1) Lazy revocation: summarize this technique AND answer the question: what reason do the authors give for not re-encrypting old/unmodified data? 2) Key rotation: explain what this techniques is AND what does it help with in the design of Plutus? 3) What do Merkle trees help with in Plutus?