Extending the Constraint Solving Method for Analysis of Security Protocols with Commutative Encryption