1. Rating Technical quality 4: Contents are mostly correct. Some improvements suggested below. Originality 4: Contains some new ideas, but can be developed as described below; good analysis of current state Editorial quality 5: Clear, understandable and easy to read Overall grade (overall, how do you rate this paper?) 4: Very good Confidence (how confident are you about this review?) 2: I have some general knowledge of this subject 2. Detailed comments 2a. Technical quality Identity based authentication and key establishment protocols are explored in this paper. The topic is reviewed from applied security engineering point of view. The goal is to find out the different building blocks in conceptual level that can be utilized when designing new service and protocol architectures. With the same level of abstraction is also explained the symmetric key cryptography. In general, background to identity based cryptography is provided. Basic theorems behind the protocols are explained in high level. Examples of the existing applications and the introduction of the new simple symmetric key based identity binding authentication and key establishment scheme is presented. Strengths of the paper are that it is very easy to read and surveys through the large set of references. Therefore it enables fast adoption of available tools for anyone who is already familiar with concepts. However, weakness of the paper is that it does contain only a bit of self-contained information. The reader who is not familiar with the topic will not educate much after reading it. I suggest that one ID-based AKE protocol would be presented in more detail. In such a way that "why it is secure?" question would also be covered. Paper provides a good survey of the state of the art in the case of identity based authentication and key establishment protocols. 2b. Originality I think that some of the ideas presented in the paper are new. 2c. Editorial quality As mentioned earlier, the readability of the paper is great. How easy it is to understand depends on the reader, but sure is that it is not an introduction level text to the topic. Abstract describes the contents of the paper well. The Introduction section is good. It clearly explains background of the topic, gives goal of the survey and introduces contents of the paper. (section II) Many of the protocols that are presented are based on parings. One paragraph about parings would be good in beginning of the section. (section III) In section II attacks were considered with Diffie- Hellman protocol and with Pairing Based Key establishment. However, section III does not talk about possible attacks at all. Can we say something how secure the protocols in section III are? (page 4) Schematic picture of "User Authentication for Internet based Services with Operator Short Message Service" would be clarifying.