Burn-and-Mint is a dual-phase tokenomic model where a network burns (permanently destroys) a base-layer utility token to mint (create) a new, often governance-oriented, token on a secondary layer or application. This mechanism, also known as a dual-token model, directly links the consumption of a network's core resource to the creation of value for its stakeholders. It is distinct from simple token burning used for deflation, as the burn action is the mandatory gateway to minting a new asset with different properties and utilities.
Burn-and-Mint
What is Burn-and-Mint?
A dual-mechanism for regulating token supply and utility by destroying one asset to create another.
The model's primary function is to create a sustainable economic loop. Users pay for network services (e.g., data storage, compute, oracle feeds) with the utility token, which is subsequently burned. This burning process then triggers the minting of a governance or reward token, which is distributed to network validators, service providers, or stakers. This creates a direct correlation between network usage, token scarcity, and the reward system, aligning the incentives of users, service providers, and token holders.
A canonical example is the Threshold Network, which uses this mechanism for its tBTC v2 bridge. To mint tBTC (a tokenized Bitcoin on Ethereum), a user must burn T tokens. The burned T is permanently removed from circulation, while the newly minted tBTC represents the bridged asset. Other implementations include Factom's conversion of Factoids (FCT) into Entry Credits (EC) for data anchoring, and similar structures are proposed for decentralized physical infrastructure networks (DePIN) and oracle services to balance resource consumption with stakeholder rewards.
The burn-and-mint equilibrium aims for supply stability. If network usage is high, the increased burn rate reduces the circulating supply of the base token, creating upward price pressure. Conversely, low usage slows the burn rate. The minting side is often governed by a predetermined emission schedule or a bonding curve, ensuring the total minted rewards are proportional to the value consumed. This model seeks to decouple speculative token price from network usage fees, potentially leading to more stable service pricing.
Critically, burn-and-mint differs from staking or work token models. In a work model, tokens are staked as collateral to earn the right to perform work and fees; they are not destroyed. Burn-and-mint irrevocably destroys value to access a service or create a new asset. This design choice makes the base token a consumable commodity rather than a capital asset, fundamentally altering its investment thesis and the network's security assumptions, as value is continuously removed rather than locked.
How the Burn-and-Mint Mechanism Works
The burn-and-mint mechanism is a dual-action tokenomic model that programmatically burns a base-layer token to mint a new utility or governance token on a secondary layer, creating a dynamic equilibrium between supply, demand, and network usage.
The burn-and-mint mechanism is a cryptographic economic model where a protocol requires users to permanently destroy, or burn, a quantity of a base-layer asset (like ETH or a stablecoin) in exchange for minting a new utility token on its own network. This process is governed by a smart contract that verifies the burn transaction on the base chain before issuing the new tokens. The primary goal is to tether the value and utility of the new token directly to the consumption of network services, creating a fee-for-security or fee-for-service model. Notable implementations include the Proof-of-Burn consensus variant and application-specific chains like Axelar, which uses the model for cross-chain security.
The mechanism's core innovation is its rebase function, which adjusts the mint rate of the new token based on a target price or network usage metrics. If demand for the network's services is high, the protocol mints more tokens to meet the burn demand, but this increased supply exerts downward pressure on the token's market price. Conversely, low demand reduces minting, making the token more scarce. This creates a negative feedback loop designed to stabilize the token's value around a protocol-defined target, aligning the incentives of users, service providers, and token holders. The model effectively turns transaction fees into a buy-and-burn pressure on the base asset.
A canonical example is the Axelar Network (AXL), which secures its cross-chain communication protocol with this model. Users interacting with Axelar's gateway smart contracts pay fees in a base currency like ETH or USDC. These fees are burned, and the equivalent value is minted as AXL tokens to reward the network's validators. This ensures validators are compensated in the native token while the burn creates constant deflationary pressure on the base assets. Other implementations, like Osmosis for its OSMO token, use a variant where a portion of transaction fees are burned to manage inflation.
The economic security of a burn-and-mint system hinges on the cost-to-attack calculus. To disrupt the network, an attacker would need to acquire and burn a prohibitively large amount of the base asset, making attacks economically irrational. This differs from traditional Proof-of-Stake, where staked assets can be slashed but not destroyed. Critics note complexities in parameter tuning—setting the correct mint rate, target price, and burn ratio is crucial. If misconfigured, the system can lead to excessive inflation of the new token or insufficient rewards for validators, undermining network security and token value.
In summary, the burn-and-mint mechanism is a sophisticated tool for bootstrapping and securing new blockchain ecosystems. It creates a direct, automated link between economic activity on the network and its native token's monetary policy. By leveraging the established value and liquidity of major base-layer assets, projects can incentivize participation and security provision while attempting to maintain a stable economic environment for their own token—a balancing act between minting for rewards and burning for value accrual.
Key Features of Burn-and-Mint
Burn-and-mint is a dual-action token model that controls supply and incentivizes network usage by destroying one asset to create another.
Supply Regulation
The model creates a dynamic equilibrium between token supply and network demand. Users burn a base-layer token (e.g., ETH, BTC) or a protocol-specific utility token to access services, which permanently removes it from circulation. The protocol then mints a new reward token proportional to the value burned. This mechanism directly ties token issuance to proven economic activity, preventing inflation from unused supply.
Value Accrual
Value is anchored to the burned asset, which is often a more established, exogenous cryptocurrency like Bitcoin or Ethereum. The act of burning creates a verifiable cost for service access, with the value of the newly minted tokens derived from this sunk cost. This creates a hard peg to external value, as the minted tokens represent a claim on the future utility of the network, backed by the destroyed capital.
Incentive Alignment
The mechanism aligns incentives between users, service providers, and token holders.
- Users pay for services via burning, receiving newly minted tokens as rewards.
- Node Operators/Validators earn fees from the burn transaction and often receive a portion of the minted tokens.
- Token Holders benefit from a deflationary pressure on the reward token's supply as network usage increases burn rates.
Protocol Examples
Real-world implementations demonstrate the model's flexibility:
- Threshold Network (tBTC): Users burn ETH to mint tBTC, a Bitcoin-backed asset on Ethereum.
- Helium Network: Hotspot providers burn HNT tokens to mint Data Credits, which are the non-transferable, spend-only token for network data transfer.
- Axie Infinity (Old Model): Previously, players burned Smooth Love Potion (SLP) to mint new Axies, directly linking game asset creation to resource consumption.
Oracle Dependency
Accurate and secure price oracles are critical. The minting function must calculate how many new tokens to issue based on the market value of the burned assets. This requires a trusted external data feed (oracle) to determine the exchange rate between the burned asset and the minted token. Oracle manipulation or failure can break the intended economic model.
Contrast with Buyback-and-Burn
Often confused, these are distinct mechanisms:
- Burn-and-Mint: Burns Asset A to create Asset B. It's a supply-side mechanism for a new token.
- Buyback-and-Burn: Uses protocol revenue to buy and permanently destroy existing tokens of Asset A from the open market. It's a demand-side mechanism for an existing token, similar to a stock buyback. Burn-and-mint is proactive creation; buyback-and-burn is reactive destruction.
Burn-and-Mint vs. Lock-and-Mint
A comparison of two fundamental token bridging models based on how they manage the canonical supply of an asset across chains.
| Feature | Burn-and-Mint | Lock-and-Mint |
|---|---|---|
Core Mechanism | Destroys (burns) tokens on source chain, mints wrapped tokens on destination | Locks tokens in a vault on source chain, mints wrapped tokens on destination |
Canonical Supply | Changes dynamically; total cross-chain supply is not fixed | Remains fixed; wrapped tokens are fully backed 1:1 by locked originals |
Primary Security Model | Relies on destination chain's mint/burn authority (often a multisig or light client) | Relies on security of the source chain vault (often a smart contract or MPC) |
Native Asset Bridging | ||
Rebasing / Staking Derivatives | ||
Bridge-Specific Risk | Mint authority compromise can inflate supply | Vault compromise can lead to asset theft |
Example Protocols | Axelar, Wormhole, LayerZero | Polygon PoS Bridge, Arbitrum Bridge, Avalanche Bridge |
Protocols Using Burn-and-Mint
The burn-and-mint equilibrium (BME) model is a core tokenomics mechanism used by several prominent blockchain protocols to manage supply and align network security with utility.
Core Mechanism: Value Backstop
The fundamental purpose of BME across protocols is to create a cryptoeconomic backstop. The native token's value is programmatically linked to the Total Value Secured (TVS) or utility of the network. Burning on usage creates scarcity, while controlled minting rewards validators. This aims to prevent token value dilution and align incentives between users, stakers, and the protocol's growth.
Key Economic Variable: Expansion & Contraction
Protocols fine-tune their equilibrium using adjustable parameters:
- Expansion Rate: The rate at which new tokens are minted for staking rewards.
- Contraction Mechanism: The rate/burn ratio from fees or asset redemptions.
- Target Ratio: The ideal ratio of native token value to secured external assets (e.g., THORChain's 1:3). Governance often controls these parameters to manage inflation and security.
Security Considerations & Risks
The Burn-and-Mint Equilibrium (BME) model introduces unique security and economic dynamics distinct from traditional staking or collateral-backed systems. Its security is a function of the economic incentives binding the utility token and the protocol's stable unit of account.
Oracle Manipulation Risk
The BME model's mint rate is typically calculated using an external oracle price feed for the utility token. An attacker who manipulates this price can:
- Artificially inflate the token price to mint excessive protocol tokens, diluting holders.
- Depress the token price to reduce the burn rate, undermining the deflationary mechanism. This creates a critical dependency on oracle security and robust price feed aggregation.
Velocity Attack & Economic Spam
A malicious actor could execute high-frequency, low-value transactions to repeatedly burn and mint tokens. This transaction spam aims to:
- Capture a disproportionate share of newly minted rewards without providing real utility.
- Increase network congestion and fees for legitimate users. Mitigations include mint caps, cooldown periods, and fee structures that disincentivize micro-transactions.
Centralization of Burn Authority
In some implementations, the burn function or the treasury managing minted tokens may be controlled by a multi-sig or DAO. Risks include:
- Custodial Risk: Compromise of treasury keys could lead to uncontrolled minting.
- Governance Attack: A malicious proposal could alter mint/burn parameters to extract value. Transparent, time-locked governance and non-custodial burn mechanisms are essential countermeasures.
Peg Stability Mechanism Risk
When BME is used to stabilize an asset's peg (e.g., a stablecoin), the system relies on arbitrageurs to burn the stable asset when it's below peg. Failure modes include:
- Reflexivity: A falling utility token price reduces the incentive to burn, weakening the peg defense.
- Liquidity Crunch: Insufficient liquidity in the utility token market can prevent effective arbitrage, causing a peg break.
Tokenomics & Long-Term Sustainability
The model's health depends on continuous, real economic demand for the protocol's services to drive token burns. Key risks are:
- Demand Collapse: If service usage falls, the burn rate drops, removing the deflationary pressure and potentially leading to token inflation if minting continues.
- Parameter Sensitivity: Poorly calibrated mint ratios, vesting schedules, or supply caps can lead to unsustainable inflation or deflation.
Integration & Composability Risks
When a BME token is integrated into DeFi protocols (e.g., as collateral), novel risks emerge:
- Oracle Dependency Amplification: The token's value, derived from oracle feeds, creates a second-order oracle risk for any protocol that accepts it as collateral.
- Liquidation Cascades: A sharp drop in the utility token's price could trigger simultaneous liquidations in multiple integrated protocols, exacerbating the sell-off.
Common Misconceptions About Burn-and-Mint
Burn-and-mint equilibrium (BME) is a complex tokenomic mechanism often misunderstood. This section clarifies the most frequent points of confusion regarding its purpose, mechanics, and economic effects.
No, burning tokens in a BME system is a mechanism to transfer and rebalance value, not destroy it. When a user burns a utility token (e.g., to pay for a service), the protocol mints an equivalent value of a new token (often a reward or governance token) or credits the user on another ledger. The perceived 'destruction' creates scarcity for the burned token, while the newly minted value is allocated elsewhere within the system's economy. The goal is to create a closed-loop economy where value circulates between the utility and reward assets based on protocol usage.
Technical Deep Dive
The Burn-and-Mint Equilibrium (BME) is a tokenomic mechanism that algorithmically regulates a token's supply and demand by linking its utility to a perpetual cycle of burning and minting.
The Burn-and-Mint Equilibrium (BME) is a tokenomic model where a protocol burns (permanently destroys) its native utility token as a fee for network usage, then algorithmically mints (creates) new tokens to reward network operators, targeting a stable annual supply. The core mechanism, pioneered by projects like Helium (HNT) and adopted by IoTeX, creates a closed-loop economy: user demand burns tokens, reducing supply, while validators are minted new tokens as rewards, increasing supply. The protocol's algorithm adjusts minting rates based on burn rates, aiming for a long-term equilibrium where new issuance matches tokens removed from circulation, thus regulating inflation and tying token value directly to network utility.
Ecosystem Usage and Standards
Burn-and-Mint is a tokenomic model where a native token is burned (destroyed) to mint (create) a pegged asset on another blockchain, creating a deflationary supply mechanism tied to cross-chain utility.
Core Mechanism
The burn-and-mint equilibrium is the foundational process. Users burn a native token (e.g., $TOKEN) on its source chain by sending it to a verifiable, unspendable address. This destruction is cryptographically proven to a minting contract on a destination chain, which then mints an equivalent, pegged representation of the asset (e.g., peggedTOKEN). The model often uses a minting fee or bridge fee, a portion of which is permanently burned, creating a deflationary pressure on the native supply.
Primary Use Case: Cross-Chain Bridges
This model is predominantly used by cross-chain messaging protocols and token bridges to facilitate asset transfers without relying on locked liquidity pools. Examples include:
- Chainlink's CCIP & Cross-Chain Interoperability Protocol: Uses a burn-and-mint model for transferring LINK and other tokens across chains.
- Axelar Network: Burns assets on source chains to mint canonical wrapped representations (e.g., axlUSDC) on connected chains.
- Wormhole's Native Token Transfers (NTT): A standard for native token transfers using burn-and-mint, separating token ownership from bridge security.
Tokenomic & Supply Impact
Burn-and-mint directly impacts token supply dynamics. The continuous burning of the native token for cross-chain utility creates a deflationary sink. The net supply change depends on the balance between new token issuance (e.g., staking rewards, ecosystem incentives) and the burn rate from bridging activity. This aligns token value accrual with network usage, as increased cross-chain transactions increase burn rate, theoretically increasing scarcity.
Key Advantages
- Capital Efficiency: Eliminates the need for large, locked liquidity pools on destination chains, freeing capital.
- Unified Liquidity: All liquidity remains on the native chain, creating a single deep pool rather than fragmented pools.
- Native Security: The bridged asset's security is ultimately backed by the security of the native chain, not a third-party custodian.
- Simplified Composability: Creates a canonical, wrapped asset on foreign chains that can integrate natively with local DeFi protocols.
Considerations & Risks
- Bridge Dependency: Users must trust the security and liveness of the verification layer (oracle network, validator set) that proves the burn to the minting contract.
- Supply Shock Risk: A sudden, massive minting event on a destination chain (if the bridge is compromised) could inflate the wrapped supply without a corresponding native burn.
- Regulatory Scrutiny: The minting of new tokens on a destination chain may have different regulatory implications than pool-based models.
- Complexity: More complex to implement and audit than simple lock-and-mint bridges.
Contrast with Lock-and-Mint
Burn-and-mint is often contrasted with the lock-and-mint (or lock/unlock) model used by bridges like Polygon PoS.
Lock-and-Mint:
- Native tokens are locked in a custodian contract on Chain A.
- An equivalent wrapped token is minted on Chain B.
- To redeem, the wrapped token is burned on Chain B, unlocking the native on Chain A.
- Liquidity is locked and fragmented.
Burn-and-Mint:
- Native tokens are burned on Chain A.
- An equivalent wrapped token is minted on Chain B.
- To redeem, the wrapped token is burned on Chain B, minting native on Chain A.
- Liquidity remains unified on the native chain.
Frequently Asked Questions (FAQ)
The Burn-and-Mint Equilibrium (BME) is a tokenomic model that creates a self-regulating economic loop by linking token destruction to token creation. This section answers the most common technical and economic questions about its mechanics and applications.
Burn-and-Mint Equilibrium (BME) is a tokenomic model where a protocol burns (permanently destroys) a utility token based on network usage and subsequently mints (creates) new tokens as rewards for network validators or service providers. The core mechanism creates a feedback loop: as demand for the network's service increases, more of the native token is burned to pay for that service, which in turn creates deflationary pressure. The protocol then mints new tokens at a predetermined rate, often targeting a stable supply or a specific inflation schedule, to reward participants who secure or operate the network. This aims to balance token supply with network demand, theoretically stabilizing or increasing the token's value as adoption grows. Prominent examples include the Helium Network (HNT) for wireless infrastructure and Theta Network for video streaming.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.