Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme

We show that the Chikazawa-Yamagishi (1992) ID-based key sharing scheme and the Tseng-Jan's (1998) improved version are vulnerable to a man-in-the-middle attack and a triangle attack.