TSTP Solution File: SWW960+1 by Vampire---4.9

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Vampire---4.9
% Problem  : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_vampire %s %d THM

% Computer : n016.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Mon Jun 24 18:47:14 EDT 2024

% Result   : Theorem 0.21s 0.47s
% Output   : Refutation 0.21s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   15
%            Number of leaves      :   44
% Syntax   : Number of formulae    :  203 (  34 unt;   0 def)
%            Number of atoms       :  548 (  45 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  605 ( 260   ~; 256   |;  36   &)
%                                         (  12 <=>;  41  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    6 (   2 avg)
%            Number of predicates  :   17 (  15 usr;  13 prp; 0-2 aty)
%            Number of functors    :   34 (  34 usr;  10 con; 0-2 aty)
%            Number of variables   :  295 ( 293   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1695,plain,
    $false,
    inference(avatar_sat_refutation,[],[f516,f567,f619,f686,f832,f956,f1023,f1172,f1416,f1516,f1542,f1545,f1694]) ).

fof(f1694,plain,
    ~ spl1_14,
    inference(avatar_contradiction_clause,[],[f1560]) ).

fof(f1560,plain,
    ( $false
    | ~ spl1_14 ),
    inference(resolution,[],[f785,f334]) ).

fof(f334,plain,
    pred_attacker(constr_CONST_0x30),
    inference(cnf_transformation,[],[f144]) ).

fof(f144,axiom,
    pred_attacker(constr_CONST_0x30),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f785,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl1_14 ),
    inference(avatar_component_clause,[],[f784]) ).

fof(f784,plain,
    ( spl1_14
  <=> ! [X1] : ~ pred_attacker(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_14])]) ).

fof(f1545,plain,
    ( spl1_14
    | ~ spl1_1 ),
    inference(avatar_split_clause,[],[f1544,f504,f784]) ).

fof(f504,plain,
    ( spl1_1
  <=> ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).

fof(f1544,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_1 ),
    inference(resolution,[],[f505,f436]) ).

fof(f436,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f256]) ).

fof(f256,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f185]) ).

fof(f185,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f505,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ spl1_1 ),
    inference(avatar_component_clause,[],[f504]) ).

fof(f1542,plain,
    ( ~ spl1_4
    | ~ spl1_84 ),
    inference(avatar_contradiction_clause,[],[f1541]) ).

fof(f1541,plain,
    ( $false
    | ~ spl1_4
    | ~ spl1_84 ),
    inference(resolution,[],[f1515,f663]) ).

fof(f663,plain,
    ( ~ pred_attacker(name_Nb(sK0))
    | ~ spl1_4 ),
    inference(subsumption_resolution,[],[f660,f627]) ).

fof(f627,plain,
    ( pred_attacker(name_objective)
    | ~ spl1_4 ),
    inference(resolution,[],[f449,f515]) ).

fof(f515,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl1_4 ),
    inference(avatar_component_clause,[],[f513]) ).

fof(f513,plain,
    ( spl1_4
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).

fof(f449,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f269]) ).

fof(f269,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f198]) ).

fof(f198,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f660,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(name_Nb(sK0)) ),
    inference(resolution,[],[f487,f327]) ).

fof(f327,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f326]) ).

fof(f326,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f244,f325]) ).

fof(f325,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f244,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f171]) ).

fof(f171,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f170]) ).

fof(f170,negated_conjecture,
    ~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    inference(negated_conjecture,[],[f169]) ).

fof(f169,conjecture,
    ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f487,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f310]) ).

fof(f310,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f309]) ).

fof(f309,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f235]) ).

fof(f235,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f145]) ).

fof(f145,axiom,
    ! [X86,X87] :
      ( ( pred_attacker(X87)
        & pred_attacker(X86) )
     => pred_attacker(tuple_2(X86,X87)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1515,plain,
    ( ! [X1] : pred_attacker(name_Nb(X1))
    | ~ spl1_84 ),
    inference(avatar_component_clause,[],[f1514]) ).

fof(f1514,plain,
    ( spl1_84
  <=> ! [X1] : pred_attacker(name_Nb(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_84])]) ).

fof(f1516,plain,
    ( spl1_2
    | spl1_84
    | ~ spl1_7
    | ~ spl1_80 ),
    inference(avatar_split_clause,[],[f1512,f1414,f680,f1514,f507]) ).

fof(f507,plain,
    ( spl1_2
  <=> ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).

fof(f680,plain,
    ( spl1_7
  <=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).

fof(f1414,plain,
    ( spl1_80
  <=> ! [X0] :
        ( ~ pred_attacker(tuple_client_A_in_4(X0))
        | pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_80])]) ).

fof(f1512,plain,
    ( ! [X0,X1] :
        ( pred_attacker(name_Nb(X1))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl1_7
    | ~ spl1_80 ),
    inference(forward_demodulation,[],[f1499,f461]) ).

fof(f461,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f210]) ).

fof(f210,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f83]) ).

fof(f83,axiom,
    ! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1499,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_B_in_3(X0))
        | pred_attacker(constr_tuple_2_get_1_bitstring(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)))) )
    | ~ spl1_7
    | ~ spl1_80 ),
    inference(resolution,[],[f1000,f1426]) ).

fof(f1426,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
        | pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
    | ~ spl1_80 ),
    inference(resolution,[],[f1425,f427]) ).

fof(f427,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f247]) ).

fof(f247,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f176]) ).

fof(f176,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f133]) ).

fof(f133,axiom,
    ! [X76] :
      ( pred_attacker(X76)
     => pred_attacker(tuple_client_A_in_4(X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1425,plain,
    ( ! [X0] :
        ( ~ pred_attacker(tuple_client_A_in_4(constr_aenc(X0,constr_pkey(name_skA))))
        | pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
    | ~ spl1_80 ),
    inference(superposition,[],[f1415,f464]) ).

fof(f464,plain,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f79]) ).

fof(f79,axiom,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1415,plain,
    ( ! [X0] :
        ( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)))
        | ~ pred_attacker(tuple_client_A_in_4(X0)) )
    | ~ spl1_80 ),
    inference(avatar_component_clause,[],[f1414]) ).

fof(f1000,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA)))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl1_7 ),
    inference(resolution,[],[f964,f447]) ).

fof(f447,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f267]) ).

fof(f267,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f196]) ).

fof(f196,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f116]) ).

fof(f116,axiom,
    ! [X53] :
      ( pred_attacker(tuple_client_B_out_4(X53))
     => pred_attacker(X53) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f964,plain,
    ( ! [X0,X1] :
        ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA))))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl1_7 ),
    inference(resolution,[],[f959,f868]) ).

fof(f868,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(constr_sign(tuple_2(X3,X2),name_skS))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2))) ),
    inference(resolution,[],[f766,f438]) ).

fof(f438,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f258]) ).

fof(f258,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f187]) ).

fof(f187,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f766,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(superposition,[],[f708,f461]) ).

fof(f708,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(superposition,[],[f497,f465]) ).

fof(f465,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f82]) ).

fof(f82,axiom,
    ! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f497,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(subsumption_resolution,[],[f496,f457]) ).

fof(f457,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f206]) ).

fof(f206,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f496,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(subsumption_resolution,[],[f492,f457]) ).

fof(f492,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(cnf_transformation,[],[f320]) ).

fof(f320,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(flattening,[],[f319]) ).

fof(f319,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(ennf_transformation,[],[f240]) ).

fof(f240,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f165]) ).

fof(f165,axiom,
    ! [X103,X104,X105] :
      ( ( pred_attacker(tuple_client_B_in_2(X105))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X104))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f959,plain,
    ( pred_attacker(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))
    | ~ spl1_7 ),
    inference(resolution,[],[f682,f445]) ).

fof(f445,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f265]) ).

fof(f265,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f194]) ).

fof(f194,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f102]) ).

fof(f102,axiom,
    ! [X32] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X32))
     => pred_attacker(X32) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f682,plain,
    ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
    | ~ spl1_7 ),
    inference(avatar_component_clause,[],[f680]) ).

fof(f1416,plain,
    ( spl1_14
    | spl1_80
    | ~ spl1_28 ),
    inference(avatar_split_clause,[],[f1412,f1021,f1414,f784]) ).

fof(f1021,plain,
    ( spl1_28
  <=> ! [X2,X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(tuple_client_A_in_4(X2))
        | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_28])]) ).

fof(f1412,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(X0))
        | ~ pred_attacker(X1)
        | pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) )
    | ~ spl1_28 ),
    inference(subsumption_resolution,[],[f1410,f443]) ).

fof(f443,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f263]) ).

fof(f263,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f192]) ).

fof(f192,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f94]) ).

fof(f94,axiom,
    ! [X24] :
      ( pred_attacker(X24)
     => pred_attacker(constr_pkey(X24)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1410,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(X0))
        | ~ pred_attacker(constr_pkey(X1))
        | ~ pred_attacker(X1)
        | pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) )
    | ~ spl1_28 ),
    inference(resolution,[],[f1022,f658]) ).

fof(f658,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f485,f464]) ).

fof(f485,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f306,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f305]) ).

fof(f305,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_adec(X0,X1)) ),
    inference(rectify,[],[f139]) ).

fof(f139,axiom,
    ! [X84,X85] :
      ( ( pred_attacker(X85)
        & pred_attacker(X84) )
     => pred_attacker(constr_adec(X84,X85)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1022,plain,
    ( ! [X2,X0] :
        ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0))
        | ~ pred_attacker(tuple_client_A_in_4(X2))
        | ~ pred_attacker(X0) )
    | ~ spl1_28 ),
    inference(avatar_component_clause,[],[f1021]) ).

fof(f1172,plain,
    ~ spl1_25,
    inference(avatar_contradiction_clause,[],[f1171]) ).

fof(f1171,plain,
    ( $false
    | ~ spl1_25 ),
    inference(subsumption_resolution,[],[f1170,f410]) ).

fof(f410,plain,
    name_A != name_c,
    inference(cnf_transformation,[],[f53]) ).

fof(f53,axiom,
    name_A != name_c,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1170,plain,
    ( name_A = name_c
    | ~ spl1_25 ),
    inference(subsumption_resolution,[],[f1050,f397]) ).

fof(f397,plain,
    name_B != name_c,
    inference(cnf_transformation,[],[f59]) ).

fof(f59,axiom,
    name_B != name_c,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1050,plain,
    ( name_B = name_c
    | name_A = name_c
    | ~ spl1_25 ),
    inference(resolution,[],[f1011,f335]) ).

fof(f335,plain,
    pred_attacker(name_c),
    inference(cnf_transformation,[],[f150]) ).

fof(f150,axiom,
    pred_attacker(name_c),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f1011,plain,
    ( ! [X1] :
        ( ~ pred_attacker(X1)
        | name_B = X1
        | name_A = X1 )
    | ~ spl1_25 ),
    inference(avatar_component_clause,[],[f1010]) ).

fof(f1010,plain,
    ( spl1_25
  <=> ! [X1] :
        ( name_B = X1
        | ~ pred_attacker(X1)
        | name_A = X1 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_25])]) ).

fof(f1023,plain,
    ( spl1_25
    | spl1_28
    | ~ spl1_17 ),
    inference(avatar_split_clause,[],[f1004,f830,f1021,f1010]) ).

fof(f830,plain,
    ( spl1_17
  <=> ! [X0,X1] :
        ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | name_B = X0
        | name_A = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).

fof(f1004,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X0)
        | name_B = X1
        | name_A = X1
        | ~ pred_attacker(X1)
        | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0))
        | ~ pred_attacker(tuple_client_A_in_4(X2)) )
    | ~ spl1_17 ),
    inference(resolution,[],[f881,f756]) ).

fof(f756,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(constr_sign(tuple_2(X2,X1),name_skS))
      | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),X1))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(resolution,[],[f750,f437]) ).

fof(f437,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f257]) ).

fof(f257,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f186]) ).

fof(f186,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f135,axiom,
    ! [X78] :
      ( pred_attacker(X78)
     => pred_attacker(tuple_client_A_in_2(X78)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f750,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1)) ),
    inference(superposition,[],[f721,f461]) ).

fof(f721,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS))) ),
    inference(superposition,[],[f699,f465]) ).

fof(f699,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(resolution,[],[f499,f450]) ).

fof(f450,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_5(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f270]) ).

fof(f270,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(ennf_transformation,[],[f199]) ).

fof(f199,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X67] :
      ( pred_attacker(tuple_client_A_out_5(X67))
     => pred_attacker(X67) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f499,plain,
    ! [X2,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X1)) ),
    inference(subsumption_resolution,[],[f498,f457]) ).

fof(f498,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(subsumption_resolution,[],[f493,f457]) ).

fof(f493,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(cnf_transformation,[],[f322]) ).

fof(f322,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(flattening,[],[f321]) ).

fof(f321,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
    inference(ennf_transformation,[],[f241]) ).

fof(f241,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X1))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f163]) ).

fof(f163,axiom,
    ! [X100,X101,X102] :
      ( ( pred_attacker(tuple_client_A_in_2(X102))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X101))
        & pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f881,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
        | ~ pred_attacker(X1)
        | name_B = X0
        | name_A = X0
        | ~ pred_attacker(X0) )
    | ~ spl1_17 ),
    inference(resolution,[],[f831,f445]) ).

fof(f831,plain,
    ( ! [X0,X1] :
        ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | name_B = X0
        | name_A = X0 )
    | ~ spl1_17 ),
    inference(avatar_component_clause,[],[f830]) ).

fof(f956,plain,
    ( spl1_14
    | ~ spl1_8 ),
    inference(avatar_split_clause,[],[f955,f684,f784]) ).

fof(f684,plain,
    ( spl1_8
  <=> ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_8])]) ).

fof(f955,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_8 ),
    inference(subsumption_resolution,[],[f954,f338]) ).

fof(f338,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f153]) ).

fof(f153,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f954,plain,
    ( ! [X0] :
        ( ~ pred_attacker(name_A)
        | ~ pred_attacker(X0) )
    | ~ spl1_8 ),
    inference(resolution,[],[f685,f481]) ).

fof(f481,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f298]) ).

fof(f298,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f297]) ).

fof(f297,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f229]) ).

fof(f229,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f103]) ).

fof(f103,axiom,
    ! [X33,X34] :
      ( ( pred_attacker(X34)
        & pred_attacker(X33) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f685,plain,
    ( ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
    | ~ spl1_8 ),
    inference(avatar_component_clause,[],[f684]) ).

fof(f832,plain,
    ( spl1_14
    | spl1_17 ),
    inference(avatar_split_clause,[],[f828,f830,f784]) ).

fof(f828,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | name_A = X0
      | name_B = X0
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X2) ),
    inference(resolution,[],[f687,f481]) ).

fof(f687,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | name_A = X1
      | name_B = X1
      | ~ pred_attacker(X2) ),
    inference(subsumption_resolution,[],[f670,f470]) ).

fof(f470,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f281]) ).

fof(f281,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
     => pred_attacker(X1) ),
    inference(rectify,[],[f105]) ).

fof(f105,axiom,
    ! [X37,X38] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X37,X38))
     => pred_attacker(X38) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f670,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | name_A = X1
      | name_B = X1
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1) ),
    inference(resolution,[],[f491,f664]) ).

fof(f664,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | name_A = X0
      | name_B = X0
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f488,f480]) ).

fof(f480,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f296]) ).

fof(f296,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f295]) ).

fof(f295,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f228]) ).

fof(f228,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X39,X40] :
      ( ( pred_attacker(X40)
        & pred_attacker(X39) )
     => pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f488,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | pred_table(tuple_keys(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(cnf_transformation,[],[f312]) ).

fof(f312,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(flattening,[],[f311]) ).

fof(f311,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(ennf_transformation,[],[f236]) ).

fof(f236,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_A != X0
        & name_B != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f168]) ).

fof(f168,axiom,
    ! [X113,X114] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X113,X114))
        & name_A != X113
        & name_B != X113 )
     => pred_table(tuple_keys(X113,X114)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f491,plain,
    ! [X2,X0,X1] :
      ( ~ pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(cnf_transformation,[],[f318]) ).

fof(f318,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f317]) ).

fof(f317,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f239]) ).

fof(f239,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f167]) ).

fof(f167,axiom,
    ! [X110,X111,X112] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
        & pred_table(tuple_keys(X110,X111)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f686,plain,
    ( spl1_7
    | spl1_8 ),
    inference(avatar_split_clause,[],[f669,f684,f680]) ).

fof(f669,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
    inference(resolution,[],[f491,f423]) ).

fof(f423,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f156]) ).

fof(f156,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f619,plain,
    ~ spl1_3,
    inference(avatar_contradiction_clause,[],[f569]) ).

fof(f569,plain,
    ( $false
    | ~ spl1_3 ),
    inference(resolution,[],[f568,f334]) ).

fof(f568,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_3 ),
    inference(resolution,[],[f511,f438]) ).

fof(f511,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
    | ~ spl1_3 ),
    inference(avatar_component_clause,[],[f510]) ).

fof(f510,plain,
    ( spl1_3
  <=> ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).

fof(f567,plain,
    ~ spl1_2,
    inference(avatar_contradiction_clause,[],[f518]) ).

fof(f518,plain,
    ( $false
    | ~ spl1_2 ),
    inference(resolution,[],[f517,f334]) ).

fof(f517,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_2 ),
    inference(resolution,[],[f440,f508]) ).

fof(f508,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ spl1_2 ),
    inference(avatar_component_clause,[],[f507]) ).

fof(f440,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f260]) ).

fof(f260,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f189]) ).

fof(f189,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

fof(f516,plain,
    ( spl1_1
    | spl1_2
    | spl1_3
    | spl1_4 ),
    inference(avatar_split_clause,[],[f502,f513,f510,f507,f504]) ).

fof(f502,plain,
    ! [X2,X3,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    inference(subsumption_resolution,[],[f501,f457]) ).

fof(f501,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(subsumption_resolution,[],[f500,f457]) ).

fof(f500,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(subsumption_resolution,[],[f494,f457]) ).

fof(f494,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(cnf_transformation,[],[f324]) ).

fof(f324,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(flattening,[],[f323]) ).

fof(f323,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(ennf_transformation,[],[f242]) ).

fof(f242,plain,
    ! [X0,X1,X2,X3] :
      ( ( pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f166,axiom,
    ! [X106,X107,X108,X109] :
      ( ( pred_attacker(tuple_client_B_in_2(X109))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12  % Problem    : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% 0.03/0.12  % Command    : run_vampire %s %d THM
% 0.11/0.33  % Computer : n016.cluster.edu
% 0.11/0.33  % Model    : x86_64 x86_64
% 0.11/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.33  % Memory   : 8042.1875MB
% 0.11/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.11/0.33  % CPULimit   : 300
% 0.11/0.33  % WCLimit    : 300
% 0.11/0.33  % DateTime   : Wed Jun 19 08:47:09 EDT 2024
% 0.11/0.33  % CPUTime    : 
% 0.11/0.35  This is a FOF_THM_RFO_SEQ problem
% 0.11/0.35  Running first-order theorem proving
% 0.11/0.35  Running /export/starexec/sandbox2/solver/bin/vampire --mode casc -m 16384 --cores 7 -t 300 /export/starexec/sandbox2/benchmark/theBenchmark.p
% 0.21/0.42  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42  % (22259)dis+11_1:1_nwc=5.0:s2a=on:i=66616:s2at=3.0:sil=128000:bd=off_0 on theBenchmark for (2999ds/66616Mi)
% 0.21/0.42  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42  % (22262)dis+1011_3:1_sil=256000:tgt=ground:sac=on:i=109:sd=1:ss=included_0 on theBenchmark for (2999ds/109Mi)
% 0.21/0.42  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42  % (22258)lrs+1011_1:12_anc=none:drc=off:sil=64000:sims=off:sp=unary_first:spb=goal_then_units:lsd=20:rnwc=on:nwc=2.0:i=53554:add=off:awrs=converge:bd=off:uhcvi=on:tgt=ground:afp=300:afq=1.63_0 on theBenchmark for (2999ds/53554Mi)
% 0.21/0.42  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42  % (22261)lrs+10_1:3_drc=off:sil=256000:sp=unary_first:lwlo=on:i=216875:kws=precedence:ins=3:rawr=on:nwc=10.0_0 on theBenchmark for (2999ds/216875Mi)
% 0.21/0.42  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42  % (22263)dis+1010_1:1_sil=2000:nwc=3.0:s2a=on:i=132:ins=5:fsr=off:ss=axioms:sd=2:fd=off_0 on theBenchmark for (2999ds/132Mi)
% 0.21/0.43  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.43  % (22264)dis+1010_159245:1048576_to=lpo:sil=2000:etr=on:sp=unary_frequency:spb=goal:rnwc=on:nwc=10.9066:st=2:i=124:sd=1:nm=3:av=off:ss=axioms:rawr=on:drc=encompass:foolp=on:sgt=5:cond=fast:er=filter:erape=on:erml=2:s2a=on_0 on theBenchmark for (2999ds/124Mi)
% 0.21/0.43  % (22263)Refutation not found, incomplete strategy% (22263)------------------------------
% 0.21/0.43  % (22263)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.43  % (22263)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.43  % (22263)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.43  
% 0.21/0.43  % (22263)Memory used [KB]: 1229
% 0.21/0.43  % (22263)Time elapsed: 0.004 s
% 0.21/0.43  % (22263)Instructions burned: 7 (million)
% 0.21/0.43  % (22263)------------------------------
% 0.21/0.43  % (22263)------------------------------
% 0.21/0.43  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.43  % (22260)lrs+1010_2201:262144_anc=all:drc=encompass:sil=256000:sims=off:sp=frequency:spb=goal_then_units:rp=on:lwlo=on:st=3.0:i=179501:bs=unit_only:nm=6:ins=2:fsd=on:ss=axioms:sgt=16:afr=on:tgt=ground:awrs=decay:awrsf=200:acc=on:ccuc=first_0 on theBenchmark for (2999ds/179501Mi)
% 0.21/0.43  % (22264)Refutation not found, incomplete strategy% (22264)------------------------------
% 0.21/0.43  % (22264)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.43  % (22264)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.43  % (22264)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.43  
% 0.21/0.43  % (22264)Memory used [KB]: 1160
% 0.21/0.43  % (22264)Time elapsed: 0.005 s
% 0.21/0.43  % (22264)Instructions burned: 5 (million)
% 0.21/0.43  % (22264)------------------------------
% 0.21/0.43  % (22264)------------------------------
% 0.21/0.46  % (22261)First to succeed.
% 0.21/0.47  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.47  % (22265)lrs+1011_1:1_sil=16000:sos=on:erd=off:i=126:nm=2:ep=RST_0 on theBenchmark for (2999ds/126Mi)
% 0.21/0.47  % (22261)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-22257"
% 0.21/0.47  % (22262)Also succeeded, but the first one will report.
% 0.21/0.47  % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.47  % (22261)Refutation found. Thanks to Tanya!
% 0.21/0.47  % SZS status Theorem for theBenchmark
% 0.21/0.47  % SZS output start Proof for theBenchmark
% See solution above
% 0.21/0.47  % (22261)------------------------------
% 0.21/0.47  % (22261)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.47  % (22261)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.47  % (22261)Termination reason: Refutation
% 0.21/0.47  
% 0.21/0.47  % (22261)Memory used [KB]: 1860
% 0.21/0.47  % (22261)Time elapsed: 0.048 s
% 0.21/0.47  % (22261)Instructions burned: 69 (million)
% 0.21/0.47  % (22261)------------------------------
% 0.21/0.47  % (22261)------------------------------
% 0.21/0.47  % (22257)Success in time 0.11 s
%------------------------------------------------------------------------------