Quantum Virtual Machine
The world's first security-hardened quantum execution environment. Deterministic. Verifiable. Tamper-proof. Built for organizations that demand reproducibility and audit trails in quantum computing.
Most quantum toolchains ignore verification, reproducibility, and security. QVM fills this critical gap.
Defense in depth. Every layer validates. No bypass possible.
QIR Bytecode / QASM / Python
Magic bytes, version, structure
Limits, whitelist, policy
Seeded PRNG, dispatch
SHA-256 hash chain
Every feature designed for security, reproducibility, and enterprise deployment
Every program verified against policy before execution. Gate whitelists, qubit limits, instruction caps. No exceptions. No bypass.
Same seed = identical output. Every time. ChaCha20 seeded PRNG ensures perfect reproducibility across runs and machines.
SHA-256 chained audit logs. Every measurement cryptographically linked. Tamper-evident. Court-admissible proof of execution.
Pre-flight checks prevent runaway execution. Qubit caps, instruction limits, circuit depth bounds. DoS-resistant by design.
State-vector, Stabilizer (Clifford), and MPS tensor network simulators. Choose optimal backend for your workload.
Native PyO3 bindings for Python. Pure Rust core with zero external dependencies. OpenQASM 2.0 parser included.
Simple API, powerful guarantees
import qvm # Build a Bell state circuit program = qvm.Program.builder() \ .name("bell") \ .qubits(2) \ .h(0) \ .cnot(0, 1) \ .measure_all() \ .build() # Execute with deterministic seed result = qvm.run(program, seed=42) # Same seed = same result. ALWAYS. result2 = qvm.run(program, seed=42) assert result.bits == result2.bits # Get tamper-evident transcript print(result.transcript.final_hash())
In quantum computing, if you can't reproduce it, you can't trust it. QVM guarantees identical results with identical seeds - a fundamental requirement for debugging, testing, and regulatory compliance.
Security doesn't mean slow. State-vector backend, single-threaded, M1 Mac.
| Circuit | Qubits | Depth | Time | Performance |
|---|---|---|---|---|
| Bell State | 2 | 2 | <1μs | |
| GHZ-10 | 10 | 10 | ~10μs | |
| Random-16 | 16 | 100 | ~1ms | |
| Random-20 | 20 | 100 | ~20ms | |
| Random-24 | 24 | 100 | ~300ms |
When quantum computing meets enterprise requirements
Analyze quantum algorithms in a controlled, sandboxed environment. Test cryptographic implementations with reproducible results.
Test post-quantum migration strategies. Validate hybrid classical-quantum protocols with deterministic execution.
Integrate quantum tests into DevOps workflows. Resource limits prevent runaway jobs. Deterministic for reliable testing.
Hash-chained transcripts provide cryptographic proof of execution. Audit trails meet financial and healthcare requirements.
Teach quantum computing without lying about guarantees. Students get reproducible results for learning and verification.
Deterministic semantics enable rigorous verification. Symbolic backends for equivalence checking (coming soon).
Stop running unverified quantum circuits. Start with security.