Note:
This might be one of the most difficult parts of DNSSEC. As, yet there are no documents describing/advising a procedure.


Whatever you choose to do, make sure that you document the procedure and the interactions.

This is a one-off interaction. Once the KEY is accepted it can be used as a bootstrap for future key exchanges.