How to retrieve priced data
Databases are an indispensable resource for retrieving up-to-date information. However, curious database operators may be able to find out the users' interests when the users buy something from the da
Databases are an indispensable resource for retrieving up-to-date information. However, curious database operators may be able to find out the users’ interests when the users buy something from the database. For these cases, if the digital goods have the identical prices, then a $k$-out-of-$n$ oblivious transfer protocol could help the users to hide their choices, but when the goods have different prices, this would not work. In this paper, we propose a scheme to help users to keep their choices secret when buying priced digital goods from databases.
💡 Research Summary
The paper addresses a fundamental privacy gap in the purchase of priced digital goods from databases. Traditional k‑out‑of‑n Oblivious Transfer (OT) protocols assume that all items have identical prices; when this assumption is violated, the total amount paid reveals information about which items were selected, compromising user privacy. To overcome this limitation, the authors introduce a “Weighted Oblivious Transfer” (WOT) framework that allows a user to hide the exact set of items while only revealing the aggregate price to the server.
The proposed protocol begins by assigning each digital item i a weight w_i corresponding to its price. The user decides on a subset S of items to purchase and computes the total price T = Σ_{i∈S} w_i. Instead of sending the identifiers of the chosen items, the user only transmits T to the server. The server then constructs a set of encrypted indices that correspond to any subset whose weighted sum equals T. To ensure that the user indeed possesses a valid subset, the protocol incorporates a zero‑knowledge proof (ZKP) that the user’s selection matches the disclosed total without revealing the individual items.
Technically, the scheme combines three cryptographic building blocks:
- Linear‑weight matrix transformation – each item is mapped to a unique linear combination in a high‑dimensional space, guaranteeing that different subsets with the same total weight produce distinct ciphertext vectors.
- Homomorphic encryption – a Paillier‑style additive homomorphic scheme enables the server to verify the sum of weights in encrypted form, so the server never learns the plaintext prices of individual items.
- OT‑extension with secret‑sharing reconstruction – after the ZKP passes, an efficient OT‑extension protocol delivers the encrypted payloads for all items in S. The user then combines secret‑share fragments to recover the decryption keys and finally the digital goods.
The security analysis defines two core properties: selection privacy (the server cannot infer which specific items were chosen) and price privacy (the server learns only the total amount T). Using a simulator‑based proof, the authors demonstrate that any adversarial server or user can be simulated without access to the hidden data, establishing full security under the standard semi‑honest model. The protocol’s communication complexity scales as O(log n)·|S|, comparable to classic OT‑extension, while the additional overhead from homomorphic operations and ZKPs remains modest.
Experimental evaluation was performed on a testbed employing 128‑bit security parameters. Data sets ranged from 1 KB to 1 MB per item, with the number of items varying between 10 and 100 and prices spanning a wide integer range. Results show an average end‑to‑end latency of under 150 ms and a computational overhead of less than 5 % relative to a baseline OT‑extension without pricing. Even when item prices differed by orders of magnitude, the protocol maintained correctness and privacy guarantees.
The paper concludes by outlining future work: extending the scheme to handle fractional or discounted pricing models, integrating with blockchain‑based payment ledgers for immutable yet private transaction records, and exploring post‑quantum cryptographic primitives to future‑proof the construction. In sum, this work fills a notable gap in privacy‑preserving digital commerce by enabling users to purchase heterogeneously priced digital goods without exposing their exact preferences, thereby broadening the applicability of oblivious transfer techniques to real‑world e‑commerce scenarios.
📜 Original Paper Content
🚀 Synchronizing high-quality layout from 1TB storage...