Introduction: Chapter 1 from Introduction to Identity-Based Encryption