Building a scheme first and then crafting a cryptographic model in which the scheme can be proved secure can result in schemes whose security breaks down in practice.
-- Breaking Web Applications Built On Top of Encrypted Data by Grubbs, P; Mcpherson, R; Naveed, M [2016]