Given the restriction to submit query results only for Oraclize in the exemplary implementation:
https://github.com/oraclize/ethereum-examples/blob/e7f364bb104f0b79eeb1eaec9fb4b7bb316d1cd5/solidity/random-datasource/randomExample.sol#L26
the described ransoming mechanism in the paper is possible. Simple solution would be to remove that line. To quote the paper
Since only valid result will be executed, there is no need to limit the access only to the data carrier.