacker(tuple_client_B_in_3(X178)) ),
inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax121])]) ).
cnf(c_0_16,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_13,c_0_14]) ).
cnf(c_0_17,plain,
( pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X1) ),
inference(split_conjunct,[status(thm)],[c_0_15]) ).
fof(c_0_18,plain,
! [X180] :
( ~ pred_attacker(X180)
| pred_attacker(tuple_client_B_in_2(X180)) ),
inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax123])]) ).
cnf(c_0_19,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(X2)
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_16,c_0_17]) ).
cnf(c_0_20,plain,
( pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(X1) ),
inference(split_conjunct,[status(thm)],[c_0_18]) ).
fof(c_0_21,plain,
! [X213] : pred_attacker(name_new0x2Dname(X213)),
inference(variable_rename,[status(thm)],[ax154]) ).
cnf(c_0_22,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_19,c_0_20]) ).
cnf(c_0_23,plain,
pred_attacker(name_new0x2Dname(X1)),
inference(split_conjunct,[status(thm)],[c_0_21]) ).
cnf(c_0_24,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(spm,[status(thm)],[c_0_22,c_0_23]) ).
fof(c_0_25,plain,
! [X167] :
( ~ pred_attacker(tuple_client_B_out_6(X167))
| pred_attacker(X167) ),
inference(variable_rename,[status(thm)],[inference(fof_nnf,[status(thm)],[ax113])]) ).
cnf(c_0_26,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(X1) ),
inference(spm,[status(thm)],[c_0_24,c_0_23]) ).
fof(c_0_27,negated_conjecture,
~ pred_attacker(name_objective),
inference(fof_simplification,[status(thm)],[inference(assume_negation,[status(cth)],[co0])]) ).
cnf(c_0_28,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_B_out_6(X1)) ),
inference(split_conjunct,[status(thm)],[c_0_25]) ).
cnf(c_0_29,plain,
pred_attacker(tuple_client_B_out_6(name_objective)),
inference(spm,[status(thm)],[c_0_26,c_0_23]) ).
cnf(c_0_30,negated_conjecture,
~ pred_attacker(name_objective),
inference(split_conjunct,[status(thm)],[c_0_27]) ).
cnf(c_0_31,plain,
$false,
inference(sr,[status(thm)],[inference(spm,[status(thm)],[c_0_28,c_0_29]),c_0_30]),
[proof] ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.12/0.13 % Problem : SWW959+1 : TPTP v8.1.2. Released v7.4.0.
% 0.12/0.13 % Command : java -jar /export/starexec/sandbox2/solver/bin/mcs_scs.jar %d %s
% 0.14/0.35 % Computer : n031.cluster.edu
% 0.14/0.35 % Model : x86_64 x86_64
% 0.14/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35 % Memory : 8042.1875MB
% 0.14/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35 % CPULimit : 300
% 0.14/0.35 % WCLimit : 300
% 0.14/0.35 % DateTime : Sun Aug 27 21:27:39 EDT 2023
% 0.14/0.35 % CPUTime :
% 0.21/0.57 start to proof: theBenchmark
% 0.21/0.60 % Version : CSE_E---1.5
% 0.21/0.60 % Problem : theBenchmark.p
% 0.21/0.60 % Proof found
% 0.21/0.60 % SZS status Theorem for theBenchmark.p
% 0.21/0.60 % SZS output start Proof
% See solution above
% 0.21/0.61 % Total time : 0.016000 s
% 0.21/0.61 % SZS output end Proof
% 0.21/0.61 % Total time : 0.021000 s
%------------------------------------------------------------------------------