Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach