Thanks for the reply, knew my understanding must have a big hole in it.
So the additional information an attacker would need is to know a range that the private key is within [a, b]. Now I understand why a flaw in generating the private key (not truly random) can result in encryption failure on an other wise cryptographically secure system.
Thanks for the info on UTXO, always thought it was weird to leave funds on an exposed address but the above explains it.
One other question, how small does the range [a, b] have to be to consider it an immenent security threat with current hardware?