Using interpolation for the verification of security protocols