-

@ cmd
2025-03-06 18:27:09
to be clear, there is no protocol interaction between the nodes to rotate keys or update the polynomial. you simply use your nsec to generate a new set of shares, then swap out the shares manually
this keeps share rotation simple, and reduces the attack surface available to a compromised share
I do have an example of performing an interactive rotation in the main frost library, that is designed for a group of adversaries:
https://github.com/cmdruid/frost/blob/master/test/example/refresh.ts