To investigate the security of cryptographic protocols against quantum adversary, researchers have extended classical random oracle models with the help of post-quantum cryptography and quantum cryptography into the quantum random oracle models. This paper summarizes the research progress across various random oracle models, categorizing their concepts, instantiation methods, and security proof techniques to systematically review random oracle models against quantum adversaries. It also offered security analyses of cryptographic protocols under different quantum random oracle models. A comparative study of quantum-accessible random oracle model, quantum random oracle model, and classical random oracle model is carried out to clarify the differences and relationships between various random oracle models. Furthermore, the paper points out future research directions and trends with the goal to address the threats posed by quantum computing.