const pk: Function; secret sk: Function; inversekeys (pk,sk); protocol nsl3(I,R) { role I { const ni: Nonce; var nr: Nonce; send_1(I,R, {I,ni}pk(R) ); read_2(R,I, {ni,nr,R}pk(I) ); send_3(I,R, {nr}pk(R) ); claim_4(I,Secret,ni,nr); claim_6(I,Nisynch); } role R { var ni: Nonce; const nr: Nonce; read_1(I,R, {I,ni}pk(R) ); send_2(R,I, {ni,nr,R}pk(I) ); read_3(I,R, {nr}pk(R) ); claim_5(R,Secret,ni,nr); claim_7(R,Nisynch); } } const Alice,Bob,Eve: Agent; untrusted Eve; const nc: Nonce; compromised sk(Eve); run nsl3.I(Agent,Agent); run nsl3.R(Alice,Bob);