Table 1 Comparison of the ability of various protocols for private queries to meet the two criteria for deployment (security and implementability). Note that the cheat sensitive security model may offer the possibility for security with no additional conditions since the impossibility proof15 may not apply

From: Performing private database queries in a real-world environment using a quantum protocol