It is slightly more than a decade ago that the first cryptographic applications of bilinear pairings were discovered. Extensive research has been done over the last decade on various aspects of such maps and the cryptographic primitives built from them. To a limited extent, this research has been implemented into concrete products for general use. This has been supplemented by the incorporation ... [Show full abstract] of pairing based schemes into proposed standards. The purpose of the current chapter is to provide a brief summary of the products and the draft standards related to identity-based cryptography.