Analysis of an authenticated identity-based multicast scheme

In IEE Proceedings Communications, 2005, 152, (6), an efficient authenticated identity-based multicast scheme from bilinear pairing was proposed. Wang proved that the scheme is secure against the adversary who can forge a ciphertext, but it is shown that their scheme is not secure against an inside forger.