Introduction.- Definitions and Notations.- A Brief Background on Elliptic Curves and Pairings.- Boneh-Franklin IBE and its Variants.- Selective-Identity Model.- Security Against Adaptive Chosen Ciphertext Attacks.- IBE in Adaptive-Identity Model Without Random Oracles.- Further IBE Constructions.- IBEWithout Pairing.- Applications, Extensions and Related Primitives.- Avoiding Key Escrow.- Products and Standards.- Bibliography.- Index