Introduction -- Definitions and notations -- A brief background on elliptic curves and pairings -- Boneh-Franklin IBE and its variants -- Selective-identity model -- Security against adaptive chosen ciphertext attacks -- IBE in adaptive-identity model without random oracles -- Further IBE constructions -- IBE without pairing -- Applications, extensions and related primitives -- Avoiding key escrow -- Products and standards.