Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From public messages, anyone can derive private keys of users. Then they proposed their modifications to overcome this severe weakness, respectively. In this paper, we show that the Peinado