Dr Chris Culnane

  • Room: Level: 08 Room: 8.20
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Applied Cryptography
  • Cyber Security
  • Privacy
  • Verifiable Electronic Voting (Design and Implementation)

Personal webpage

https://people.eng.unimelb.edu.au/cculnane/

Biography

A key focus of my research is to develop theoretical security mechanisms into fully functional implementations of security systems. My recent research has been focussed on end-to-end verifiable voting schemes. Prior to starting at the University of Melbourne, I worked as a Research Fellow at the University of Surrey on the Trustworthy Voting Systems Project (TVS). The TVS Project resulted in the University of Surrey being contracted to design, develop and deploy an end-to-end verifiable election for Victorian Electoral Commission, as part of their vVote project. I was the technical lead, for the University of Surrey, on the vVote project, and led the design and implementation of the system. The system consisted of more than 25,000 lines of code and was successfully deployed as the Electronically Assisted Voting scheme in the Victorian state election, 2014. As part of the project we implemented a high scalable threshold web bulletin board, which involved the design and development of a new distributed consensus protocol that provides end-of-day byzantine fault tolerance.

My current works focusses on the verifiable postal voting. I am also interested in applying the techniques and analyses from verifiable voting in the wider field of privacy.

Recent publications

  1. Mohanty, V.; Culnane, C.; Stark, PB.; Teague, V. Auditing Indian elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer International Publishing. 2019, Vol. 11759 LNCS, pp. 150-165. DOI: 10.1007/978-3-030-30625-0_10
  2. Culnane, C.; Essex, A.; Lewis, SJ.; Pereira, O.; Teague, V. Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. IEEE Security & Privacy. Institute of Electrical and Electronics Engineers. 2019, Vol. 17, Issue 4, pp. 62-70. DOI: 10.1109/MSEC.2019.2915398
  3. Ramchen, K.; Culnane, C.; Pereira, O.; Teague, V. Universally Verifiable MPC and IRV Ballot Counting. Proceedings of the Financial Cryptography and Data Security: 23rd International Conference, FC 2019. Springer International Publishing. 2019, Vol. 11598 LNCS, pp. 301-319. DOI: 10.1007/978-3-030-32101-7_19
  4. Culnane, C.; Eldridge, M.; Essex, A.; Teague, V. Trust implications of DDoS protection in online elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER. 2017, Vol. 10615 LNCS, pp. 127-145. DOI: 10.1007/978-3-319-68687-5_8
  5. Culnane, C.; Rubinstein, BIP.; Teague, V. Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics’ Privacy-Preserving Record Linkage. . 2017, Vol. abs/1712.00871.
  6. Culnane, C.; Teague, V. Why Open Government is good for cybersecurity and public trust - now would be a good time to start. Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings.. 2017, pp. 236-250.
  7. Culnane, C.; Teague, V. Strategies for Voter-Initiated Election Audits. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER INT PUBLISHING AG. 2016, Vol. 9996, pp. 235-247. DOI: 10.1007/978-3-319-47413-7_14
  8. Burton, C.; Culnane, C.; Schneider, S. vVote: Verifiable Electronic Voting in Practice. IEEE Security & Privacy. IEEE COMPUTER SOC. 2016, Vol. 14, Issue 4, pp. 64-73. DOI: 10.1109/MSP.2016.69
  9. Culnane, C.; Ryan, PYA.; Schneider, S.; Teague, V. vVote: A Verifiable Voting System. ACM Transactions on Information and System Security. ASSOC COMPUTING MACHINERY. 2015, Vol. 18, Issue 1. DOI: 10.1145/2746338
  10. Culnane, C.; Schneider, S. A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. 2014 IEEE 27th Computer Security Foundations Symposium. IEEE COMPUTER SOC. 2014, Vol. 2014-January, pp. 169-183. DOI: 10.1109/CSF.2014.20
  11. Srinivasan, S.; Culnane, C.; Heather, J.; Schneider, S.; Xia, Z. Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER INT PUBLISHING AG. 2014, Vol. 8792, pp. 335-348.
  12. Schneide, S.; Teague, V.; Culnane, C.; Heather, J. Special section on vote-ID 2013. Journal of Information Security and Applications. Elsevier BV. 2014, Vol. 19, Issue 2, pp. 103-104. DOI: 10.1016/j.jisa.2014.06.002
  13. Heather, J.; Culnane, C.; Schneider, S.; Srinivasan, S.; Xia, Z. Solving the discrete logarithm problem for packing candidate preferences. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science. 2013, Vol. 8128 LNCS, pp. 209-221. DOI: 10.1007/978-3-642-40588-4_15
  14. Burton, C.; Culnane, C.; Heather, J.; Peacock, T.; Ryan, PYA.; Schneider, S.; Srinivasan, S.; Teague, V.; Wen, R.; Xia, Z. A supervised verifiable voting protocol for the Victorian electoral commission. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). 2012, Vol. P-205, pp. 81-94.
  15. Schneider, S.; Srinivasan, S.; Culnane, C.; Heather, J.; Xia, Z. Prêt á Voter with write-ins. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Berlin Heidelberg. 2012, Vol. 7187 LNCS, pp. 174-189. DOI: 10.1007/978-3-642-32747-6_11
  16. Schneider, S.; Llewellyn, M.; Culnane, C.; Heather, J.; Srinivasan, S.; Xia, Z. Focus group views on Prêt à Voter 1.0. 2011 International Workshop on Requirements Engineering for Electronic Voting Systems. IEEE. 2011, pp. 56-65. DOI: 10.1109/REVOTE.2011.6045916
  17. Briffa, JA.; Culnane, C.; Treharne, H. Imperceptible Printer Dot Watermarking for Binary Documents. Optics, Photonics, and Digital Technologies for Multimedia Applications. SPIE-INT SOC OPTICAL ENGINEERING. 2010, Vol. 7723. DOI: 10.1117/12.854708
  18. Xia, Z.; Culnane, C.; Heather, J.; Jonker, H.; Ryan, PYA.; Schneider, S.; Srinivasan, S. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2010, Vol. 6498, pp. 98-+. DOI: 10.1007/978-3-642-17401-8_8
  19. Culnane, C.; Treharne, H.; Ho, ATS. Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2008, Vol. 5041, pp. 173-187. DOI: 10.1007/978-3-540-92238-4_14
  20. Williams, DM.; Treharne, H.; Ho, ATS.; Culnane, C. Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol. Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08. ASSOC COMPUTING MACHINERY. 2008, pp. 205-213. DOI: 10.1145/1411328.1411363

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile