I just checked the book using Amazon's "look inside" feature. It appears that his example is how to use cryptography to hide what cards you have from the other player until it is time to reveal them. I am more interested in how to apply the ideas from this article to involve an open, self enforcing protocol rather than data hiding.
See the section "Coin flipping in telecommunications" for a cryptographic scheme for verifiable coin flipping across the internet. This is a specific example from the category of commitment schemes.