Dr Chris Culnane

  • Room: Level: 08 Room: 8.20
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Applied Cryptography
  • Cyber Security
  • Privacy
  • Verifiable Electronic Voting (Design and Implementation)

Personal webpage

https://people.eng.unimelb.edu.au/cculnane/

Biography

A key focus of my research is to develop theoretical security mechanisms into fully functional implementations of security systems. My recent research has been focussed on end-to-end verifiable voting schemes. Prior to starting at the University of Melbourne, I worked as a Research Fellow at the University of Surrey on the Trustworthy Voting Systems Project (TVS). The TVS Project resulted in the University of Surrey being contracted to design, develop and deploy an end-to-end verifiable election for Victorian Electoral Commission, as part of their vVote project. I was the technical lead, for the University of Surrey, on the vVote project, and led the design and implementation of the system. The system consisted of more than 25,000 lines of code and was successfully deployed as the Electronically Assisted Voting scheme in the Victorian state election, 2014. As part of the project we implemented a high scalable threshold web bulletin board, which involved the design and development of a new distributed consensus protocol that provides end-of-day byzantine fault tolerance.

My current works focusses on the verifiable postal voting. I am also interested in applying the techniques and analyses from verifiable voting in the wider field of privacy.

Recent publications

  1. Culnane, C.; Eldridge, M.; Essex, A.; Teague, V. Trust implications of DDoS protection in online elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER. 2017, Vol. 10615 LNCS, pp. 127-145. DOI: 10.1007/978-3-319-68687-5_8
  2. Culnane, C.; Rubinstein, BIP.; Teague, V. Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics’ Privacy-Preserving Record Linkage. . 2017, Vol. abs/1712.00871.
  3. Culnane, C.; Teague, V. Why Open Government is good for cybersecurity and public trust - now would be a good time to start. Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings.. 2017, pp. 236-250.
  4. Culnane, C.; Teague, V. Strategies for Voter-Initiated Election Audits. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER INT PUBLISHING AG. 2016, Vol. 9996, pp. 235-247. DOI: 10.1007/978-3-319-47413-7_14
  5. Burton, C.; Culnane, C.; Schneider, S. vVote: Verifiable Electronic Voting in Practice. IEEE Security & Privacy. IEEE COMPUTER SOC. 2016, Vol. 14, Issue 4, pp. 64-73. DOI: 10.1109/MSP.2016.69
  6. Culnane, C.; Ryan, PYA.; Schneider, S.; Teague, V. vVote: A Verifiable Voting System. ACM Transactions on Information and System Security. ASSOC COMPUTING MACHINERY. 2015, Vol. 18, Issue 1. DOI: 10.1145/2746338
  7. Culnane, C.; Schneider, S. A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. 2014 IEEE 27th Computer Security Foundations Symposium. IEEE COMPUTER SOC. 2014, Vol. 2014-January, pp. 169-183. DOI: 10.1109/CSF.2014.20
  8. Srinivasan, S.; Culnane, C.; Heather, J.; Schneider, S.; Xia, Z. Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER INT PUBLISHING AG. 2014, Vol. 8792, pp. 335-348.
  9. Schneide, S.; Teague, V.; Culnane, C.; Heather, J. Special section on vote-ID 2013. Journal of Information Security and Applications. Elsevier BV. 2014, Vol. 19, Issue 2, pp. 103-104. DOI: 10.1016/j.jisa.2014.06.002
  10. Heather, J.; Culnane, C.; Schneider, S.; Srinivasan, S.; Xia, Z. Solving the discrete logarithm problem for packing candidate preferences. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science. 2013, Vol. 8128 LNCS, pp. 209-221. DOI: 10.1007/978-3-642-40588-4_15
  11. Burton, C.; Culnane, C.; Heather, J.; Peacock, T.; Ryan, PYA.; Schneider, S.; Srinivasan, S.; Teague, V.; Wen, R.; Xia, Z. A supervised verifiable voting protocol for the Victorian electoral commission. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). 2012, Vol. P-205, pp. 81-94.
  12. Schneider, S.; Srinivasan, S.; Culnane, C.; Heather, J.; Xia, Z. Prêt á Voter with write-ins. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Berlin Heidelberg. 2012, Vol. 7187 LNCS, pp. 174-189. DOI: 10.1007/978-3-642-32747-6_11
  13. Schneider, S.; Llewellyn, M.; Culnane, C.; Heather, J.; Srinivasan, S.; Xia, Z. Focus group views on Prêt à Voter 1.0. 2011 International Workshop on Requirements Engineering for Electronic Voting Systems. IEEE. 2011, pp. 56-65. DOI: 10.1109/REVOTE.2011.6045916
  14. Briffa, JA.; Culnane, C.; Treharne, H. Imperceptible Printer Dot Watermarking for Binary Documents. Optics, Photonics, and Digital Technologies for Multimedia Applications. SPIE-INT SOC OPTICAL ENGINEERING. 2010, Vol. 7723. DOI: 10.1117/12.854708
  15. Xia, Z.; Culnane, C.; Heather, J.; Jonker, H.; Ryan, PYA.; Schneider, S.; Srinivasan, S. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2010, Vol. 6498, pp. 98-+. DOI: 10.1007/978-3-642-17401-8_8
  16. Culnane, C.; Treharne, H.; Ho, ATS. Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2008, Vol. 5041, pp. 173-187. DOI: 10.1007/978-3-540-92238-4_14
  17. Culnane, C.; Treharne, H.; Ho, ATS. Improving mutli-set formatted binary text watermarking using continuous line embedding. Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007). IEEE. 2008. DOI: 10.1109/ICICIC.2007.349
  18. Williams, DM.; Treharne, H.; Ho, ATS.; Culnane, C. Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol. Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08. ASSOC COMPUTING MACHINERY. 2008, pp. 205-213. DOI: 10.1145/1411328.1411363
  19. Zhao, X.; Ho, ATS.; Treharne, H.; Pankajakshan, V.; Culnane, C.; Jiang, W. A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform. Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007). IEEE COMPUTER SOC. 2007, Vol. 1, pp. 283-286. DOI: 10.1109/IIH-MSP.2007.50
  20. Culnane, C.; Treharne, H.; Ho, ATS. A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2006, Vol. 4283, pp. 96-110.

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile