I suggest to use same scrypt
key for all keys generated in one round. Meaning we should reuse scrypt salt.
Advantages:
- tons of keystores would be generated in 2 seconds, not in 2*(keystore) seconds
- same with verification
- Scrypt key could be the same, but it's important that we use separate AES initialization vector (IV), for security. Reusing IV can make keys feel decryptable.
I see no point in using separate key for everything.
If an attacker breaks into FS, he would probably see keystore passwords and break them anyway. Passwords are stored somewhere in beaconchain clients
If an attacker has x keystores to bruteforce instead of 1, it's not much more secure.