“…In light of these negative results, protocols for SPIR have largely evolved to cheat-sensitive protocols, also known as quantum private query [ 11 ]. Examples of these protocols include those based on quantum oblivious key distribution [ 12 , 13 , 14 , 15 , 16 ], those based on sending states to a database oracle [ 17 , 18 ], and those based on round-robin QKD protocol [ 19 ]. In these protocols, the parties are averse to being caught cheating, so cheat-detection strategies allows one to construct protocols with more relaxed conditions as compared to those of SPIR [ 20 ].…”