There are two main cases to address here.
One is the generic "black box methods" which apply to elliptic curves. With these, the cost to solve one discrete logarithm is $O(n^{1/2+\epsilon})$, but to solve $k$ instances the cost is $O((kn)^{1/2+\epsilon})$. The easiest demonstration is a memory intensive baby-steps/giant-steps, though other methods also work. If I know that I have to compute $k$ instances, I can set $b=[\sqrt{n/k}]+1$ and run a one-time pre-computation of powers $bG, 2bG,\ldots,[\sqrt{kn}]bG$ with $O(\sqrt{kn})$ group operations. I sort and store this list. For each instance of a discrete logarithm problem $Y_j$, I can then compute $Y_j, Y_j-G, Y_j-2G,\ldots, Y_j-(b-1)G$ and search for a match in my table. There will be precisely one match in each table, for we can write $x_j=q_jb+r$ with $0\le r<b$ and $q<[\sqrt{kn}]+1$ in exactly one way. The individual instances each require $O(\sqrt{n/k})$ group operations and there are $k$ instances. Thus the precomputation and the sum of the individual steps both come to $O((kn)^{1/2+\epsilon})$ work (the $\epsilon$ covers sort and search costs). Note the individual problems can be presented serially, but I need to know $k$ in advance to optimise.
The other case is the GNFS case when attacking a multiplicative group mod $p$. Here a good study is the LOGJAM vulnerability and the attendant paper Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice by Adrian et al. They note that the GNFS attack on discrete logarithms can be divided into a one-time precomputation and a many-time "descent" step. The one-time precomputation has the usual GNFS complexity $L_p[1/3,\root3\of{64/9}\approx 1.923]$ independent of the value of $k$. They quote a figure of $L_p[1/3,1.232]$ for the descent step (again independent of $k$) based on work by Barbulescu in his thesis. Thus for $k\approx L_p[1/3,0.691]$ the cost to solve $k$ discrete logarithms is not significantly greater than the solution of a single instance. The LOGJAM authors were able to show that this separation between the one-time precomputation and the descent permitted an effective attack for 512-bit primes.