In this paper, we offer analysis of a deniable threshold ring authentication protocol proposed by Jin et al. . The Authors in  combined the two concepts, namely, threshold ring signature and deniable authentication, to propose a non-interactive deniable (t, n)threshold ring authentication protocol. The protocol is the first design of this type. We will point out that this protocol cannot guarantee that at least t legal participates generate a valid signature and cannot withstand message modification attacks under certain restrictions.