Proofs that Yield Nothing but their Validity, and a Methodology of Cryptographic Protocol Design