Recently, Harn and Lin proposed an authenticated multiple-key agreement pro
tocol that enables two parties to authenticate each other and to construct
multiple common keys. Later, Yen and Joye claimed that the Ham-Lin scheme h
as a security weakness and proposed an improved version. Here, the authors
point out that the improved scheme still has the same weakness as does the
original scheme.