Users track the utility of the ILY token primarily to understand how ILITY connects cross-chain identity, ZK privacy verification, and tokenomics. In privacy identity protocols, tokens not only cover transaction fees but also play a pivotal role in verification services, network security, and ecosystem incentives.
This topic typically encompasses Gas payments, identity verification, incentive mechanisms, governance participation, total supply, and release structure. Grasping how these modules interrelate helps clarify ILY’s central role within the ILITY network.

At its core, ILY is the native utility token of the ILITY network, designed for private on-chain identity, ZK proofs, and cross-chain verification services. Rather than serving as a simple payment asset, ILY forms the backbone for user verification, network interaction, and ecosystem governance.
Think of ILY as the settlement layer for the ILITY network. When users generate private ZK proofs, execute on-chain transactions, or access identity verification services, they pay associated fees in ILY. Official sources confirm that both private ZK proofs and on-chain transactions within ILITY require ILY as the native Gas.
The significance of ILY lies in its ability to bridge privacy verification with the on-chain economy. Users leverage ILY to access verification services, the system settles transaction costs via token mechanisms, and both validators and delegators contribute to network security through reward incentives. For ILITY, ILY is the economic engine sustaining continuous operation of the cross-chain identity verification protocol.
ILITY’s on-chain verification revolves around ZK proofs, identity authentication, and data calls—with ILY serving as the Gas and interaction fee token throughout. Every verification request consumes network resources, necessitating a native asset for billing and settlement.
The process begins when users initiate identity verification, asset proof, or on-chain behavior proof requests. The system then generates or verifies ZK proofs according to the request. On-chain transactions are recorded or confirmed via the ILITY network. Finally, users settle the related fees with ILY, and the network completes the service settlement.
Structurally, ILY’s on-chain utility covers three dimensions: user payments, system verification, and network settlement. Official documentation notes that ILY is used for Gas fees, proof generation, data usage, network security, and governance.
This mechanism ensures that identity verification on ILITY is not just a data query, but a protocol service requiring on-chain settlement and security maintenance. ILY enables a unified economic loop for ZK verification, data calls, and transaction confirmations.
Within ILITY’s identity system, ILY serves as an access credential, verification fee, and ecosystem interaction asset. Cross-chain identity verification involves user assets, behavioral records, and privacy proofs, making the token mechanism essential for balancing resource consumption among participants.
A ZK proof-based identity system must strike a balance between verifiability and privacy protection. Users can confirm specific conditions via proofs without exposing their full wallet information. ILY covers the on-chain costs generated during this verification process.
The workflow: users submit identity verification requests; the system generates proofs based on on-chain behavior or asset status; verification results are used for permission checks, identity confirmation, or data calls; finally, ILY settles the protocol fees, enabling sustainable on-chain identity services.
This structure means ILY is not merely an accessory to the identity system, but the economic foundation of the verification process. Without stable fee and incentive mechanisms, ZK identity services would struggle to maintain verification costs, node operation, and ecosystem growth over time.
ILY’s incentive mechanism is designed to reward validators, delegators, community contributors, and ecosystem participants. The core idea is to allocate tokens in a way that provides ongoing support for network security, protocol development, and ecosystem growth.
ILITY allocates 26% of the total ILY supply—260,000,000 tokens—to Rewards, dedicated to incentivizing validators and delegators. Official documentation confirms that this portion is primarily for network security and participation incentives.
The process: validators operate the network and handle on-chain verifications; delegators support validators through established mechanisms; the system distributes rewards according to set rules. Ultimately, ILY links network security with user participation.
The main ILY allocation structure:
| Allocation Side | Percentage | Token Amount | Main Use |
|---|---|---|---|
| Reward | 26% | 260,000,000 | Validator and delegator rewards |
| Operation | 20% | 200,000,000 | Network operation and infrastructure |
| Ecosystem Growth | 18% | 180,000,000 | Partnerships, growth, and ecosystem activities |
| Team & Advisors | 15% | 150,000,000 | Team and advisor incentives |
| Dev Fund | 9% | 90,000,000 | Protocol development and engineering |
| Community | 8% | 80,000,000 | Contributor and testnet participant incentives |
| Sales | 4% | 40,000,000 | Sales allocation |
Official sources confirm ILY’s total supply is fixed at 1,000,000,000 tokens, with Sales at 4%, Dev Fund at 9%, Team & Advisors at 15%, Community at 8%, Operation at 20%, and Reward at 26%.
ILY functions as both a participation credential and a coordination tool in ILITY governance. Governance mechanisms address protocol upgrades, resource allocation, parameter adjustments, and ecosystem direction.
With ILY, ecosystem participants can provide feedback on network rules. For a protocol focused on private identity and cross-chain verification, governance is vital, as identity data, verification costs, privacy policies, and network security all require ongoing coordination.
Governance is more than voting—it’s integral to the protocol’s long-term operation. The process: the ecosystem proposes governance topics; token holders or participants express opinions according to the rules; the system or governance process adjusts parameters based on outcomes. ILY thus connects token holders with protocol evolution.
This means ILY is not just a Gas payment asset, but the gateway for users to participate in ILITY governance. The clearer the governance framework, the easier it is to balance privacy, security, and usability.
ILY’s total supply is capped at 1,000,000,000 tokens, using a fixed-supply economic model. This helps users understand long-term dilution boundaries and analyze how allocations impact network growth.
Different allocation categories have distinct unlocking schedules. Sales: 0% at TGE, 12-month cliff, linear release over 34 months. Dev Fund: 30,000,000 tokens at TGE, remainder released linearly over 36 months. Community: 10,000,000 tokens at TGE, remainder released linearly over 84 months. Operation: 50,000,000 tokens at TGE, remainder released linearly over 48 months.
The key is that ILY’s release is staggered—using cliffs and linear vesting—to pace token entry for different stakeholders. This design aligns protocol development, network operation, community contribution, and validator rewards with distinct timeframes.
This mechanism is critical for the ILITY economic model. Short-term releases affect initial circulation; long-term releases drive ecosystem incentives and network security. For ZK identity protocols, the token supply structure must support product development, verification services, and community engagement simultaneously.
ILY stands apart from other ZK protocol tokens by focusing on cross-chain identity verification and private data use cases. While many ZK tokens target scaling, proof markets, or general privacy computation, ILY’s use cases center on identity, Gas, data verification, and governance.
Demand drivers for ILY differ from typical ZK tokens. User actions—such as generating private proofs, accessing identity verification, conducting on-chain transactions, and contributing to network security—all involve ILY. Official documentation highlights ILY as a key asset for privacy-first Web3 applications.
Therefore, analyzing ILY requires more than just a “ZK” perspective; it’s essential to consider ILITY’s identity protocol positioning. If the protocol’s usage centers on cross-chain identity, on-chain reputation, and privacy verification, ILY’s economic model will depend on real adoption in these scenarios.
Compared to general ZK protocols, ILY’s advantage is its clear application focus; its limitation is that ecosystem demand must be continually sustained by identity verification, data services, and related applications.
ILY is the native token of the ILITY network, serving Gas payments, ZK proof generation, on-chain identity verification, data calls, network security, ecosystem incentives, and governance participation. Its utility spans user interaction, system verification, node incentives, and protocol coordination.
From an economic perspective, ILY’s total supply is fixed at 1,000,000,000 tokens, allocated across Reward, Operation, Ecosystem Growth, Team & Advisors, Dev Fund, Community, and Sales. The structure supports long-term network operation, protocol development, community engagement, and validator incentives.
ILY is primarily used for Gas payments, ZK proof generation, on-chain identity verification, data usage, network security, and governance participation within the ILITY network.
Official sources confirm ILY’s total supply is fixed at 1,000,000,000 tokens, with each allocation released according to its own schedule.
The largest allocation for ILY is Reward, representing 26% of total supply (260,000,000 tokens), mainly for validator and delegator incentives.
When users generate private ZK proofs or perform on-chain verification in ILITY, they must use ILY to pay the required Gas and protocol interaction fees.
ILY is focused on cross-chain identity, private data verification, and on-chain governance, whereas some ZK protocol tokens are oriented toward scaling, proof markets, or general privacy computation.





